Loading

VLSI Implementation of Data Encryption Standard Algorithm
Naveen Kumar1, B. Venu Gopal2

1Naveen Kumar, M. Tech, Department of ECE, JNTU Kakinada University/ Kaushik College of Engineering /Visakhapatnam, India.
2B.Venu Gopal, Assoc .Professor, Dept. of ECE, Kaushik College of Engineering /Visakhapatnam, India.
Manuscript received on 15 November 2012 | Revised Manuscript received on 25 November 2012 | Manuscript Published on 30 November 2012 | PP: 106-110 | Volume-1 Issue-6, November 2012 | Retrieval Number: E0344101612/2012©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: There are two main types of cryptography in use today –symmetrico rsecret key cryptography and a symmetric or public key cryptography. Symmetric key cryptography is the oldest type whereas asymmetric cryptography is only being used publicly since the late 1970’s 1 . Asymmetric cryptography was a major milestone in the search for a perfect encryption scheme. Secret key cryptography goes back to at least Egyptian times and is of concern here. It involves the use of only one key which is used for both encryption and decryption (hence the use of the term symmetric). Figure 2.1 depicts this idea. It is necessary for security purposes that the secret key never be revealed To accomplish encryption, most secret key algorithms use two main techniques known assubstitutionandpermutation. Substitution is simply a mapping of one value to another whereas permutation is a reordering of the bit positions for each of the inputs. These techniques are used a number of times in iterations called rounds. Generally, the more rounds there are, the more secure the algrithm. A non-linearity is also introduced into the encryption so that decryption will be computationally infeasible 2 without the secret key. This is achieved with the use of S-boxes which are basically non-linear substitution tables where either the output is smaller than the input or viceversa.
Keywords: Cryptography, Encrypt ion

Scope of the Article: VLSI Algorithms