VLSI Implementation of RSA Encryption/Decryption Algorithm

Rasu R*, Kumaresan**, Manoshrudhy***, P. Shanmugasundaram****
*-*** PG Scholars, Department of ECE, Knowledge Institute of Technology, Salem, India.
**** Assistant Professor, Department of ECE, Knowledge Institute of Technology, Salem, India.
Periodicity:March - May'2014
DOI : https://doi.org/10.26634/jcom.2.1.2848

Abstract

The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256 bits, 512 bits. In this paper, The authors use Verilog code to implement a 16-bit RSA block cipher system. Therefore it can easily be fit into the different systems requiring different levels of security. The whole implementation includes three parts: key generation, encryption and decryption process. The key generation stage aims to generate a pair of public key and private key, and then the private key will be distributed to receiver according to certain key distribution schemes. The memory usage and overhead associated with the key generation is eliminated by the proposed system model. The cipher text can be decrypted at receiver side by RSA secret key. Verilog code is synthesized and simulated using Xilinx-ISE 12.1. It is verified that this architecture supports for multiple key of 128bits, 256bits, and 512 bits. Net list generated from RTL Compiler will be used to generate the IC layout. In this work, they have also developed an algorithm using LabVIEW 2010. LabVIEW (Laboratory Virtual Instrument Engineering Workbench) is a graphical programming language that uses icons instead of lines of text to create programs. Unlike text based programming language, LabVIEW uses the data flow programming, where the flow of data determines the execution. The flexibility, modular nature and ease to use programming is possible with LabVIEW, making it less complex.

Keywords

RSA (Rivest Shamir and Adleman), LabVIEW, Verilog, FPGA (Field Programmable Gate Array), Greatest Common Divisor (GCD).

How to Cite this Article?

Rasu, R., Kumaresan, S., Manoshrudhy, S., and Sundaram, P.S. (2014). VLSI Implementation of RSA Encryption/ Decryption Algorithm. i-manager’s Journal on Computer Science, 2(1), 26-31. https://doi.org/10.26634/jcom.2.1.2848

References

[1]. A.R.Landge, A.H. Ansari, (2013). ” RSA algorithm realization on FPGA”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July.
[2]. Khaled Shehata, Hanady Hussien, Sara Yehia, (2014). “FPGA Implementation of RSA Encryption Algorithm for EPassport Application” World Academy of Science, Engineering and Technology, Vol. 8.
[3]. Muhammad I. Ibrahimy, Mamun B.I. Reaz, Khandaker Asaduzzaman and Sazzad Hussain, (2007). “FPGA Implementation of RSA Encryption Engine with Flexible Key Size”, International Journal of Communications, Issue 3, Volume 1.
[4]. O. Prasanthi, M. Subba Reddy. (2012). “RSA Algorithm Modular Multiplication” International Journal of Computer Applications in Engineering Sciences, Volume2, Issue 2, June.
[5]. Rehan Shams, Fozia Hanif Khan and Mohammad Umair, (2013). “Cryptosystem an Implementation of RSA Using Verilog”, International Journal of Computer Networks and Communications Security, Vol. 1, No. 3, August, 102–109.Vol. 2, Issue 2, June.
[6]. Selva Kumar M., Thamarai P., Arulselvi S, “Network Data Security Using FPGA” International Journal of Scientific Engineering and Technology (ISSN: 2277-1581), Volume 2 Issue 5, pp: 454-457.
[7]. Sushanta Kumar Sahu, Manoranjan Pradhan, (2011). “FPGA Implementation of RSA Encryption System” International Journal of Computer Applications (0975 – 8887), Volume 19– No.9, April.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.