Skip to main content

Design of High Performance MIPS Cryptography Processor

  • Conference paper
Book cover Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2013)

Abstract

This paper presents the design and implementation of low power 32-bit encrypted and decrypted MIPS processor for Data Encryption Standard (DES), Triple DES, Advanced Encryption Standard (AES) based on MIPS pipeline architecture. The organization of pipeline stages has been done in such a way that pipeline can be clocked at high frequency. Encryption and Decryption blocks of DES, TDES and AES cryptography algorithms on MIPS processor and dependency among themselves are explained in detail with the help of architecture. Clock gating technique is used to reduce the power consumption in MIPS crypto processor. This approach results in processor that meets power consumption and performance specification for security applications. Proposed design Implementation concludes higher system performance and reducing gate propagation delay while reducing operating power consumption. The purpose this processor is to find the maximum clock frequency and adjusted setup and hold time based on propagation delay for circuits with combinational and sequential gates. Testing results shows that the MIPS crypto processor operates successfully at a working frequency of DES, TDES & AES crypto processor at 218MHz, 209MHz, & 210MHz and a operating bandwidth of 664Mbits/s, 636Mbits/s, and 560Mbits/s.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gautham, P., Parthasarathy, R., Balasubramanian, K.: Low-power pipelined MIPS processor design. In: International Symposium on Integrated Circuit (ISIC 2009), pp. 462–465 (2009)

    Google Scholar 

  2. Zulkifli, Yudhanto, Soetharyo, Adinono: Reduced Stall MIPS architecture using Pre-fetching accelerator. In: IEEE International Conference on Electrical Engineering and Informatics, pp. 611–616. IEEE (August 2009) ISBN: 978-1-4244-4913-2

    Google Scholar 

  3. Ghewari, P.B., Patil, J.K., Chougule, A.B.: Efficient hardware design and implementation of AES cryptosystem. International Journal of Engineering Science and Technology 2(3), 213–219 (2010)

    Google Scholar 

  4. Patterson, D.A., Hennessy, J.L.: Computer Organization and Design, The hardware/Software Interface. Morgan Kaufmann (2005)

    Google Scholar 

  5. Lotfi, P., Salehpour, A.-A., Rahmani, A.-M., Afzali-kusha, A., Navabi, Z.: Dynamic power reduction of stalls in pipelined architecture processors. International Journal of Design, Analysis and Tools for Circuits and Systems 1(1), 9–15 (2011)

    Google Scholar 

  6. Sever, R., Neslin Ismailoglu, A., Tekmen, Y.C., Askar, M.: A high speed ASIC Implementation of the rijndael Algorithm. In: IEEE International Symposium on Circuits and Systems (2004)

    Google Scholar 

  7. Advanced Encryption Standard (AES). Fed. Inf. Process. Syandards Pub. (November 2001)

    Google Scholar 

  8. Balpande, R.S., Keote, R.S.: Design of FPGA based Instruction fetch & decode Module of 32-bit RISC (MIPS) processor. In: International Conference on communication Systems and Network Technologies, pp. 409–413. IEEE (2011) ISBN: 978-0-7695-4437-3

    Google Scholar 

  9. Taherkhani, S., Ever, E., Gemikonakli, O.: Implementation of Non-pipelined and pipelined data encryption standard (DES) using Xilinx Virtex-6 technology. In: 10th IEEE International Conference on Computer and Information Technology (CIT 2010), pp. 1257–1262 (2010)

    Google Scholar 

  10. Navabi, Z.: VHDL: Modular design and synthesis of cores and systems, pp. 283–291. McGrew-Hills (2007) ISBN: 978-0-07-147545-7

    Google Scholar 

  11. Floyd, L.: Digital Fundamental with VHDL, pp. 362–368. Pearson Education (2003) ISBN: 0-13-099527-4

    Google Scholar 

  12. Eslami, Y., Sheikholeslami, A., Glenn Gulak, P., Masui, S., Mukaida, K.: An Area-Efficient Universal Cryptography Processor for Smart Cards. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14(1), 43–56 (2006), doi:10.1109/TVLSI.2005.863188, ISBN: 1063-8210

    Article  Google Scholar 

  13. Askar, M., Egemen, T.: Design and SystemC Implementation of a Crypto Processor for AES and DES Algorithms. In: Information Security & Cryptology Conference with International Participation (ISC Turkey). Bildiriler kitabi Proceedings, pp. 145–149 (December 2007)

    Google Scholar 

  14. Hani, M.K., Wen, H.Y., Paniandi, A.: Design and Implementation of a Private and Public key Crypto Processor for Next-Generation IT Security Applications. Malaysian Journal of Computer Science 19(1), 29–45 (2006)

    Google Scholar 

  15. Sklavos, N.: On the Hardware Implementation Cost of Crypto-Processors Architectures. Information Security Journal: A Global Perspective, 53–60 (June 2010), doi:10.1080/19393551003649016, ISSN: 1939-3555 print/ 1939-3547

    Google Scholar 

  16. Xilinx, ISE Simulator, http://www.xilinx.com/tools/isim.htm

  17. Xilinx, XST Synthesis, http://www.xilinx.com/tools/xst.htm

  18. Xilinx, ISE In-Depth tutorial, pp. 95–120 (June 2009), http://www.xilinx.com/support/documentation/sw_manuals/xilinx11/ise11tut.pdf

  19. Saravanan, P., RenukaDevi, N., Swathi, G.: A High-Throughput ASIC implementation of Configurable Advanced Encryption Standard (AES) Processor. International Journal of Computer Applications Special Issue on “Network Security and Cryptography” 3, 1–6 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Singh, K.P., Parmar, S., Kumar, D. (2013). Design of High Performance MIPS Cryptography Processor. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37949-9_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37948-2

  • Online ISBN: 978-3-642-37949-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics