Skip to main content

Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System

  • Conference paper
  • First Online:
Computational Intelligence, Communications, and Business Analytics (CICBA 2017)

Abstract

Embedded Systems are becoming integral part of our day to day life. These systems are more common in several automation applications, healthcare, utility systems and personal gadgets. In this age of wireless communication, embedded devices are used with wireless-networking technology for sharing and saving information. The information is exchanged globally and locally. Sensitive information should be secured before exchanging over internet or other networks. Cryptography is effective means for securing information by encryption on sender side and retrieving it by decryption on receiver end. Block ciphers are considered more secure and can be used in the design of secured embedded systems. These systems are highly constraint for area, memory, performance and hardware. Smaller size, low cost sub-systems are required for handling security in embedded applications. Blowfish and Twofish are block ciphers which are developed during NIST Advanced Encryption Standard competition. This paper compares two proven secured block ciphers focused on hardware implementation using VHDL. Hardware design blocks are modeled using hardware description language (VHDL) to meet required constraints of embedded systems design. Time required for encryption- decryption and throughput of the two algorithms are compared.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Swathi, S.V., Lahari, P.M., Thomas, B.A.: Encryption algorithms: a survey. Int. J. Adv. Res. Comput. Sci. Technol. 4(2), 81–88 (2016)

    Google Scholar 

  2. Seth, S.M., Mishra, R.: Comparative analysis of encryption algorithms for data communication. Int. J. Comput. Sci. Technol. 2(2), 292–294 (2011)

    Google Scholar 

  3. Gupta, M.: Security challenges and cryptography in embedded systems. Int. J. Comput. Sci. Technol. 4(1), 656–662 (2015)

    Google Scholar 

  4. Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289–306 (2015)

    Google Scholar 

  5. Koko, S.O.A.L.F.M., Babiker, A.: Comparison of various encryption algorithms and techniques for improving secured data communication. IOSR J. Comput. Eng. 17(1), 62–69 (2015)

    Google Scholar 

  6. Singh, G., Singla, A., Sandha, K.S.: Cryptography algorithm comparison for security enhancement in wireless intrusion detection system. Int. J. Multidiscipl. Res. 1(4), 143–151 (2011)

    Google Scholar 

  7. Masram, R., et al.: Analysis and comparison of symmetric key cryptographic algorithms based on various file features. Int. J. Netw. Secur. Appl. 6(4), 43–52 (2014)

    Google Scholar 

  8. Lagun, A.: Cryptographic strength of a new symmetric block cipher based on Feistel network. Czasopismo Techniczne, 68–80 (2013)

    Google Scholar 

  9. Mushtaque, M.A., et al.: Evaluation of DES, TDES, AES, blowfish and two fish encryption algorithm: based on space complexity. Int. J. Eng. Res. Technol. (IJERT) 3(4), 283–286 (2014)

    Google Scholar 

  10. Singh, S.P., Maini, R.: Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun. 2(1), 125–127 (2011)

    Google Scholar 

  11. Jain, R., Shrivastava, A.: Design and implementation of new encryption algorithm to enhance performance parameters. IOSR J. Comput. Eng. 4(5), 33–39 (2012)

    Article  Google Scholar 

  12. Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994). doi:10.1007/3-540-58108-1_24

    Chapter  Google Scholar 

  13. Rizvi, S.A.M., Hussain, S.Z., Wadhwa, N.: Performance analysis of AES and TwoFish encryption schemes. In: 2011 International Conference on Communication Systems and Network Technologies (CSNT), pp. 76–79. IEEE (2011)

    Google Scholar 

  14. Rane, D.D.: Superiority of Twofish over Blowfish. Int. J. Sci. Res. Manage. 4(11), 4744–4746 (2016)

    Google Scholar 

  15. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-bit Block Cipher, NIST AES proposal, 15 June 1998

    Google Scholar 

  16. Mushtaque, M.A.: Comparative analysis on different parameters of encryption algorithms for information security. Int. J. Comput. Sci. 2(4), 76–82 (2014)

    Google Scholar 

  17. Rani, M., Kumar, D.S.: Analysis on different parameters of encryption algorithms for information security. Int. J. Adv. Res. Comput. Sci. Soft. Eng. 5(8), 104–108 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Irfan A. Landge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Landge, I.A., Mishra, B.K. (2017). Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6427-2_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6426-5

  • Online ISBN: 978-981-10-6427-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics