Abstract
Embedded Systems are becoming integral part of our day to day life. These systems are more common in several automation applications, healthcare, utility systems and personal gadgets. In this age of wireless communication, embedded devices are used with wireless-networking technology for sharing and saving information. The information is exchanged globally and locally. Sensitive information should be secured before exchanging over internet or other networks. Cryptography is effective means for securing information by encryption on sender side and retrieving it by decryption on receiver end. Block ciphers are considered more secure and can be used in the design of secured embedded systems. These systems are highly constraint for area, memory, performance and hardware. Smaller size, low cost sub-systems are required for handling security in embedded applications. Blowfish and Twofish are block ciphers which are developed during NIST Advanced Encryption Standard competition. This paper compares two proven secured block ciphers focused on hardware implementation using VHDL. Hardware design blocks are modeled using hardware description language (VHDL) to meet required constraints of embedded systems design. Time required for encryption- decryption and throughput of the two algorithms are compared.
Similar content being viewed by others
References
Swathi, S.V., Lahari, P.M., Thomas, B.A.: Encryption algorithms: a survey. Int. J. Adv. Res. Comput. Sci. Technol. 4(2), 81–88 (2016)
Seth, S.M., Mishra, R.: Comparative analysis of encryption algorithms for data communication. Int. J. Comput. Sci. Technol. 2(2), 292–294 (2011)
Gupta, M.: Security challenges and cryptography in embedded systems. Int. J. Comput. Sci. Technol. 4(1), 656–662 (2015)
Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289–306 (2015)
Koko, S.O.A.L.F.M., Babiker, A.: Comparison of various encryption algorithms and techniques for improving secured data communication. IOSR J. Comput. Eng. 17(1), 62–69 (2015)
Singh, G., Singla, A., Sandha, K.S.: Cryptography algorithm comparison for security enhancement in wireless intrusion detection system. Int. J. Multidiscipl. Res. 1(4), 143–151 (2011)
Masram, R., et al.: Analysis and comparison of symmetric key cryptographic algorithms based on various file features. Int. J. Netw. Secur. Appl. 6(4), 43–52 (2014)
Lagun, A.: Cryptographic strength of a new symmetric block cipher based on Feistel network. Czasopismo Techniczne, 68–80 (2013)
Mushtaque, M.A., et al.: Evaluation of DES, TDES, AES, blowfish and two fish encryption algorithm: based on space complexity. Int. J. Eng. Res. Technol. (IJERT) 3(4), 283–286 (2014)
Singh, S.P., Maini, R.: Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun. 2(1), 125–127 (2011)
Jain, R., Shrivastava, A.: Design and implementation of new encryption algorithm to enhance performance parameters. IOSR J. Comput. Eng. 4(5), 33–39 (2012)
Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994). doi:10.1007/3-540-58108-1_24
Rizvi, S.A.M., Hussain, S.Z., Wadhwa, N.: Performance analysis of AES and TwoFish encryption schemes. In: 2011 International Conference on Communication Systems and Network Technologies (CSNT), pp. 76–79. IEEE (2011)
Rane, D.D.: Superiority of Twofish over Blowfish. Int. J. Sci. Res. Manage. 4(11), 4744–4746 (2016)
Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-bit Block Cipher, NIST AES proposal, 15 June 1998
Mushtaque, M.A.: Comparative analysis on different parameters of encryption algorithms for information security. Int. J. Comput. Sci. 2(4), 76–82 (2014)
Rani, M., Kumar, D.S.: Analysis on different parameters of encryption algorithms for information security. Int. J. Adv. Res. Comput. Sci. Soft. Eng. 5(8), 104–108 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Landge, I.A., Mishra, B.K. (2017). Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_45
Download citation
DOI: https://doi.org/10.1007/978-981-10-6427-2_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6426-5
Online ISBN: 978-981-10-6427-2
eBook Packages: Computer ScienceComputer Science (R0)