Multi-symmetric Ciphering System Module Based on Microcontroller

Loading...
Thumbnail Image

Date

2012

Journal Title

Journal ISSN

Volume Title

Type

Article

Publisher

Proceedings of the World Congress on Engineering

Series Info

Proceedings of the World Congress on Engineering;2012 Vol II

Doi

Abstract

It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems, which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, and ATM security system in Banks. All modern security protocols use symmetrickey and public-key algorithms. This contribution presents a ciphering module that surveys several important cryptographic concepts and their relevance to embedded system applications. This study presents a module that includes three different symmetric ciphering algorithms: DES, DES-EC and AES based on microcontroller. Depending on the application and the data type, each user can select the suitable algorithm from the presented module. This study provides a comparison between the regular DES and the presented new DES. A comparison has been conducted for those encryption algorithms at different settings such as the key size, block size, speed, security, and the execution time.

Description

MSA Google Scholar

Keywords

Elliptic Curves, Ciphering System Module, Microcontroller

Citation

[1] “Cracking DES. Secrets of encryption research, wiretap politics and chip design”, Electronic Frontier Foundation, May 1998. [2] Ghada Abdelmouez M., Fathy S. Helail, and Abdellatif A. Elkouny, “New DES based on Elliptic Curves,” World Academy of Science, Engineering and Technology, 63, March 2010. [3] Ghada Abdelmouez M., Fathy S. Helail, and Abdellatif A. Elkouny, “Elliptic Curve Cryptographic based DES Reinforcement,” ICGSTCNIR Journal, Volume 10, Issue 1, December 2010. [4] Paar C, Jan Pelzl, Understanding Cryptography A Textbook for Students and Practitioners , Springer-Verlag Berlin Heidelberg, Germany, pp 70-71, 2010. [5] “Data Encryption Standard (DES)”, FIPS PUB 46-3 Federal Information Processing Standards Publications, U.S. Department of Commerce/National Institute of Standards and Technology, October 25, 1999. [6] H. Darrel, A Menezes., S. Vanstone: Guide to Elliptic Curve Cryptography, Springer- Verlag New York, Inc., 2004. [7] Paar C.: Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems ECC, Worcester Polytechnic Institute, USA, 1999. [8] E. Matthew, The Weierstrass Theory For Elliptic Functions, Department of Mathematics, MACS Herriot Watt University, Edinburgh, The Burn 2007. [9] N. Torri, K. Yokoyama, Elliptic Curve Cryptosystems, Fujtsu Sci. Tech. J. pp. 140-146, December 2002. [10] A. Stuart, Encryption and Security: the Advanced Encryption Standard, EDN, October, 2002. [11] Poettering.AVRAES:TheAESblockcipheronAVRcontrollers,2006. http://point-at-infinity.org/avraes/ [12] S. Wiliam, Cryptography and Network Security Principles and Practices, Fourth Edition, Prentice Hall, November 16, 2005. [13] Hugo Fruehauf , “Encryption Fundamentals,” in Zyfers, October 2001. [14] Thomas Wollinger, Jorge Guajardo, and Christof Paar, “Cryptography in Embedded Systems: An Overview,” Embedded World 2003 Exhibition and Conference, pp. 735-744, Design & Elektronik, Nuernberg, Germany, February 18-20, 2003. [15] Archana Ramachandran, Zhibin Zhou, and Dijiang Huang, Computing Cryptographic Algorithms in Portable and Embedded Devices, in Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE), pages 1-7, 2007. [16] Chung-Chu Chia and Shuenn-Shyang Wang, “Efficient design of an embedded microcontroller for Advanced Encryption Standard,” Proceeding of the 2005 Workshop on Consumer Electronics and Signal Processing (WCEsp 2005). [17] Anton Kargl, Stefan Pyka and Hermann Seuschek, “Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography,” context of the SMEPP project (Secure Middleware for Embedded Peer-to-Peer Systems, FP6 IST-5-033563). [18] Axel Sikora, “Implementing DES/3DES with Atmel FPSLIC,” ATMEL Corporation, Security Application, University of Cooperative Education Loerrach, Germany, 2002. www.atmel.com [19] D. S. Abdul Elminaam, H. M. Abdul Kader, M. M. Hadhoud, Performance Evaluation of Symmetric Encryption Algorithms, Communications of the IBIMA Volume 8, 2009 ISSN: 1943-7765.

Full Text link