Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation of XTEA in FPGA to Resolve the Attacks on TEA

M. Manjupriya, S. Senthil Kumar

Abstract


The embedded hardware plays a vital role in the implementations of many cryptographic applications to increase the security with reduced area consumption. The applications based on data communication demands the encryption process for sensitive data transmission from one end to the other end. The software implementation of security algorithms is easy to implement but it lags in its execution speed and performance. Therefore, the hardware implementations are considered to be a good alternative, since they provide additive performance along with low power consumption and less memory. The tiny encryption algorithm TEA is one of the fastest and efficient cryptographic algorithms, which is well suited for many such real time data communications that requires moderate security. An extended tiny encryption algorithm XTEA is a corrected form of TEA which resolves the drawbacks of TEA in real time implementation such as related key and plain text attacks. This paper discusses and analyzes the hardware implementation of XTEA with TEA in FPGA to overcome the above drawbacks associated with it.

Keywords


Encryption, Feistel Block Ciphers, RFID, Round Functions, TEA, XTEA

Full Text:

PDF

References


Manjupriya.M, Senthil Kumar.S, “Comparative Analysis of TEA & XTEA in FPGA”, presented at International Conference on Smart Technologies for Materials, Communication, Controls, Computing and Energy, (ICST 2011), January 05-07, 2011, Paper ICSTCOMM81 (ISBN 978-1-4507-5567-2)

Guy Gognia, Tilman Wolf, Wayne Burleson, Jean-Philippe Diguet, Lilian Bossuet, and Romain Vaslin, “Reconfigurable Hardware for High-Security/High-Performance Embedded Systems:The SAFES Perspective”, in IEEE Transactions On Very Large Scale Integration (VLSI) Systems, vol. 16, No. 2, February 2008

Aaron Garrett, John Hamilton and Gerry Dozier, “A Comparison of Genetic Algorithm Techniques for the Cryptanalysis of TEA”, in International Journal of Intelligent Control and Systems, September 2007

P. Israsena, “Design and Implementation of Low Power Hardware Encryption for Low Cost Secure RFID Using TEA”, in IEEE, 2005, Thailand IC Design Incubator (TIDI) National Electronics and Computer Technology Center (NECTEC) 112 Thailand Science Park, Paholyothin Rd, Pathumtani, Thailand 12120

Issam Damaj, Samer Hamade, and Hassan Diab, ”Efficient Tiny Hardware Cipher under Verilog”, in High Performance Computing & Simulation Conference, 2008

Soren Rinne, Thomas Eisenbarth, and Christof Paar, “Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers”, Horst G¨ortz Institute for IT Security Ruhr University Bochum 44780 Bochum, Germany

Edi Permadi, “The Implementation of Tiny Encryption Algorithm (TEA) on PIC18F4550 microcontroller”, Electrical Engineering 2005, President University


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.