Open Access Open Access  Restricted Access Subscription or Fee Access

Improved Cyber Security by Hardware Acceleration of Scalable Encryption Algorithm in OpenSSL

A. Thiruneelakandan, N. Hemavathy


Providing improved Information Security to the rapidly developing Cybernet System has become a vital factor in the present technically networked world. The information security concept has become a more complicated subject when next generation system requirements and real time computation speed are considered. In order to solve these issues, lots of research and development activities are carried out and cryptography has been a very important part of any communication system in the recent years. Cryptographic algorithms fulfil specific information security requirements such as data integrity, confidentiality and authenticity. This work proposes an FPGA-based VLSI Crypto-System, integrating hardware that accelerates the cryptographic algorithms used in the SSL/TLS protocol. SSL v3 and TLS v1 protocol is deployed in the proposed system powered with a Nios-2 soft-core processor. Key cipher functions used in SSL-driven connection is Scalable Encryption Algorithm (SEA). This algorithm is accelerated in the VLSI Crypto-System that is on an Altera Cyclone III FPGA DE2 development board. The experimental results shows that, by hardware acceleration of SEA cryptographic algorithm, the performance of VLSI Crypto-System has increased in terms of speed, optimized area and enhanced strength of network security for the target Cybernet application.


Cryptographic Algorithm, Hardware Accelerator, SSL/TLS Protocol, C to H Compiler, VLSI Crypto – System, Altera Cyclone III FPGA DE2.

Full Text:



Mohamed Khalil-Hani, Vishnu P., Nambiar M., Marsono N., “Hardware Acceleration of OpenSSL cryptographic functionsfor high-performance Internet Security”International Conference on Intelligent Systems, Modelling and Simulation, 2010.

Nambiar V. P., Khalil-Hani M., and Zabidi M. M, “Accelerating the AES encryption function in OpenSSL for embedded systems,” International Journal of Information and Communication Technology, IJCTS 2009, vol. 2, no. 1/2, pp. 83–93.

Khalil-Hani M., Nazrin M., and Hau Y. W., “Implementation of SHA-2 hash function for a digital signature System-on- Chip in FPGA,” in International Conference on Electronic Design, ICED 2000.

Praveen Kumar B., Ezhumalai P., Ramesh P., Dr SankaraGomathi S., Dr.Sakthivel P., “Improving the Performance of a Scalable Encryption Algorithm (SEA) using FPGA”, IJCSNS International Journal of Computer Science and Network Security, Febraury 2010, VOL. 10 No.2.

Maharak C. and Sowanwanichakul B., “Security methods for Web- based applications on embedded system,” 2004 IEEE Region 10 Conference, vol. C, 2004, pp.56–59 Vol. 3.

Colleen E. Garcia, Naval Postgraduate School, Monterey, California, “Regulating nation-state cyber attacks in Counter terrorism operations” – Master Thesis, June 2010.

EkawatHomsirikamol, MarcinRogawski, Kris Gaj, in George Mason University, “Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs” – Master Thesis, 2010.

Jury:Prof. Y.Willems, voorzitter in Katholiekeuniversiteitleuven Kasteelpark, Arenberg 10, B–3001 Heverlee, “Analysis and design of symmetric encryption algorithms” - Master Thesis, May 2007 .

Pravir Chandra, Matt Messier, John Viega, Publisher : O'ReillyPub Date : ISBN : 0-596-00270. Network Security with OpenSSL, June 2002.

Pascal junod, in EcolePolytechnique, Federale De Lausanne, “Statistical Cryptanalysis of Block Ciphers” – Master Thesis, 2005.

Stephen A. Weis in Massachusett Institute of Technology, “New Foundations for Efficient Authentication, Commutative Cryptography, and Private DisjointnessTestinG”, May 2006.

Saar Drimer in University of Cambridge United Kingdom, “Security for volatile FPGAs” – Master Thesis, November 2009.

Wollinger .T, J. Guajardo, C. Paar, “Cryptography in Embedded Systems: An Overview,” in Proc. of the Embedded World 2003 Exhibition and Conference.

William Stallings 3’rd Edition, Publisher: Pearson Education. “Cryptography and Network Security – Principles and Practices”, June 2003.

“Hacking Techniques – High Tech Crime Brief” An Article by Australian Institute of Criminology, 2005.

“2010 Data Breach Investigations Report”, A study conducted by the Verizon Business RISK team in cooperation with the United States Secret Service. and


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.