{"title":"Hardware implementation of the IDEA NXT crypto-algorithm","authors":"Andreea Bozesan, Flavius Opritoiu, M. Vladutiu","doi":"10.1109/SIITME.2013.6743640","DOIUrl":null,"url":null,"abstract":"This paper introduces a novel hardware implementation of the IDEA NXT encryption algorithm resistant to attacks, and proposes a strategy for testing the implementation on an Altera DE2 FPGA. The proposed design is analysed with respect to execution time and throughput, revealing its effectiveness in comparison to conventional approaches. Also, its performance in terms of execution time and throughput is presented by comparison to the DES, IDEA and AES cryptographic algorithms, which have been extensively used in the past few decades, and also to other implementations of the NXT algorithm previously developed. The IDEA NXT crypto-algorithm surfaced only a few years ago and little work was done so far to prove its theoretical strengths or to bring improvements, and that is what this study tries to cover.","PeriodicalId":267846,"journal":{"name":"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIITME.2013.6743640","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper introduces a novel hardware implementation of the IDEA NXT encryption algorithm resistant to attacks, and proposes a strategy for testing the implementation on an Altera DE2 FPGA. The proposed design is analysed with respect to execution time and throughput, revealing its effectiveness in comparison to conventional approaches. Also, its performance in terms of execution time and throughput is presented by comparison to the DES, IDEA and AES cryptographic algorithms, which have been extensively used in the past few decades, and also to other implementations of the NXT algorithm previously developed. The IDEA NXT crypto-algorithm surfaced only a few years ago and little work was done so far to prove its theoretical strengths or to bring improvements, and that is what this study tries to cover.