Cryptography With Field Programmable Gate Arrays
Cryptography With Field Programmable Gate Arrays
Abstract: Cryptography is an important process of modern secure communication, and as the need for faster and more
efficient encryption methods grows, hardware-based solutions have become significant. Field-Programmable Gate Arrays
(FPGAs) offer flexible and efficient platform for implementing cryptographic systems and hence a promising solution for
securing modern digital communications like, in Internet of Things and embedded system applications. This paper
discusses the different cryptographic algorithms and how FPGAs are advantageous over other hardware-based security
implementations.
Keywords: Symmetric Key, Asymmetric Key, FPGAs, ASIC, Hardware Based Security.
How to Cite: Reena Kulkarni; Dr. Keerti Kulkarni (2025). Cryptography with Field Programmable Gate Arrays. International
Journal of Innovative Science and Research Technology, 10(2), 356-359.
https://doi.org/10.5281/zenodo.14910222
In most of the electrical and electronic applications, low It has support for three-length keys: 128 bits, 192 bits, or
power and security of data and network have become a 256 bits, with the most commonly used one being 128-bit
significant consideration similar to the performance of the key.
system. Cryptography, which is the art of securing data has It is used for data encryption in storage devices,
led to evolution of modern techniques to ensure integrity, internet browsers, file and disk compression. wireless
confidentiality and authentication of the data being networks, databases, etc.
transmitted [1],[2]. Field-Programmable Gate Arrays
(FPGAs) offer a customizable environment as they are DES (Data Encryption Standard) and Triple DES:
reconfigurable and the allow for rapid modifications without
needing to produce new hardware. In DES, the 64-bit blocks of plaintext are encrypted using
a 56-bit key.
This paper focuses on the various algorithms in Triple DES applies DES thrice in a sequential manner on
cryptography and advantages of using FPGAs over other every plaintext block.
hardware-based implementations for cryptographic Due to small key size DES algorithm is vulnerable to
algorithm. brute-force attacks.
DES algorithms are used in random number generation
II. ALGORITHMS OF CRYPTOGRAPHY and deployed in applications where not-so-strong
encryption is needed.
Cryptographic algorithms provide the foundation for
securing data in terms of Confidentiality, Integrity and RC4 (Rivest Cipher 4):
Authentication of data being transmitted [1]. The algorithms
can be broadly classified into two categories: symmetric-key RC4 is a stream cipher, which uses a variable-length key,
and asymmetric-key algorithms. typically between 40 and 2048 bits.
It was widely used in protocols like SSL/TLS (Secure
The Symmetric–key algorithm [3],[4] rely on use of a Socket Layer/ Transport Layer Security) and WEP (Wired
single key for encryption and decryption. The most common Equivalent Privacy), but is no longer considered secure
algorithms include: due to security vulnerabilities.
DSA is a standard for digital signatures based on the Application-Specific Integrated Circuits (ASICs):
discrete logarithm problem and is used for verifying the ASIC is a specialized integrated circuit (IC) designed
authenticity and integrity of data. for specific applications instead of general-purpose use.
It’s widely used in digital certificates, especially in ASICs differ fundamentally from general integrated circuits
conjunction with the SHA (Secure Hash Algorithm) like microprocessors and memory chips, designed for diverse
family of hash functions (e.g., SHA-1, SHA-2). applications and mass production. The primary objective of
ASICs is to achieve a specific functionality with the highest
ElGamal: possible efficiency, which can be in terms of power
consumption, performance, and cost.
ElGamal encryption is based on the Diffie-Hellman key
exchange protocol. It provides both encryption and digital ASIC is optimized for speed, power, and size, and can
signatures. offer the best performance and efficiency for a given task.
It is used in is used as a part of the free GNU Privacy However, an ASIC is expensive and time-consuming to
Guard Software, late forms of PGP, and different design and manufacture, and it cannot be reprogrammed or
cryptosystems. modified once it is fabricated. ASICs can be broadly
classified into two types: full custom ASICs and semi-custom
The other classification of cryptographic algorithms ASICs.
includes Key exchange, Hashing and Digital Signatures.The
choice of algorithm depends on the specific security ASICs find applications in diverse fields, including
requirements, such as speed, resource availability, and the cryptocurrency mining, telecommunications, consumer
type of attack resistance needed. electronics, automotive systems, AI/ML (Artificial
Intelligence and Machine Learning), medical devices, and
III. IMPLEMENTATION OF financial applications.
CRYPTOGRAPHIC ALGORITHMS
Disadvantages of ASICs:
The cryptographic algorithms can be implemented in While ASICs offer exceptional performance, power
software on a general-purpose hardware or dedicated efficiency, and tailored functionality, they come with several
hardware. The criterion to implement cryptographic disadvantages that make them less suitable for certain
algorithms in software versus hardware depends on several applications. These include:
parameters like, performance, security, flexibility, cost, and
power consumption. High upfront costs for design and fabrication
Lack of flexibility and limited reusability
Software Implementation of Cryptographic Algorithm: Long development time
Software implementation of cryptographic algorithms Risk of obsolescence as technologies evolve
includes writing code to perform the mathematical processes Volume dependence for cost-effectiveness
of cryptographic algorithm, ensuring data confidentiality, Complexity in design and manufacturing
integrity, and authentication [5].
Hence, for applications where flexibility, low-volume
The various considerations in software implementations production, or rapid prototyping is necessary, FPGAs can be
are efficiency, compliance to standards, security, key more appropriate.
A Typical Flow for Implementing Cryptographic FPGA versus ASIC comparison summary
Algorithms on an ASIC Include the Following: Table 1 highlights the major differences between ASICs
and FPGAs, focusing on their suitability for various
Requirement Analysis & Algorithm Selection applications and the trade-offs between performance,
Algorithm Design & Analysis flexibility, cost, and development time.