Implementation and comparison of the advanced encryption standard finalist algorithms on tms320c54x

Download
2005
Serter, Ahmet Volkan
Implementation aspects of Advanced Encryption Standard (AES) Contest finalist algorithms (MARS, RC6, RIJNDAEL, SERPENT and TWOFISH) are studied on TMS320C54X processor. The C codes written by Brian Gladman in 1999 are adapted to TMS320C54X and the speed and memory usage values are compared with the adaptation of Karol Gorski and Michal Skalski̕s implementation in 1999. The effects of implementation environment are investigated by comparing the two implementations. The sensitivities of the finalist algorithms to plaintext, key and key length variations together with the possible reasons are studied and scrutinized. Three of the algorithms, MARS, RC6 and RIJNDAEL, are implemented on the same platform by using the assembler language. The results show that assembler implementations are improved with respect to C implementations 13% for MARS, 16-20% for RIJNDAEL and 21-28% for RC6.

Suggestions

Implementation of stanag 428 hf modem software on tms320c54x digital signal processor
Örümlü, Erhan; Baykal, Buyurman; Department of Electrical and Electronics Engineering (2004)
In this research, STANAG 4285 HF modem software is implemented on TMS320C54x fixed point digital signal processor. The software is optimized in order to meet real-time operation requirements. A fractionally spaced least mean square (LMS) decision feedback equalizer (DFE) is employed for the receiver. In order to improve the convergence of the LMS algorithm a multipass technique is utilized. Based on Watterson̕s model, an HF channel simulator is employed for evaluating the performance of the modem. The simul...
Neural network based beamforming for linear and cylindrical array applications
Güreken, Murat; Dural Ünver, Mevlüde Gülbin; Department of Electrical and Electronics Engineering (2009)
In this thesis, a Neural Network (NN) based beamforming algorithm is proposed for real time target tracking problem. The algorithm is performed for two applications, linear and cylindrical arrays. The linear array application is implemented with equispaced omnidirectional sources. The influence of the number of antenna elements and the angular seperation between the incoming signals on the performance of the beamformer in the linear array beamformer is studied, and it is observed that the algorithm improves...
Performance optimization of monopulse tracking radar
Şahin, Mehmet Alper; Leblebicioğlu, Mehmet Kemal; Department of Electrical and Electronics Engineering (2004)
An analysis and simulation tool is developed for optimizing system parameters of the monopulse target tracking radar and observing effects of the system parameters on the performance of the system over different scenarios. A monopulse tracking radar is modeled for measuring the performance of the radar with given parameters, during the thesis studies. The radar model simulates the operation of a Class IA type monopulse automatic tracking radar, which uses a planar phased array. The interacting multiple mode...
Implementing and evaluating the coordination layer andtime-synchronization of a new protocol for industrial communication networks
Turan, Ulaş; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2011)
Currently automation components of large-scale industrial systems are realized with distributed controller devices that use local sensor/actuator events and exchange shared events with communication networks. Fast paced improvement of Ethernet provoked its usage in industrial communication networks. The incompatibility of standard Ethernet protocol with the real-time requirements encouraged industry and academic researchers to provide a resolution for this problem. However, the existing solutions in the lit...
Robust data hidings scheme with turbo codes
Ünal, Barış; Ergül, Rüyal; Department of Electrical and Electronics Engineering (2005)
This study describes the design and implementation of a robust data hiding algorithm which is provided by turbo codes. As the digital technology grows up, it is getting easy to copy and distribute multimedia products without getting legal permission. This has forced researchers to study in digital watermarking areas. Along with watermarking researches, data hiding studies have gained interest in the last decade. Different watermark and data hiding algorithms have been proposed considering different requirem...
Citation Formats
A. V. Serter, “Implementation and comparison of the advanced encryption standard finalist algorithms on tms320c54x,” M.S. - Master of Science, Middle East Technical University, 2005.