Project Name: Crypto accelerator

Twofish is a symmetric block cipher which is introduced as a candidate for the new AES (Advanced Encryption Standard). It is a 16-round Feistel Networks made up of four key-dependent 8-by-8 bit S-boxes, a fixed 4-by-4 maximum distance separable matrix over GF(28), a pseudo-Hadamard transform, bitwise rotations, and a carefully designed key schedule. Twofish accepts variable length keys up to 256 keys.
Twofish encrypts on a Pentium Pro at 17.8 clock cycles per byte, and an 8-bit smart card implementation encrypts at 1820 clock cycles per byte. It can be implemented in hardware in 14.000 gates.
Twofish is unpatented and the source code is uncopyrighted.

SHA-1 (Secure Hash Algorithm) produce a 160-bit output called a message digest for input length less than 2^64 bit.The message digest can then be input to the Digital Signature Algorithm(DSA) which verifies and generate the signature for the message. It is called secure because it is computationally infeasible to find a message which corespondent to a given message digest or to find two message which produce same message digest. Any change to a message in the transit will , with a very high probability, result in a different message digest and the signature is fail to verify (FIPS Secure Hash Standard).
SHA-1 is the copyright of National Institute of Standard and Technology(NIST), Computer System Laboratory, US Department of Commerce.
Our goals is to develop a crypto accelerator by adding a SHA-1, a Twofish block cipher and a 1024 bit ALU

Specifications:

Design Stages: Current status

Designing behavioral and structural using VHDL

We have receive the twofish and SHA-1 C-codes and now trying to design the core. We need more people with good C-background to explore the C-codes. The twofish codes are generated bt Mr. Bruce Schneier from The Counterpane Labs and they are free.

Maintainers and Authors :

current members:






Mailing-list: