In the evaluation phase, each input signal is differential and the WDDL gate calculates its differential output. In the precharge phase, the inputs to the WDDL gate are set at 0. This puts the output of the gate at 0. During the precharge phase, the input vector of the combinatorial logic is set at all 0s. Each individual gate will eventually have all its inputs at 0, evaluate its output to 0, and pass this 0 value to the next gate. One could say that the precharge signal travels over the combinatorial logic as a 0-wave, hence, WDDL. They produce an all-zero output in the precharge phase (clk-signal high) but they produce actual logic when they it is let the differential signal through during the evaluation phase (clk-signal low). Comparing symmetric key algorithms, BF algorithm is fast, more secure with large key size and its chosen as choice of cryptographic algorithm to implement secure ICs against Differential Power Analysis (DPA) attack [10,11] using Wave Dynamic Differential Logic (WDDL). In fig no.3, when clock is precharge mode (high), output is zero for both. When clock is evaluation mode (low), outputs are complemented and worked as XOR and XNOR. # b) Blowfish Algorithm Blowfish is a 64-bit block cipher [1,2] presented by Bruce Schneider and is a suggested replacement for DES (Data Encryption Standard). DES was the standard cryptographic algorithm for more than 19 years, but it is now accepted that its key size is too small for present usage. It has a variable-length key block cipher of up to 448 bits. Although a complex initialization phase is required, the encryption of data is very efficient. It suits applications where the key does not change often. WDDL can be implemented for any logic design. Since the discussion moves around crypto processors, it would be wise to consider a cryptographic algorithm called Blowfish is a fast algorithm [3,8]. # II. # Analysis of Blowfish Algorithm # b) Substitution Boxes (S-boxes) A substitution box (or S-box) is a basic component of symmetric key algorithm used to obscure the relationship between the plaintext and the cipher text In general, an S-box takes some number of input bits, 8_bit, and transforms them into some number of output bits, 32_bit: an 8×32 S-box, implemented as a lookup table [1,3,8] c) Feistel Function Block # d) Modulo 32-bit adder To increase the speed of blowfish adders in this fig no.8 can be operated in parallel. one adder adds Two h-bit residues, X and Y to form their sum S1+2hCout1 .Another one is 3-operand adder that computes "X+Y+m". Note that if m=2n+1, we have h=n+1.It has been reported that if either Cout1 or Cout2 of this addition is '1' then the output is X+Y+m instead of X+Y. However, in the following we illustrate that only if the carry of "X+Y+m" is '1', it is sufficient to select it as the final output [4,9] The sub-key generation unit expands the given 448-bit key into 14 sub-keys and 4 more subkeys are internally generated, each of 32 bits, so that they can be used at different stages in the algorithm. The sub key generation process is designed to preserve the entire entropy of the key and to distribute that entropy uniformly throughout the sub keys. It is also designed to distribute the set of allowed sub keys randomly throughout the domain of possible sub keys. Then bit wise XOR of the P-array and K-array is performed reusing the words from K-array as needed shown in equation no.3. P 1 = P 1 ^ K ? P 14 = P 14 ^ K 14 P 15 = P 15 ^ K 1 ? P 18 = P 18 ^ K 4 - IV. # Results and Discussion Encryption consists of sixteen rounds of operations. Each round-one operation consists of xor, 8-Volume XIII Issue XVII Version I The encryption and decryption modules are integrated in the top level module to obtain the blowfish crypto-processor and the simulation results are analyzed. Blowfish Algorithm is implemented in four forms and compared its performance parameters which are given below in the table no.1 and the modified blowfish is producing better results than the normal blowfish. Analysis is done for blowfish with and without WDDL logic to secure the ICs against DPA attack by the hackers. Comparison of Blowfish, modified Blowfish with and without WDDL logic is given below in the table no.1 and the corresponding bar charts are shown in the fig no.9, 10 and 11 for performance parameters Et, Dt and Tt respectively. Et: Encrypt Time, Dt: Decrypt Time, Tt: Total Time # Conclusion In this paper, an implementation of Blowfish Algorithm is designed using WDDL Logic style. In the implementation bottom-up approach is used. The subkeys generated for a particular key can be used for the encryption of the entire data to be encrypted with that key. The sub keys are given in reverse direction of the decryption data path without changing the design for decryption. The crypto processor has been designed for the key size of 448 bits and plain text of 64 bits. The code for the implementation has been written in Verilog HDL. The functional verification has been done using the ModelSim 5. ![he original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it. It is varied depending on a key this change the detailed operation of the algorithm. As shown in the fig no.1, at the encryption we apply plaintext and key as inputs and it produces ciphertext. At the other end, ciphertext and key are the inputs to decryption and the result is the recovery of original plaintext. It is a symmetric key algorithm.](image-2.png "Introduction") 1![Figure 1 : Symmetric Key Encryption and Decryption](image-3.png "Figure 1 :") 23![Figure 2 : Wddl and/or Gate With Precharge Circuit WDDL logic is a constant power consumption logic which can overcome the DPA attack by the hacker.During the Precharge phase, the normal and complemented outputs of the digital circuit produce equal outputs. Thus the differential power analysis results in zero differential power to not to allow the hacker to gain the information from the hardware integrated circuits. During evaluation phase, it generates actual outputs as per logic with correct key.](image-4.png "Figure 2 :Figure 3 :") ![Figure 4 : Blowfish Encryption](image-5.png "E") 6![Figure 6 : Blowfish Crypto-processor](image-6.png "Figure 6 :") 7![Figure 7 : Function Block Internal Structure Function 'F' is used to create 'confusion' to thwart cryptanalysis based on statistical analysis. 'Confusion' seeks to make the relationship between the statistics of the cipher text and the value of encryption key as complex as possible. One advantage of this model is that the round function F does not have to be invertible, and can be very complex as shown in fig no.7 [1, 3, 8].](image-7.png "Figure 7 :") 8![Figure 8 : Modulo M -bit adder e) Sub-key Generation Unit](image-8.png "Figure 8 :") ![Year bit to 32-bit substitution, 32-bit modulo addition, xor, 32bit modulo addition and swapping of result of Left Encryption (LE) to Right side and Right Encryption (RE) to left side of the data flow as shown in fig no.6. After performing 16 round-one operations right side output[31:0] xored with subkey p16[31:0] and left hand side output[31:0] xored with subkey p17[31:0] and then we get final cipher text[63:0]. Decryption is same as that of encryption except we applied subkeys p0 to p17 in reverse order. Input data is the ciphertext (output of encryption) and then we get the output as Plaintext. Decryption consists of sixteen-round one operation. Each round-one operation consists of xor, 8-bit to 32-bit substitution, 32-bit modulo addition, xor, 32-bit modulo addition and swapping of result of Left Encryption (LE) to Right side and Right Encryption (RE) to left side of the data flow as shown in fig no.7. The input data ciphertext[63:0] performs 16 round-one operations with 16 sub keys(p17 to 2) and then after performing 16 round-one operations right side output[31:0] xored with subkey p1[31:0] and left hand side output[31:0] xored with subkey p0[31:0] and then we get final plaintext.](image-9.png "") 91011![Figure 9 : Bar Chart for Performance parameter Encryption Time of four implementations of Blowfish Algorithm](image-10.png "Figure 9 :Figure 10 :Figure 11 :") ![5 simulation package. The synthesis of the design is done using the Xilinx Web Pack9.2i. Comparison with different implementations has been given in table no.1 and proved that Modified Blowfish with and without WDDL logic yielded the best results in Encryption time, Dectryption time and Total Propagation delay compared to blowfish with and without WDDL logic respectively.](image-11.png "") 1SName of Crypt-Performance parametersNoalgorithmEt(ns)Dt(ns)Tt(ns)1Blowfish98.66398.66399.3952Modified Blowfish70.0870.0871.0673Blowfish with WDDL 107.62107.62112.564Modified Blowfish73.98573.98576.337with WDDL © 2013 Global Journals Inc. (US) © 2013 Global Journals Inc. (US) Global Journal of Computer Science and Technology * A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm MonikaAgrawal PradeepMishra International Journal of Engineering and Advanced Technology (IJEAT) 2249 -8958 1 August 2012 * Study and Performance Analysis of Cryptography Algorithms SPavithra .EMrs Ramadevi International Journal of Advanced Research in Computer Engineering & Technology 1 5 July 2012 * An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm WWalied AliESouror RasheedTaki El-Deen AdelMokhtar -Awady Ahmed Zaghlulmahmoud International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP) 2046-617X 2 1 March 2012 * On Modulo 2n +1 Adder Design THaridimos GiorgosVergos Dimitrakopoulos IEEE * TRANSACTIONS ON COMPUTERS 61 2 FEBRUARY 2012 * Critical Path Based Hardware Acceleration for Cryptosystems ChenLiu RolandoDuarte OmarGranados JieTang ShaoshanLiu JeanAndrian Journal of Information Processing Systems 8 1 2012 JIPS) * GurjeevanSingh AshwaniKumar Singla * Through Put Analysis of Various Encryption Algorithms KSSandha September 2011 2 e3 IJCST * Implementation of digital design flow for DPA secure WDDL crypto processor using blowfish algorithm VKumaraSwamy GPrabhu BBenakop Sandeep The Libyan Arab International Conference on Electrical and Electronic Engineering (LAICEEE-2010) Tripoli, Libya October 23-26, 2010 * Design and Implementation of DPA Resistant Crypto-Processor using Blowfish Algorithm VKumaraSwamy DrPrabhu GBenakop PSandeep International Conference on Advanced Communication and Informatics (ICACI-2009) TPGIT, Vellore, Tamilnadu, India January 11,12, &13th, 2009 * Improved Modulo 2n +1 Adder Design SomayehTimarchi KeivanNavi International Journal of Computer and Information Engineering 2 7 2008 * A Digital Design Flow for Secure Integrated Circuits KrisTiri IeeeMember IngridVerbauwhede SeniorMember IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems 25 7 July 2006 IEEE * A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation KTiri IVerbauwhede Proc. Design, Automation and Test Eur. Conf. (DATE) Design, Automation and Test Eur. Conf. (DATE)Paris, France 2004