SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
95
DATA SECURITY USING ADVANCED ENCRYPTION
STANDARD (AES) IN RECONFIGURABLE HARDWARE
FOR SDR BASED WIRELESS SYSTEMS
Sharanagouda N Patil1
, R.M.Vani2
, P.V.Hunagund3
1
Dept. of Applied Electronics, Gulbarga University, India
2
Dept. of USIC, Gulbarga University, India
3
Dept. of Applied Electronics, Gulbarga University, India
ABSTRACT
A software defined radio (SDR) is a radio transmitter/receiver that uses reconfigurable
hardware and software for encoding/decoding, modulation/demodulation, and encrypting/decrypting.
This allows much more power and flexibility when designing any radio system. The AES algorithm
is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of
using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the
official Advanced Encryption Standard (AES) as it is well suited for reconfigurable hardware. The
Advanced Encryption Standard can be programmed in software or built with hardware. However
Field Programmable Gate Arrays (FPGAs) offer a more customized solution. This paper talks of
AES 128 bit block and 128 bit cipher key and is implemented using VHDL as the hardware
description language. Here a new FPGA-based implementation scheme of the AES-128 (Advanced
Encryption Standard, with 128-bit key) encryption algorithm is proposed for software defined radio
applications. This system aims at reduced hardware structure and high throughput. Xilinx - Project
Navigator, ISE 9.1i suite is used for simulation and synthesis.
Keywords: AES, Cipher text, FPGA, SDR, VHDL
I. INTRODUCTION
With ever increasing demand for mobile communication and emergence of many new
systems and standards like 3G and 4G and even many researches are going to develop new wireless
standards. It has become imperative to implement and design a flexible architecture of radio system
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 6, Issue 1, January (2015), pp. 95-100
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2015): 8.9958 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
96
which accommodates the feature of interoperability and multi functionality and operation of the
devices in heterogeneous, variable operating conditions. Different standards of Mobile
communication use different type of hardware circuitry. The existing mobile communication
standards are primarily designed along national standards and not using a common global standard.
So efforts are going on to develop systems which can support multiple mobile communication
standards using same hardware but changing the software / firmware or a combination of both. This
gave rise to Software Defined Radio which is a new technology being developed.
A SDR refers to any reconfigurable or reprogrammable radio system that can show different
functionality with the same hardware. A Software Defined Radio can simply be defined as “ Radio in
which some or all of the physical layer functions are software defined”. The encryption/decryption
functions of the system are defined using higher abstraction levels of HDLs. Today software defined
technology offers advantages such as improvements or enhancements without altering the radio
hardware, terminals that can cope with the unpredictable dynamic characteristics of highly variable
wireless links, efficient use of radio spectrum and power, and many others. The users can use
relatively generic reprogrammable hardware and customize it to their needs by choosing only the
software implementation that fits their specific application [1,2]. The difference between a digital
radio and an SDR is that a digital radio is not reconfigurable. Although a Digital radio has software
running on it; the functionality of the components cannot be changed on air. New technology
insertion is not available.
II. BACKGROUND OF SOFTWARE DEFINED RADIO
One of the first software radios was the US Air Force’s Integrated Communications
Navigation and Identification Avionics (ICNIA) system, which was developed in the late 1970’s.
The system used a DSP based modem that is reprogrammable for different platforms. ICNIA’s
technology has been the foundation for many other military radios. SDR is a radio communication
technology which is capable of being re-programmed or reconfigured. SPEAKeasy is a joint
Department of Defense and industry program initiated to develop a software programmable radio
operating in the range from 2 MHz to 2 GHz, employing waveforms selected from memory or
downloaded from disk or reprogrammed over the air [3]. The improvements in DSP and ADC
technologies facilitated the shift to software defined radios. Modern functions can be implemented in
software with today’s high DSPs and General Purpose Processors (GPPs). The low power
requirements of the processors enable them to be used in hand terminals. The increased dynamic
operating ranges and higher conversion rates of modern ADCs enables digital processing at higher
bands. The improvements in middleware technologies permit software functionality to be
independent of the underlying hardware [4].The General structure of SDR are given below Figure 1.
Figure 1: General Block Diagram of a SDR
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
97
III. BACKGROUND OF AES
The AES algorithm is a symmetric block cipher that can encrypt and decrypt information.
Encryption converts data to an unintelligible form called cipher-text [5]. Decryption of the cipher-
text converts the data back into its original form, which
is called plain-text.
3.1 AES encryption
The AES algorithm operates on a 128-bit block of data and executed Nr - 1 loop times. A
loop is called a round and the number of iterations of a loop, Nr, can be 10, 12 or 14 depending on
the key length. The key length is 128, 192 or 256 bits in length respectively. The first and last rounds
differ from other rounds in that there is an additional AddRoundKey transformation at the beginning
of the first round and no MixCoulmns transformation is performed in the last round. In this paper, we
use the key length of 128 bits (AES-128) as a model for general explanation
3.1.1 SubBytes Transformation
The SubBytes transformation is a non-linear byte substitution, operating on each of the state
bytes independently. The SubBytes transformation is done using a once-pre-calculated substitution
table called S-box. That S-box table contains 256 numbers (from 0 to 255) and their corresponding
resulting values. More details of the method of calculating the S-box table refers to [4]. In this
design, we use a look-up table as shown in Table 1.
This approach avoids complexity of hardware implementation and has the significant
advantage of performing the S-box computation in a single clock cycle, thus reducing the latency.
3.1.2 ShiftRows Transformation
In ShiftRows transformation, the rows of the state are cyclically left shifted over different
offsets. Row 0 is not shifted, row 1 is shifted one byte to the left, row 2 is shifted two bytes to the left
and row 3 is shifted three bytes to the left.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
98
3.1.3 MixColumns Transformation
In MixColumns transformation, the columns of the state are considered as polynomials over
GF (28
) and multiplied by modulo x4
+ 1 with a fixed polynomialc(x), given by: c(x)={03}x3
+
{01}x2
+ {01}x + {02}.
3.1.4 AddRoundKey Transformation
In the AddRoundKey transformation, a Round Key is added to the State - resulted from the
operation of the MixColumns transformation - by a simple bitwise XOR operation. The RoundKey
of each round is derived from the main key using the Key Expansion algorithm [1]. The
encryption/decryption algorithm needs eleven 128-bit RoundKey, which are denoted RoundKey[0]
RoundKey[10] (the first RoundKey [0] is the main key).
3.2 AES decryption
Decryption is a reverse of encryption which inverse round transformations to computes out
the original plaintext of an encrypted cipher-text in reverse order. The round transformation of
decryption uses the functions AddRoundKey, InvMixColumns, InvShiftRows, and InvSubBytes
successively.
3.2.1 AddRoundKey
AddRoundKey is its own inverse function because the XOR function is its own inverse. The
round keys have to be selected in reverse order. The description of the other transformations will be
given as follows.
3.2.2 InvShiftRows Transformation
InvShiftRows exactly functions the same as ShiftRows, only in the opposite direction. The
first row is not shifted, while the second, third and fourth rows are shifted right by one, two and three
bytes respectively.
3.2.3 InvSubBytes transformation
The InvSubBytes transformation is done using a once-pre- calculated substitution table called InvS-
box. That InvS-box table contains 256 numbers (from 0 to 255) and their corresponding values.
InvS-box is presented in Table II.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
99
3.2.4 InvMixColumns Transformation
In the InvMixColumns transformation, the polynomials of degree less than 4 over GF(28
),
which coefficients are the elements in the columns of the state, are multiplied modulo (x4
+ 1) by a
fixed polynomial d(x) = {0B}x3
+ {0D}x2
+ {09}x + {0E}, where {0B}, {0D}; {09}, {0E} denote
hexadecimal values.The implementation of the AES is carried out using VHDL.
IV.AES IMPLEMENTATION USING VHDL
The Figure 2 shows the AES core architecture implemented for Software Defined radio framework.
Figure 2: Architecture of AES core
V. RESULTS
The following results were obtained for individual steps on AES encryption method. The
design has been coded by VHDL. All the results are simulated using Xilinx ISE simulator. The
results of simulating the encryption algorithm from the ISE simulator are shown in Figure.3
a)
b)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
100
c)
d)
Figure 3: Simulation waveforms on Xilinx ISE simulator for different steps of encryption. a) S Box
transformation b) Shift row c) Top byte substitution d) Shift row transformation:
VI. CONCLUSIONS
The Advanced Encryption Standard algorithm is a symmetric block cipher that can process
data blocks of 128 bits through the use of cipher keys with lengths of 128, 192, and 256 bits. An
efficient FPGA implementation of 128 bit block and 128 bit key AES algorithm has been presented
in this paper. This can be used for secure data transmission in various wireless communication
standards without changing the hardware. The proposed design is implemented based on the
iterative approach for cryptographic algorithms. There is a lot of potential applications of SDRs and
in future we will see that a wide array of radio applications like Blue- tooth, WLAN, GPRS, Radar,
WCDMA etc. being implemented by using SDR technology [6].
VII. REFERENCES
1. J. Mitola III. Software Radio Architecture. Wiley-Interscience, 2000
2. B. Bing and N. Jayant. A Cell phone for all Standards.IEEE Spectrum, May 2002.
3. SPEAKeasy web page, http://www.if.afrl.af.mil/div/IFB/techtrans/datasheets/Speakeasy
.html
4. M. W. Oliphant. Radio Interfaces Make the Difference in 3G Cellular Systems. IEEE
Spectrum Magazine, Vol. 37,No. 10, October 2000
5. FIPS 197, “Advanced Encryption Standard (AES)”, November 26, 2001.
6. Online reference, Available: http://www.broadcastpapers.com.
7. Anubhav Gupta and Harish Bansal, “Design of Area Optimized AES Encryption Core Using
Pipelining Technology” International journal of Electronics and Communication Engineering
&Technology (IJECET), Volume 4, Issue 2, 2012, pp. 308 - 314, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.

More Related Content

What's hot

A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Journals
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Publishing House
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionIJCERT
 
Practical Data Communications & Networking for Engineers & Technicians
Practical Data Communications & Networking for Engineers & Technicians Practical Data Communications & Networking for Engineers & Technicians
Practical Data Communications & Networking for Engineers & Technicians Living Online
 
5x7 matrix led display
5x7 matrix led display 5x7 matrix led display
5x7 matrix led display Vatsal N Shah
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...inventy
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationeSAT Publishing House
 
Application of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless SystemApplication of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless Systemijceronline
 
Optimized Layout Design of Priority Encoder using 65nm Technology
Optimized Layout Design of Priority Encoder using 65nm TechnologyOptimized Layout Design of Priority Encoder using 65nm Technology
Optimized Layout Design of Priority Encoder using 65nm TechnologyIJEEE
 
Network Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerNetwork Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerCSCJournals
 
RESUME__SUMER SAILI
RESUME__SUMER SAILIRESUME__SUMER SAILI
RESUME__SUMER SAILISumer Saili
 
IRJET- Digital Pen for Handicapped and Old Age People
IRJET- Digital Pen for Handicapped and Old Age PeopleIRJET- Digital Pen for Handicapped and Old Age People
IRJET- Digital Pen for Handicapped and Old Age PeopleIRJET Journal
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...eSAT Journals
 
Fpga based heart rate monitoring system using gsm
Fpga based heart rate monitoring system using gsmFpga based heart rate monitoring system using gsm
Fpga based heart rate monitoring system using gsmAnuj Arora
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...IRJET Journal
 
Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...eSAT Journals
 

What's hot (19)

A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
 
Practical Data Communications & Networking for Engineers & Technicians
Practical Data Communications & Networking for Engineers & Technicians Practical Data Communications & Networking for Engineers & Technicians
Practical Data Communications & Networking for Engineers & Technicians
 
5x7 matrix led display
5x7 matrix led display 5x7 matrix led display
5x7 matrix led display
 
Am044253258
Am044253258Am044253258
Am044253258
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
 
Application of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless SystemApplication of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless System
 
Optimized Layout Design of Priority Encoder using 65nm Technology
Optimized Layout Design of Priority Encoder using 65nm TechnologyOptimized Layout Design of Priority Encoder using 65nm Technology
Optimized Layout Design of Priority Encoder using 65nm Technology
 
Network Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerNetwork Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC Microcontroller
 
RESUME__SUMER SAILI
RESUME__SUMER SAILIRESUME__SUMER SAILI
RESUME__SUMER SAILI
 
IRJET- Digital Pen for Handicapped and Old Age People
IRJET- Digital Pen for Handicapped and Old Age PeopleIRJET- Digital Pen for Handicapped and Old Age People
IRJET- Digital Pen for Handicapped and Old Age People
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...
 
Fpga based heart rate monitoring system using gsm
Fpga based heart rate monitoring system using gsmFpga based heart rate monitoring system using gsm
Fpga based heart rate monitoring system using gsm
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
 
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
 
Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...
 

Similar to Data security using advanced encryption standard aes in reconfigurable hardware for sdr based wireless systems

IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET Journal
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithmeSAT Journals
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationIRJET Journal
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
Vhdl modeling of the sram module and state machine controller smc module of r...
Vhdl modeling of the sram module and state machine controller smc module of r...Vhdl modeling of the sram module and state machine controller smc module of r...
Vhdl modeling of the sram module and state machine controller smc module of r...IAEME Publication
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET Journal
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3GOptimized architecture for SNOW 3G
Optimized architecture for SNOW 3GIJECEIAES
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences forIAEME Publication
 
Obfuscating dsp circuits via high level transformations
Obfuscating dsp circuits via high level transformationsObfuscating dsp circuits via high level transformations
Obfuscating dsp circuits via high level transformationsjpstudcorner
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image SteganographyIRJET Journal
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...IJNSA Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...IJMTST Journal
 

Similar to Data security using advanced encryption standard aes in reconfigurable hardware for sdr based wireless systems (20)

IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Vhdl modeling of the sram module and state machine controller smc module of r...
Vhdl modeling of the sram module and state machine controller smc module of r...Vhdl modeling of the sram module and state machine controller smc module of r...
Vhdl modeling of the sram module and state machine controller smc module of r...
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
Jy3717961800
Jy3717961800Jy3717961800
Jy3717961800
 
50120130406009 2
50120130406009 250120130406009 2
50120130406009 2
 
A03530107
A03530107A03530107
A03530107
 
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3GOptimized architecture for SNOW 3G
Optimized architecture for SNOW 3G
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
Aes
AesAes
Aes
 
Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences for
 
Obfuscating dsp circuits via high level transformations
Obfuscating dsp circuits via high level transformationsObfuscating dsp circuits via high level transformations
Obfuscating dsp circuits via high level transformations
 
40520130101005
4052013010100540520130101005
40520130101005
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
G04701051058
G04701051058G04701051058
G04701051058
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Data security using advanced encryption standard aes in reconfigurable hardware for sdr based wireless systems

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 95 DATA SECURITY USING ADVANCED ENCRYPTION STANDARD (AES) IN RECONFIGURABLE HARDWARE FOR SDR BASED WIRELESS SYSTEMS Sharanagouda N Patil1 , R.M.Vani2 , P.V.Hunagund3 1 Dept. of Applied Electronics, Gulbarga University, India 2 Dept. of USIC, Gulbarga University, India 3 Dept. of Applied Electronics, Gulbarga University, India ABSTRACT A software defined radio (SDR) is a radio transmitter/receiver that uses reconfigurable hardware and software for encoding/decoding, modulation/demodulation, and encrypting/decrypting. This allows much more power and flexibility when designing any radio system. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) as it is well suited for reconfigurable hardware. The Advanced Encryption Standard can be programmed in software or built with hardware. However Field Programmable Gate Arrays (FPGAs) offer a more customized solution. This paper talks of AES 128 bit block and 128 bit cipher key and is implemented using VHDL as the hardware description language. Here a new FPGA-based implementation scheme of the AES-128 (Advanced Encryption Standard, with 128-bit key) encryption algorithm is proposed for software defined radio applications. This system aims at reduced hardware structure and high throughput. Xilinx - Project Navigator, ISE 9.1i suite is used for simulation and synthesis. Keywords: AES, Cipher text, FPGA, SDR, VHDL I. INTRODUCTION With ever increasing demand for mobile communication and emergence of many new systems and standards like 3G and 4G and even many researches are going to develop new wireless standards. It has become imperative to implement and design a flexible architecture of radio system INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2015): 8.9958 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 96 which accommodates the feature of interoperability and multi functionality and operation of the devices in heterogeneous, variable operating conditions. Different standards of Mobile communication use different type of hardware circuitry. The existing mobile communication standards are primarily designed along national standards and not using a common global standard. So efforts are going on to develop systems which can support multiple mobile communication standards using same hardware but changing the software / firmware or a combination of both. This gave rise to Software Defined Radio which is a new technology being developed. A SDR refers to any reconfigurable or reprogrammable radio system that can show different functionality with the same hardware. A Software Defined Radio can simply be defined as “ Radio in which some or all of the physical layer functions are software defined”. The encryption/decryption functions of the system are defined using higher abstraction levels of HDLs. Today software defined technology offers advantages such as improvements or enhancements without altering the radio hardware, terminals that can cope with the unpredictable dynamic characteristics of highly variable wireless links, efficient use of radio spectrum and power, and many others. The users can use relatively generic reprogrammable hardware and customize it to their needs by choosing only the software implementation that fits their specific application [1,2]. The difference between a digital radio and an SDR is that a digital radio is not reconfigurable. Although a Digital radio has software running on it; the functionality of the components cannot be changed on air. New technology insertion is not available. II. BACKGROUND OF SOFTWARE DEFINED RADIO One of the first software radios was the US Air Force’s Integrated Communications Navigation and Identification Avionics (ICNIA) system, which was developed in the late 1970’s. The system used a DSP based modem that is reprogrammable for different platforms. ICNIA’s technology has been the foundation for many other military radios. SDR is a radio communication technology which is capable of being re-programmed or reconfigured. SPEAKeasy is a joint Department of Defense and industry program initiated to develop a software programmable radio operating in the range from 2 MHz to 2 GHz, employing waveforms selected from memory or downloaded from disk or reprogrammed over the air [3]. The improvements in DSP and ADC technologies facilitated the shift to software defined radios. Modern functions can be implemented in software with today’s high DSPs and General Purpose Processors (GPPs). The low power requirements of the processors enable them to be used in hand terminals. The increased dynamic operating ranges and higher conversion rates of modern ADCs enables digital processing at higher bands. The improvements in middleware technologies permit software functionality to be independent of the underlying hardware [4].The General structure of SDR are given below Figure 1. Figure 1: General Block Diagram of a SDR
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 97 III. BACKGROUND OF AES The AES algorithm is a symmetric block cipher that can encrypt and decrypt information. Encryption converts data to an unintelligible form called cipher-text [5]. Decryption of the cipher- text converts the data back into its original form, which is called plain-text. 3.1 AES encryption The AES algorithm operates on a 128-bit block of data and executed Nr - 1 loop times. A loop is called a round and the number of iterations of a loop, Nr, can be 10, 12 or 14 depending on the key length. The key length is 128, 192 or 256 bits in length respectively. The first and last rounds differ from other rounds in that there is an additional AddRoundKey transformation at the beginning of the first round and no MixCoulmns transformation is performed in the last round. In this paper, we use the key length of 128 bits (AES-128) as a model for general explanation 3.1.1 SubBytes Transformation The SubBytes transformation is a non-linear byte substitution, operating on each of the state bytes independently. The SubBytes transformation is done using a once-pre-calculated substitution table called S-box. That S-box table contains 256 numbers (from 0 to 255) and their corresponding resulting values. More details of the method of calculating the S-box table refers to [4]. In this design, we use a look-up table as shown in Table 1. This approach avoids complexity of hardware implementation and has the significant advantage of performing the S-box computation in a single clock cycle, thus reducing the latency. 3.1.2 ShiftRows Transformation In ShiftRows transformation, the rows of the state are cyclically left shifted over different offsets. Row 0 is not shifted, row 1 is shifted one byte to the left, row 2 is shifted two bytes to the left and row 3 is shifted three bytes to the left.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 98 3.1.3 MixColumns Transformation In MixColumns transformation, the columns of the state are considered as polynomials over GF (28 ) and multiplied by modulo x4 + 1 with a fixed polynomialc(x), given by: c(x)={03}x3 + {01}x2 + {01}x + {02}. 3.1.4 AddRoundKey Transformation In the AddRoundKey transformation, a Round Key is added to the State - resulted from the operation of the MixColumns transformation - by a simple bitwise XOR operation. The RoundKey of each round is derived from the main key using the Key Expansion algorithm [1]. The encryption/decryption algorithm needs eleven 128-bit RoundKey, which are denoted RoundKey[0] RoundKey[10] (the first RoundKey [0] is the main key). 3.2 AES decryption Decryption is a reverse of encryption which inverse round transformations to computes out the original plaintext of an encrypted cipher-text in reverse order. The round transformation of decryption uses the functions AddRoundKey, InvMixColumns, InvShiftRows, and InvSubBytes successively. 3.2.1 AddRoundKey AddRoundKey is its own inverse function because the XOR function is its own inverse. The round keys have to be selected in reverse order. The description of the other transformations will be given as follows. 3.2.2 InvShiftRows Transformation InvShiftRows exactly functions the same as ShiftRows, only in the opposite direction. The first row is not shifted, while the second, third and fourth rows are shifted right by one, two and three bytes respectively. 3.2.3 InvSubBytes transformation The InvSubBytes transformation is done using a once-pre- calculated substitution table called InvS- box. That InvS-box table contains 256 numbers (from 0 to 255) and their corresponding values. InvS-box is presented in Table II.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 99 3.2.4 InvMixColumns Transformation In the InvMixColumns transformation, the polynomials of degree less than 4 over GF(28 ), which coefficients are the elements in the columns of the state, are multiplied modulo (x4 + 1) by a fixed polynomial d(x) = {0B}x3 + {0D}x2 + {09}x + {0E}, where {0B}, {0D}; {09}, {0E} denote hexadecimal values.The implementation of the AES is carried out using VHDL. IV.AES IMPLEMENTATION USING VHDL The Figure 2 shows the AES core architecture implemented for Software Defined radio framework. Figure 2: Architecture of AES core V. RESULTS The following results were obtained for individual steps on AES encryption method. The design has been coded by VHDL. All the results are simulated using Xilinx ISE simulator. The results of simulating the encryption algorithm from the ISE simulator are shown in Figure.3 a) b)
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 100 c) d) Figure 3: Simulation waveforms on Xilinx ISE simulator for different steps of encryption. a) S Box transformation b) Shift row c) Top byte substitution d) Shift row transformation: VI. CONCLUSIONS The Advanced Encryption Standard algorithm is a symmetric block cipher that can process data blocks of 128 bits through the use of cipher keys with lengths of 128, 192, and 256 bits. An efficient FPGA implementation of 128 bit block and 128 bit key AES algorithm has been presented in this paper. This can be used for secure data transmission in various wireless communication standards without changing the hardware. The proposed design is implemented based on the iterative approach for cryptographic algorithms. There is a lot of potential applications of SDRs and in future we will see that a wide array of radio applications like Blue- tooth, WLAN, GPRS, Radar, WCDMA etc. being implemented by using SDR technology [6]. VII. REFERENCES 1. J. Mitola III. Software Radio Architecture. Wiley-Interscience, 2000 2. B. Bing and N. Jayant. A Cell phone for all Standards.IEEE Spectrum, May 2002. 3. SPEAKeasy web page, http://www.if.afrl.af.mil/div/IFB/techtrans/datasheets/Speakeasy .html 4. M. W. Oliphant. Radio Interfaces Make the Difference in 3G Cellular Systems. IEEE Spectrum Magazine, Vol. 37,No. 10, October 2000 5. FIPS 197, “Advanced Encryption Standard (AES)”, November 26, 2001. 6. Online reference, Available: http://www.broadcastpapers.com. 7. Anubhav Gupta and Harish Bansal, “Design of Area Optimized AES Encryption Core Using Pipelining Technology” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2012, pp. 308 - 314, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.