SlideShare a Scribd company logo
1 of 19
FAULT DETECTION AES
Presented by:
R Sumathi
2nd SEM, M.Tech
VIT , Bangalore
 Introduction
 Related Works
 Proposed System
 Fault Detection Scheme
 Conclusion
Dept.ECE,V.I.T 2
CONTENTS
Dept.ECE 3
INTRODUCTION
 The data encryption is the process of transforming data (plaintext) using an algorithm
called cipher to make it unreadable to anyone except those possessing special
knowledge usually referred to as key.
 The encryption algorithm performs various substitutions and transformations on the
plain text.
 There are two encryption standards namely:
1) Data Encryption Standard (DES)
2) Advanced Encryption Standard (AES)
 The Data Encryption Standard (DES) is a 64-bit cipher where the data are encrypted in 64-bit
blocks using a 56-bit key. The DES algorithm transforms 64-bit input in a series of steps into a
64-bit output. There are two inputs to the encryption function: the plain text to be encrypted
and the key.
Dept.ECE 4
 The algorithm described by AES is a symmetric key algorithm meaning the same key is
used for encrypting and decrypting the data.
 AES is based on the design principle known as substitution permutation network and it is
fast in both software and hardware.
 AES is a modification of Rijndael which has a fixed block size of 128 bits and a key size
of 128,192 or 256 bits.
 It operates an 4x4 column major order matrix of bytes termed the state although some
version of Rijndael have a larger block size have additional columns in the state.
 Most AES transformations are done in a special finite field. In the AES, the cipher text is
generated after 10 rounds where encryption round consists of 4 transformations which are
add round key, sub bytes, shift row and mix column transformation.
Dept.ECE 5
RELATED WORKS
 In , one of the best symmetric security algorithms is used to provide data security in AES.
The pipelined architecture of the AES algorithm increases the throughput of the
algorithm and the pipelined key schedule algorithm increases the speedup.
 In this architecture, instead of passing the output of each round to the next round
directly, a register is used. It avoids the direct contact between two rounds.
 The speed of the AES algorithm is increased by inserting compact and flexible
architecture for Mix Column transform.
 In , a fixed coefficient multiplier for Mix Column operation and an equivalent pipelined
architecture leads to effective utilization of resources and increase in speed.
 The modifications in each round of the AES algorithm in , improved the complexity of
the encryption method and making it complicated for the attacker to predict a pattern in
the algorithm.
Dept.ECE 6
 A high data throughput AES hardware architecture is proposed in by partitioning the 10
rounds into sub blocks of repeated AES modules.
 To provide a complete ten stages of AES, the intermediate buffers are used to separate the
blocks. Using this pipelined architecture scheme, time complexity is reduced to greater
extent.
 In , a simple, linear and cryptanalysis is done on the standard S-Box to take advantage of
high probability occurrences of linear expressions involving plain text bits , cipher text
bits and sub-key bits.
 The Mix Column in could be designed easily using one basic module which imposes one
xtime block, two or three byte-X OR logic and additional data path selector.
 The optimized architecture of data encryption unit,and key schedule unit is applicable to
wireless sensor networks.
 The design and performance testing algorithm is implemented with the help of dynamic
partially reconfigurable FPGA.
Dept.ECE 7
PROPOSED SYSTEM
 AES Algorithm
• The AES Algorithm operates on a 4x4 array of bytes which is called a state.
• The state undergoes four transformations namely Sub Bytes, Shift Rows, Mix
Columns and Add Round Key.
 Sub Bytes and Inverse Sub Bytes
• The first transformation in each round is the bytes substitution called Sub Bytes which
is implemented by 16 S-boxes.
• It is a nonlinear substitution step where each byte is replaced with another according
to the look-up table.
• Each s-box transformation performs multiplicative inversion for numbers OOH-FFH
in GF (28) followed by an affine transformation.
For inverse S-box transformation, the inverse affine transformation takes place first
prior to computing the multiplicative inverse.
The S-box and inverse S-box of the AES is divided in to five blocks and the
predicted parities of these blocks are calculated.
Dept.ECE 8Ciphertext Ciphertext
Overall structure of AES algorithm
Dept.ECE 9
Dept.ECE 10
Transformation in shift rows
 Shift Rows and Inverse Shift Rows
 Shift Rows is a transposition step where each row of the state is shifted cyclically a
certain number of steps to left. For AES, the first row is left unchanged. In the second
row, each byte is shifted one position to the left.
 Inverse shift rows is the inverse process of Shift rows transformation in which the bytes
in the last three rows of the State are cyclically shifted over different numbers of steps to
right.
Dept.ECE 11
Mix Column and its Basic Module
 Mix Column and Inverse Mix Column
In Mix Columns, each entry in the output state is constructed by the multiplication of a
column in the input state with a fixed polynomial over GF .
The Mix column is designed using one basic module, which contains one time block, XOR
logics and data path selector.
Dept.ECE 12
Key Expansion in AES
 AES Key Expansion
Dept.ECE 13
FAULT DETECTION SCHEME
Blocks 1 and 5
Blocks 2 and 4
Dept.ECE 14
Block 3
EJ=Pbl + Pbl
E2=Pb2 + Pb2
E3=Pb3 + Pb3
E4=Pb4 + Pb4
E5=Pb5 + Pb5
Dept.ECE 15
IMPLEMENTATION RESULTS
Delay and Area
The number of LUTs and slices used to design the S-box and inverse S-box is calculated
from the simulation results.
No. of 4 input LUTs No. of slices
LUT based S-box 250 158
LUT based inverse S-box 250 158
Low power S-box 87 46
Low power inverse S-box 84 44
Proposed S-box 71 41
Proposed inverse S-box 69 39
Comparison of LUTs and Slices
Dept.ECE 16
Gate Delay Net Delay Total Delay
Proposed S-box 11.851ns 12.988ns 24.839ns
Proposed inverse S-
box
11.581ns 12.008ns 23.589ns
Gate Delay and Net Delay
FAULTS ERROR COVERAGE
Single fault in S-box 100%
Single fault in inverse S-box 100%
Multiple faults in S-box 99%
Multiple faults in inverse S-box 98%
Error Coverage
Dept.ECE 17
CONCLUSION
In this paper, the 128-bit AES encryption and decryption is designed and synthesized
using verilog codes in ModelSim.
The S-box and inverse S-box in AES has been designed using logic gates. A multiple
bit parity based fault detection scheme for the AES using composite field S-box and inverse
S-box is accessible in order to diagnose the faults in the hardware implementation of S-box
and inverse S-box.
The simulation results of the fault detection based scheme S-box and inverse S-box has
high error coverage when compared to other fault detection schemes.
Dept.ECE 18
REFERENCES
[1] Subashri T, Arunachalam R, Gokul Vinoth Kumar B, and Vaidehi V, "Pipelining
Architecture of AES Encryption and Key Generation with Search Based Memory,"
International journal of VLSI design & Communication Systems (VLSICS), YoU, No.4,
December 2010.
[2] J. Vijaya and M. Rajaram, "High Speed Pipelined AES with Mix Column Transform,"
European Journal of Scientific Research, ISSN 1450-216X Vol.61 No.2 (2011), pp. 255-264.
[3] Priyanka Pimpale, Rohan Rayarikar, Sanket Upadhyay, "Modifications to AES
Algoritlun for Complex Encryption," IJCSNS International Journal of Computer Science
and Network Security, Vol.11 No.1 0, October 2011.
[4] Aluned. H. Sawahneh, "Hardware Design of AES S-box using pipelining structure
over GF((24i)".
Dept.ECE 19

More Related Content

What's hot

Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Amir Masinaei
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)Sam Bowne
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogHardik Manocha
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmRifat Tasnim
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answersprdpgpt
 

What's hot (20)

Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Aes
AesAes
Aes
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Aes
AesAes
Aes
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Renas Rajab Asaad
Renas Rajab AsaadRenas Rajab Asaad
Renas Rajab Asaad
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
Ch05
Ch05Ch05
Ch05
 

Similar to Fault Detection AES

Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignIOSR Journals
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithmiosrjce
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)IISRT
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...ijcsit
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05ijmsr
 
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AESCFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AESidescitation
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...IOSRJECE
 
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...ijceronline
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmTELKOMNIKA JOURNAL
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithmijsrd.com
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Fault Detection AES (20)

Aes
AesAes
Aes
 
Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES Design
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
 
A04660105
A04660105A04660105
A04660105
 
A03530107
A03530107A03530107
A03530107
 
F017364451
F017364451F017364451
F017364451
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AESCFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
 
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
 
icwet1097
icwet1097icwet1097
icwet1097
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Aes
AesAes
Aes
 
11
1111
11
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

Fault Detection AES

  • 1. FAULT DETECTION AES Presented by: R Sumathi 2nd SEM, M.Tech VIT , Bangalore
  • 2.  Introduction  Related Works  Proposed System  Fault Detection Scheme  Conclusion Dept.ECE,V.I.T 2 CONTENTS
  • 3. Dept.ECE 3 INTRODUCTION  The data encryption is the process of transforming data (plaintext) using an algorithm called cipher to make it unreadable to anyone except those possessing special knowledge usually referred to as key.  The encryption algorithm performs various substitutions and transformations on the plain text.  There are two encryption standards namely: 1) Data Encryption Standard (DES) 2) Advanced Encryption Standard (AES)  The Data Encryption Standard (DES) is a 64-bit cipher where the data are encrypted in 64-bit blocks using a 56-bit key. The DES algorithm transforms 64-bit input in a series of steps into a 64-bit output. There are two inputs to the encryption function: the plain text to be encrypted and the key.
  • 4. Dept.ECE 4  The algorithm described by AES is a symmetric key algorithm meaning the same key is used for encrypting and decrypting the data.  AES is based on the design principle known as substitution permutation network and it is fast in both software and hardware.  AES is a modification of Rijndael which has a fixed block size of 128 bits and a key size of 128,192 or 256 bits.  It operates an 4x4 column major order matrix of bytes termed the state although some version of Rijndael have a larger block size have additional columns in the state.  Most AES transformations are done in a special finite field. In the AES, the cipher text is generated after 10 rounds where encryption round consists of 4 transformations which are add round key, sub bytes, shift row and mix column transformation.
  • 5. Dept.ECE 5 RELATED WORKS  In , one of the best symmetric security algorithms is used to provide data security in AES. The pipelined architecture of the AES algorithm increases the throughput of the algorithm and the pipelined key schedule algorithm increases the speedup.  In this architecture, instead of passing the output of each round to the next round directly, a register is used. It avoids the direct contact between two rounds.  The speed of the AES algorithm is increased by inserting compact and flexible architecture for Mix Column transform.  In , a fixed coefficient multiplier for Mix Column operation and an equivalent pipelined architecture leads to effective utilization of resources and increase in speed.  The modifications in each round of the AES algorithm in , improved the complexity of the encryption method and making it complicated for the attacker to predict a pattern in the algorithm.
  • 6. Dept.ECE 6  A high data throughput AES hardware architecture is proposed in by partitioning the 10 rounds into sub blocks of repeated AES modules.  To provide a complete ten stages of AES, the intermediate buffers are used to separate the blocks. Using this pipelined architecture scheme, time complexity is reduced to greater extent.  In , a simple, linear and cryptanalysis is done on the standard S-Box to take advantage of high probability occurrences of linear expressions involving plain text bits , cipher text bits and sub-key bits.  The Mix Column in could be designed easily using one basic module which imposes one xtime block, two or three byte-X OR logic and additional data path selector.  The optimized architecture of data encryption unit,and key schedule unit is applicable to wireless sensor networks.  The design and performance testing algorithm is implemented with the help of dynamic partially reconfigurable FPGA.
  • 7. Dept.ECE 7 PROPOSED SYSTEM  AES Algorithm • The AES Algorithm operates on a 4x4 array of bytes which is called a state. • The state undergoes four transformations namely Sub Bytes, Shift Rows, Mix Columns and Add Round Key.  Sub Bytes and Inverse Sub Bytes • The first transformation in each round is the bytes substitution called Sub Bytes which is implemented by 16 S-boxes. • It is a nonlinear substitution step where each byte is replaced with another according to the look-up table. • Each s-box transformation performs multiplicative inversion for numbers OOH-FFH in GF (28) followed by an affine transformation. For inverse S-box transformation, the inverse affine transformation takes place first prior to computing the multiplicative inverse. The S-box and inverse S-box of the AES is divided in to five blocks and the predicted parities of these blocks are calculated.
  • 8. Dept.ECE 8Ciphertext Ciphertext Overall structure of AES algorithm
  • 10. Dept.ECE 10 Transformation in shift rows  Shift Rows and Inverse Shift Rows  Shift Rows is a transposition step where each row of the state is shifted cyclically a certain number of steps to left. For AES, the first row is left unchanged. In the second row, each byte is shifted one position to the left.  Inverse shift rows is the inverse process of Shift rows transformation in which the bytes in the last three rows of the State are cyclically shifted over different numbers of steps to right.
  • 11. Dept.ECE 11 Mix Column and its Basic Module  Mix Column and Inverse Mix Column In Mix Columns, each entry in the output state is constructed by the multiplication of a column in the input state with a fixed polynomial over GF . The Mix column is designed using one basic module, which contains one time block, XOR logics and data path selector.
  • 12. Dept.ECE 12 Key Expansion in AES  AES Key Expansion
  • 13. Dept.ECE 13 FAULT DETECTION SCHEME Blocks 1 and 5 Blocks 2 and 4
  • 14. Dept.ECE 14 Block 3 EJ=Pbl + Pbl E2=Pb2 + Pb2 E3=Pb3 + Pb3 E4=Pb4 + Pb4 E5=Pb5 + Pb5
  • 15. Dept.ECE 15 IMPLEMENTATION RESULTS Delay and Area The number of LUTs and slices used to design the S-box and inverse S-box is calculated from the simulation results. No. of 4 input LUTs No. of slices LUT based S-box 250 158 LUT based inverse S-box 250 158 Low power S-box 87 46 Low power inverse S-box 84 44 Proposed S-box 71 41 Proposed inverse S-box 69 39 Comparison of LUTs and Slices
  • 16. Dept.ECE 16 Gate Delay Net Delay Total Delay Proposed S-box 11.851ns 12.988ns 24.839ns Proposed inverse S- box 11.581ns 12.008ns 23.589ns Gate Delay and Net Delay FAULTS ERROR COVERAGE Single fault in S-box 100% Single fault in inverse S-box 100% Multiple faults in S-box 99% Multiple faults in inverse S-box 98% Error Coverage
  • 17. Dept.ECE 17 CONCLUSION In this paper, the 128-bit AES encryption and decryption is designed and synthesized using verilog codes in ModelSim. The S-box and inverse S-box in AES has been designed using logic gates. A multiple bit parity based fault detection scheme for the AES using composite field S-box and inverse S-box is accessible in order to diagnose the faults in the hardware implementation of S-box and inverse S-box. The simulation results of the fault detection based scheme S-box and inverse S-box has high error coverage when compared to other fault detection schemes.
  • 18. Dept.ECE 18 REFERENCES [1] Subashri T, Arunachalam R, Gokul Vinoth Kumar B, and Vaidehi V, "Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory," International journal of VLSI design & Communication Systems (VLSICS), YoU, No.4, December 2010. [2] J. Vijaya and M. Rajaram, "High Speed Pipelined AES with Mix Column Transform," European Journal of Scientific Research, ISSN 1450-216X Vol.61 No.2 (2011), pp. 255-264. [3] Priyanka Pimpale, Rohan Rayarikar, Sanket Upadhyay, "Modifications to AES Algoritlun for Complex Encryption," IJCSNS International Journal of Computer Science and Network Security, Vol.11 No.1 0, October 2011. [4] Aluned. H. Sawahneh, "Hardware Design of AES S-box using pipelining structure over GF((24i)".