SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 480
HARDWARE IMPLEMENTATION OF AES ENCRYPTION AND
DECRYPTION FOR LOW AREA & POWER CONSUMPTION
Pritamkumar N. Khose1
, Vrushali G. Raut2
1
Dept. of Electronics and Telecommunications, Sinhgad College of Engineering, Pune, India
2
Dept. of Electronics and Telecommunications, Sinhgad College of Engineering, Pune, India
Abstract
An AES algorithm is implemented on FPGA platform to improve the safety of data in transmission. AES algorithms can be
implemented on FPGA in order to speed data processing and reduce time for key generating. We achieve higher performance by
maintaining standard speed and reliability with low area and power. The 128 bit AES algorithm is implements on a FPGA using
VHDL language with help of Xilinx tool.
Keywords— Advanced Encryption Standard (AES), Field-Programmable Gate Array (FPGA), VHSIC Hardware
Description Language (VHDL)
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
There is increasing need of information data in Computer
Network and Communication Technology. This data is
handled by public networks and it is vulnerable. So
cryptography becomes important for such sensitive data
which should be kept secure and safe against automated
spying or hacking.
AES can be implemented in software or hardware but,
hardware implementation is more suitable for high speed
applications in real time. Main goal AES hardware
implementation is high throughput design and low-area
design work at highest operating frequency. The latter
devotes most efforts to minimize size of the design and
lower the power consumption.
The rest of paper is organized as follows. Section II will
present a brief overview of AES and previously proposed
existing work done. In section III, a proposed work contains
Sbox architecture, Key Expansion module, and AES
encryption & decryption crypto core. Section IV will
provide experimental results of AES encryption and
decryption is compare with previously technique. Finally,
section V will provide the conclusion of our proposed
design.
2. LITERATURE REVIEW
AES was standardized by National Institute of Standards
and Technology (NIST) in 2001 became Federal
Information Processing Standard FIPS-197. Where Rijndael
algorithm by Joan Daeman and Vicent Rijimen was selected
as standard AES algorithm. The AES is private or
symmetric block cipher which uses the same key for
encryption and decryption is more suitable for faster
implementation. The AES is a symmetric key for both
encryption and decryption. AES cryptography algorithm is
capable of encrypting and decrypting block size 128 bit data
using cipher keys of 128, 196 or 256 bits (AES128, AES196
and AES256) [6].
The proposed design has ability to defend against Fault and
glitch attacks with some large area than conventional design.
Also proposed S-box is capable to reduce hardware
resources and defend against glitch attacks [1].AES
algorithm can resist any kinds of password attacks with a
strong practicability in information security and reliability.
So AES is widely adopted for various applications from
high-end computers to low power portable devices.
Numerous AES hardware architecture use in computer
processor, SAN & Wi-Fi network, ATM, cellular phones
and digital video recorders.
3. PROPOSED WORK
AES algorithm is symmetric block cipher that processes the
state arraying from 128 bits data block using a key of 128,
192 or 256 bits length repeatedly. In encryption process
round function consists of four different transformations-
SubBytes, ShiftRows, MixColumns and AddRoundKey but
last round function without MixColumns transformations. A
ShiftRows transformations are truly dependent on state-wise
operation of cyclic row shifting and MixColumns select 4
byte column operation done at simultaneously. Similarly
inverse chipper decryption process round function consists
of four different transformations- InvSubBytes,
InvShiftRows, InvMixColumns and AddRoundKey, but last
round function without InvMixColumns transformations.
Key Expansion or Schedule generation module is a common
unit in AES encryption and decryption core. Key Expansion
used to generate a series of Round Keys from the Cipher
Key. A State is two-dimensional array of 4 x 4 size having
8 bytes consists of four rows contain block length divided
by 32 is presented in hexadecimal format.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 481
Fig. 1: AES standard encryption & decryption Algorithm
3.1 S-box Architecture
S-Box for SubByte and InvSubByte operation is implement
using two method - Conventional BRAM implementation or
combinational logic. Conventional BRAM has all pre-
computed 256 values are stored in a ROM based lookup
table and input byte wired to ROM’s address bus. But
BRAM method suffers from unbreakable delay as fixed
access time for read and write operation and low latency due
to ROM access time To increase throughput parallel
ROMs are leading to large size of chip area requires
high amount of memory. Therefore S-box transformation
through composite field arithmetic is more suitable for low
latency with reduction in area against. A more suitable
second method to implementing S-Box is using
combinational logic. It has advantage like small area
occupancy and pipelined for increased performance in clock
frequency. In this paper S-Box architecture based on
combinational logic is present.
It is computed by multiplicative inverse in GF(28
) followed
by an affine transformation. Where InvSubByte
transformation compute using inverse affine transformation
is applied first then multiplicative inverse as shown in figure
2.
The Affine Transformation (AT) and inverse Affine
Transformation (AT-1
) are computed using following
equation
Fig. 2: SubByte and InvSubByte transformation in Sbox
I
II
Both Sbox and InvSbox transformations have same
multiplicative inversion module. GF multiplication is
compute by decomposing complex GF(28
) to lower order
fields as GF(21
) and GF(22
) also GF((22
)2
). In figure 3
computation of multiplicative inverse in composite
fields cannot be directly applied to GF(28
) multiplication.
Fig. 3: Multiplicative inversion module for S-Box [4]
Addition of GF(24
) elements is compute using simply
bitwise XOR operation. Multiplicative Inversion (X-1
) is
inverse of individual bits compute from larger equation so
that pre-computed value can be used [5]. The Isomorphic
Mapping (ɗ) and Inverse Isomorphic Mapping (ɗ-1
)
composite field are compute using following equation
A GF(24
) Squaring operation compute using below equation
S2 = ɗ3 XOR ɗ2; S1 = ɗ2 XOR ɗ1;
S0 = ɗ3 XOR ɗ1 XOR ɗ0; S3 = ɗ3;
Multiplication with constant (λ) is generate by substitute
irreducible polynomial as shown in below expression.
λ3 = S2 XOR S0; λ1 = S3; λ0 = S2;
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 482
λ2 = S3 XOR S2 XOR S1 XOR S0;
Multiplication of GF(24
) contain addition and
decomposition multiplication operations in GF(22
) as shown
in figure 4. Where
Fig. 4: Hardware implementation of GF(24
) multiplication
Fig. 5: Hardware implementation of GF(22
) multiplication
Multiplication with constant ($) is derived from equation
$1 = q1 XOR q0; $0 = q1;
A figure 5 describe Multiplication of GF(22
) is made only
using through logical AND & XOR gate.
3.2 Key Expansion
Key Expansion routine to perform key scheduling which
generate a series of Round Keys from the cipher key as
shown figure 6. SubWord present in Key Expansion routine
that takes a 4-byte input word gives 4-bytes output word
using Sbox. The RotWord function performs a cyclic
permutation on input word gives cyclic right shifted 4 bytes
output word. Rcon is array of bytes in a word having fixed
logical value having size of 128 bit [2]. A 128 bit Key
register is fixed signal used to temporal storage of cipher
key computed for each round of operation. Here key
expansion module generate 10 number of 128 bit size Partial
key for each round of operation.
Fig. 6: Block diagram of Key Expansion
Fig. 7: Block diagram of AES Encryption
3.3 AES Encryption
AES Encryption has following subsequent steps are:
SubByte, ShiftRows, MixColumns and AddRoundKey as
shown figure 7. In SubBytes transformation is cipher
undergo process of nonlinear byte substitution table (S-box)
that operates on each of the State bytes independently.
ShiftRows transformation is cipher that processes the State
by cyclically right shifting of last three rows in State.
MixColumns is transformation where cipher takes a
columns of State and mixes their data independently gives
one another to produce new columns using GF (28
)
polynomial. AddRoundKey is transformation cipher and
Inverse Cipher is XOR operation with Round Key added to
State.
A FSM controller is used for synchronization purpose where
clock and reset are input of system. A block 128 bit
plaintext input is XOR with partial key repeated for 10 times
uses SubByte, ShiftRows, MixColumns, and AddRoundKey
which generate encoded text. The main purpose of saving
computation period of key expansion operation unnecessary
repeated for same cipher key which enhance throughput of
system by maintain standard frequency.
3.4 AES Decryption
It is inverted operation of encryption is implemented using
reverse order Inverse Cipher in AES algorithm. AES
decryption contain following subsequent steps are:
InvShiftRows, InvSubBytes, InvMixColumns and
AddRoundKey as shown figure 7. InvShiftRows is
transformation is inverse of ShiftRows processes the State
by cyclically left shifting of last three rows in State.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 483
Fig. 8: Block diagram of AES Decryption
InvSubBytes is the inverse of byte substitution
transformation. An inverse S-box obtained by applying the
inverse affine transformation followed by taking
multiplicative inverse in GF(28
) polynomial.
InvMixColumns is the inverse of MixColumns
transformation operates on column-wise operation four term
polynomial and multiplied modulo (X4
+1) with a fixed
polynomial. InvAddRoundKey Transformation is own
inverse AddRoundKey which involves 128 bitwise XOR
operation. InvKeyExpansion module is 128 bit cipher
generate 10 number of 128 bit size Partial key for each
round of operation similar as KeyExpansion. But major
difference is sequence of generated partial key is inverted.
3.5 AES Attack with Analysis
Fault injection attacks based on exploit computational errors
to find cryptographic keys. Attacker requires use of a “fault
model” to device require detailed knowledge of design of
system and a mean to reliably induce faults without
permanently damaging a unit. In AES-base smart card to
induce setup time violations is presented which allowed
predictable fault injection analysis to retrieve a full AES-
128 key [6].
Glitch attack cause due to glitch which define as undesired
transition is occurs before a signal settles to its intended
value. A glitch is create a transient fault that difficult to
troubleshoot in hardwired crypto core. A clock glitches &
power supply glitches are helpful corruption data. Using
proper cascade structure of flip flop within synchronized
system glitch attack reduce dynamical reduced.
4. RESULTS AND COMPARISONS
The experimental results use the Xilinx Spartan 6 FPGA
target device XC6SLX16-3-CSG324. A Xilinx ISE 14.7
tools used for synthesis & implementation of logic also
XPower Analyzer for power estimation. A Xilinx Isim
P.2013 and ModelSim SE 6.3c for testing & verification of
simulation result. A proposed designs of AES encryptor and
decryptor has area utilization as summarized in tables 1 &
table 2 respectively. A table 3 describe Sbox design
compared with previous Sbox designs. Our proposed design
having very low dynamic power consumption with less
number of 4 LUT’s count. It’s seen from table 4 that
proposed design also achieves much higher throughput than
previous AES encryption designs is summarized in detail.
Table 1 Proposed work AES Encryption design utilization
Parameter Encrypt core
Slice Registers 554 3 %
Slice LUTs 3531 38 %
LUT FF 407 11 %
Block RAM 8 25 %
Maximum Frequency 277.369 MHz -
Table 2 Proposed work AES Decryption design utilization
Parameter Decrypt core
Slice Registers 607 3 %
Slice LUTs 3529 38 %
Logic gate 426 11 %
Block RAM 20 62 %
Maximum Frequency 223.157 MHz -
Table 3 Comparisons of Sbox Architecture
Parameter Proposed
Design
[4] [5]
Device XC6SLX16 XC2VP30 XC2VP30
# of Slice 69 40 37
# of 4 LUTs 7 71 66
Max. Delay
(ns)
15.45 15.00 15.6
Total Dynamic
Power (W)
0.020 7.271 9.74
Table 4 Comparisons of proposed Encryptor with existing
design
Paramete
r
Propose
d Design
[1] [2] [3]
Platforms Xilinx
Sparton-
6
XC6SLX
16
Xilinx
Virtex-5
XC5VL5
0
Xilinx
Virtex-2
XC2VP2
0
Altera
APEX2
0K-C
Data path
(bit)
128 32 128 128
Area 554
slices/
3531
LUT
769
slices/
2350
LUT
9028
slices
40960
slices/
895
LUT
Frequency
(MHz)
277.369 100.8 220.7 -
Throughp
ut (Mbps)
200 73.3 28250 1188
5. CONCLUSIONS
This paper gives a design of AES algorithm using pipeline
structure and parallel processing. The proposed design has
ability to defend against glitch attacks without very extra
larger area compare to conventional design. It shows
improvement in area and power consumption compared to
conventional architecture. Whereas using pipeline structure
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 484
for repeated computation it become lower down speed as
well as data rate. But its capable follows as per standard of
AES.
REFERENCES
[1] Z. Yuan, Y. Wang, J. Li, R. Li and W. Zhao, “FPGA
based optimization for masked AES
implementation”, Proc. IEEE 54th International
Midwest Symposium on Circuits and Systems
(MWSCAS), pp.1-4 2011.
[2] Issam Hammad, Kamal El-Sankary, Ezz El-Masry,
"High-Speed AES Encryptor with Efficient Merging
Techniques" Proc. IEEE Embedded Systems Letters,
vol. 2, no. 3, Sept 2010.
[3] Hoang Trang, Nguyen Van Loi, “An efficient FPGA
implementation of the Advanced Encryption
Standard algorithm”, Proc. Computing and
Communication Technologies RIVF International
Conference, pp. 1-4 2012.
[4] Saurabh Kumar, V.K. Sharma, K. K. Mahapatra,
“Low Latency VLSI Architecture of S-box for AES
Encryption”, Proc. International Conference on
Circuits, Power and Computing Technologies, pp.
694-698 2013.
[5] Saurabh Kumar, V.K. Sharma, K. K. Mahapatra, “An
Improved VLSI Architecture of S-box for AES
Encryption”, International Conference on
Communication Systems & Network Technologies,
pp. 2013.
[6] FIPS 197, Advanced Encryption Standard
http://csrc.nist.gov/publications/fips/ fips197/fips-
197.pdf

More Related Content

What's hot

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithmijsrd.com
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
 
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETEnhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETIRJET Journal
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfRamRaja15
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityIRJET Journal
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersIOSR Journals
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...IJECEIAES
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAIOSRJECE
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (19)

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
 
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETEnhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESET
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
 
G04701051058
G04701051058G04701051058
G04701051058
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
 
Renas Rajab Asaad
Renas Rajab AsaadRenas Rajab Asaad
Renas Rajab Asaad
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
G05114043
G05114043G05114043
G05114043
 

Viewers also liked

Hardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite CommunicationsHardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite Communicationspradeepps88
 
ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE MURAT KARADAYI
 
Seafod restaurents in kolkat
Seafod restaurents in kolkatSeafod restaurents in kolkat
Seafod restaurents in kolkatvikram kumar
 
Minimization of redundant internal voltage swing in cmos full adder
Minimization of redundant internal voltage swing in cmos full adderMinimization of redundant internal voltage swing in cmos full adder
Minimization of redundant internal voltage swing in cmos full addereSAT Publishing House
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panelsAnalysis of shading pattern of solar panels
Analysis of shading pattern of solar panelseSAT Publishing House
 
Design and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna withDesign and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna witheSAT Publishing House
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Mike Saunders
 
Evaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association rulesEvaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association ruleseSAT Publishing House
 
Art bank presentation-deposits
Art bank presentation-depositsArt bank presentation-deposits
Art bank presentation-depositsART BANK
 
Determining the rheological properties of asphalt
Determining the rheological properties of asphaltDetermining the rheological properties of asphalt
Determining the rheological properties of asphalteSAT Publishing House
 
Online assignment
Online assignmentOnline assignment
Online assignmentashaarun
 
MentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmailMentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmailcheryl lynne
 
Development services by goigi
Development services  by goigiDevelopment services  by goigi
Development services by goigigoiginivedita
 
Modelling study of jet metal interaction in ld process
Modelling study of jet  metal interaction in ld processModelling study of jet  metal interaction in ld process
Modelling study of jet metal interaction in ld processeSAT Publishing House
 
Benefits of 8003154730
Benefits of 8003154730Benefits of 8003154730
Benefits of 80031547308003154730
 
Art bank presentation-retail_online
Art bank presentation-retail_onlineArt bank presentation-retail_online
Art bank presentation-retail_onlineART BANK
 
June 1 prescription for life
June 1 prescription for lifeJune 1 prescription for life
June 1 prescription for lifeGary Thompson
 
Fern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat ArchitectsFern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat ArchitectsNiwat Architect Co.,ltd.
 

Viewers also liked (20)

Hardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite CommunicationsHardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite Communications
 
ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE
 
Seafod restaurents in kolkat
Seafod restaurents in kolkatSeafod restaurents in kolkat
Seafod restaurents in kolkat
 
Minimization of redundant internal voltage swing in cmos full adder
Minimization of redundant internal voltage swing in cmos full adderMinimization of redundant internal voltage swing in cmos full adder
Minimization of redundant internal voltage swing in cmos full adder
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panelsAnalysis of shading pattern of solar panels
Analysis of shading pattern of solar panels
 
Design and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna withDesign and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna with
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
Evaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association rulesEvaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association rules
 
Art bank presentation-deposits
Art bank presentation-depositsArt bank presentation-deposits
Art bank presentation-deposits
 
Determining the rheological properties of asphalt
Determining the rheological properties of asphaltDetermining the rheological properties of asphalt
Determining the rheological properties of asphalt
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
MentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmailMentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmail
 
Development services by goigi
Development services  by goigiDevelopment services  by goigi
Development services by goigi
 
Modelling study of jet metal interaction in ld process
Modelling study of jet  metal interaction in ld processModelling study of jet  metal interaction in ld process
Modelling study of jet metal interaction in ld process
 
Benefits of 8003154730
Benefits of 8003154730Benefits of 8003154730
Benefits of 8003154730
 
Art bank presentation-retail_online
Art bank presentation-retail_onlineArt bank presentation-retail_online
Art bank presentation-retail_online
 
Prabhuti
PrabhutiPrabhuti
Prabhuti
 
Chapter 5-MATH ITU GUYS
Chapter 5-MATH ITU GUYSChapter 5-MATH ITU GUYS
Chapter 5-MATH ITU GUYS
 
June 1 prescription for life
June 1 prescription for lifeJune 1 prescription for life
June 1 prescription for life
 
Fern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat ArchitectsFern paradise Architect Green House : Niwat Architects
Fern paradise Architect Green House : Niwat Architects
 

Similar to Hardware implementation of aes encryption and decryption for low area & power consumption

Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsAM Publications
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGAVLSICS Design
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternseSAT Journals
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithmijsrd.com
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...CSITiaesprime
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...IOSRJECE
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLidescitation
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
 
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...iosrjce
 

Similar to Hardware implementation of aes encryption and decryption for low area & power consumption (20)

Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic Mathematics
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
 
A03530107
A03530107A03530107
A03530107
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Aes
AesAes
Aes
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
D010321824
D010321824D010321824
D010321824
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
11
1111
11
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
 
icwet1097
icwet1097icwet1097
icwet1097
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Recently uploaded (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Hardware implementation of aes encryption and decryption for low area & power consumption

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 480 HARDWARE IMPLEMENTATION OF AES ENCRYPTION AND DECRYPTION FOR LOW AREA & POWER CONSUMPTION Pritamkumar N. Khose1 , Vrushali G. Raut2 1 Dept. of Electronics and Telecommunications, Sinhgad College of Engineering, Pune, India 2 Dept. of Electronics and Telecommunications, Sinhgad College of Engineering, Pune, India Abstract An AES algorithm is implemented on FPGA platform to improve the safety of data in transmission. AES algorithms can be implemented on FPGA in order to speed data processing and reduce time for key generating. We achieve higher performance by maintaining standard speed and reliability with low area and power. The 128 bit AES algorithm is implements on a FPGA using VHDL language with help of Xilinx tool. Keywords— Advanced Encryption Standard (AES), Field-Programmable Gate Array (FPGA), VHSIC Hardware Description Language (VHDL) --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION There is increasing need of information data in Computer Network and Communication Technology. This data is handled by public networks and it is vulnerable. So cryptography becomes important for such sensitive data which should be kept secure and safe against automated spying or hacking. AES can be implemented in software or hardware but, hardware implementation is more suitable for high speed applications in real time. Main goal AES hardware implementation is high throughput design and low-area design work at highest operating frequency. The latter devotes most efforts to minimize size of the design and lower the power consumption. The rest of paper is organized as follows. Section II will present a brief overview of AES and previously proposed existing work done. In section III, a proposed work contains Sbox architecture, Key Expansion module, and AES encryption & decryption crypto core. Section IV will provide experimental results of AES encryption and decryption is compare with previously technique. Finally, section V will provide the conclusion of our proposed design. 2. LITERATURE REVIEW AES was standardized by National Institute of Standards and Technology (NIST) in 2001 became Federal Information Processing Standard FIPS-197. Where Rijndael algorithm by Joan Daeman and Vicent Rijimen was selected as standard AES algorithm. The AES is private or symmetric block cipher which uses the same key for encryption and decryption is more suitable for faster implementation. The AES is a symmetric key for both encryption and decryption. AES cryptography algorithm is capable of encrypting and decrypting block size 128 bit data using cipher keys of 128, 196 or 256 bits (AES128, AES196 and AES256) [6]. The proposed design has ability to defend against Fault and glitch attacks with some large area than conventional design. Also proposed S-box is capable to reduce hardware resources and defend against glitch attacks [1].AES algorithm can resist any kinds of password attacks with a strong practicability in information security and reliability. So AES is widely adopted for various applications from high-end computers to low power portable devices. Numerous AES hardware architecture use in computer processor, SAN & Wi-Fi network, ATM, cellular phones and digital video recorders. 3. PROPOSED WORK AES algorithm is symmetric block cipher that processes the state arraying from 128 bits data block using a key of 128, 192 or 256 bits length repeatedly. In encryption process round function consists of four different transformations- SubBytes, ShiftRows, MixColumns and AddRoundKey but last round function without MixColumns transformations. A ShiftRows transformations are truly dependent on state-wise operation of cyclic row shifting and MixColumns select 4 byte column operation done at simultaneously. Similarly inverse chipper decryption process round function consists of four different transformations- InvSubBytes, InvShiftRows, InvMixColumns and AddRoundKey, but last round function without InvMixColumns transformations. Key Expansion or Schedule generation module is a common unit in AES encryption and decryption core. Key Expansion used to generate a series of Round Keys from the Cipher Key. A State is two-dimensional array of 4 x 4 size having 8 bytes consists of four rows contain block length divided by 32 is presented in hexadecimal format.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 481 Fig. 1: AES standard encryption & decryption Algorithm 3.1 S-box Architecture S-Box for SubByte and InvSubByte operation is implement using two method - Conventional BRAM implementation or combinational logic. Conventional BRAM has all pre- computed 256 values are stored in a ROM based lookup table and input byte wired to ROM’s address bus. But BRAM method suffers from unbreakable delay as fixed access time for read and write operation and low latency due to ROM access time To increase throughput parallel ROMs are leading to large size of chip area requires high amount of memory. Therefore S-box transformation through composite field arithmetic is more suitable for low latency with reduction in area against. A more suitable second method to implementing S-Box is using combinational logic. It has advantage like small area occupancy and pipelined for increased performance in clock frequency. In this paper S-Box architecture based on combinational logic is present. It is computed by multiplicative inverse in GF(28 ) followed by an affine transformation. Where InvSubByte transformation compute using inverse affine transformation is applied first then multiplicative inverse as shown in figure 2. The Affine Transformation (AT) and inverse Affine Transformation (AT-1 ) are computed using following equation Fig. 2: SubByte and InvSubByte transformation in Sbox I II Both Sbox and InvSbox transformations have same multiplicative inversion module. GF multiplication is compute by decomposing complex GF(28 ) to lower order fields as GF(21 ) and GF(22 ) also GF((22 )2 ). In figure 3 computation of multiplicative inverse in composite fields cannot be directly applied to GF(28 ) multiplication. Fig. 3: Multiplicative inversion module for S-Box [4] Addition of GF(24 ) elements is compute using simply bitwise XOR operation. Multiplicative Inversion (X-1 ) is inverse of individual bits compute from larger equation so that pre-computed value can be used [5]. The Isomorphic Mapping (ɗ) and Inverse Isomorphic Mapping (ɗ-1 ) composite field are compute using following equation A GF(24 ) Squaring operation compute using below equation S2 = ɗ3 XOR ɗ2; S1 = ɗ2 XOR ɗ1; S0 = ɗ3 XOR ɗ1 XOR ɗ0; S3 = ɗ3; Multiplication with constant (λ) is generate by substitute irreducible polynomial as shown in below expression. λ3 = S2 XOR S0; λ1 = S3; λ0 = S2;
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 482 λ2 = S3 XOR S2 XOR S1 XOR S0; Multiplication of GF(24 ) contain addition and decomposition multiplication operations in GF(22 ) as shown in figure 4. Where Fig. 4: Hardware implementation of GF(24 ) multiplication Fig. 5: Hardware implementation of GF(22 ) multiplication Multiplication with constant ($) is derived from equation $1 = q1 XOR q0; $0 = q1; A figure 5 describe Multiplication of GF(22 ) is made only using through logical AND & XOR gate. 3.2 Key Expansion Key Expansion routine to perform key scheduling which generate a series of Round Keys from the cipher key as shown figure 6. SubWord present in Key Expansion routine that takes a 4-byte input word gives 4-bytes output word using Sbox. The RotWord function performs a cyclic permutation on input word gives cyclic right shifted 4 bytes output word. Rcon is array of bytes in a word having fixed logical value having size of 128 bit [2]. A 128 bit Key register is fixed signal used to temporal storage of cipher key computed for each round of operation. Here key expansion module generate 10 number of 128 bit size Partial key for each round of operation. Fig. 6: Block diagram of Key Expansion Fig. 7: Block diagram of AES Encryption 3.3 AES Encryption AES Encryption has following subsequent steps are: SubByte, ShiftRows, MixColumns and AddRoundKey as shown figure 7. In SubBytes transformation is cipher undergo process of nonlinear byte substitution table (S-box) that operates on each of the State bytes independently. ShiftRows transformation is cipher that processes the State by cyclically right shifting of last three rows in State. MixColumns is transformation where cipher takes a columns of State and mixes their data independently gives one another to produce new columns using GF (28 ) polynomial. AddRoundKey is transformation cipher and Inverse Cipher is XOR operation with Round Key added to State. A FSM controller is used for synchronization purpose where clock and reset are input of system. A block 128 bit plaintext input is XOR with partial key repeated for 10 times uses SubByte, ShiftRows, MixColumns, and AddRoundKey which generate encoded text. The main purpose of saving computation period of key expansion operation unnecessary repeated for same cipher key which enhance throughput of system by maintain standard frequency. 3.4 AES Decryption It is inverted operation of encryption is implemented using reverse order Inverse Cipher in AES algorithm. AES decryption contain following subsequent steps are: InvShiftRows, InvSubBytes, InvMixColumns and AddRoundKey as shown figure 7. InvShiftRows is transformation is inverse of ShiftRows processes the State by cyclically left shifting of last three rows in State.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 483 Fig. 8: Block diagram of AES Decryption InvSubBytes is the inverse of byte substitution transformation. An inverse S-box obtained by applying the inverse affine transformation followed by taking multiplicative inverse in GF(28 ) polynomial. InvMixColumns is the inverse of MixColumns transformation operates on column-wise operation four term polynomial and multiplied modulo (X4 +1) with a fixed polynomial. InvAddRoundKey Transformation is own inverse AddRoundKey which involves 128 bitwise XOR operation. InvKeyExpansion module is 128 bit cipher generate 10 number of 128 bit size Partial key for each round of operation similar as KeyExpansion. But major difference is sequence of generated partial key is inverted. 3.5 AES Attack with Analysis Fault injection attacks based on exploit computational errors to find cryptographic keys. Attacker requires use of a “fault model” to device require detailed knowledge of design of system and a mean to reliably induce faults without permanently damaging a unit. In AES-base smart card to induce setup time violations is presented which allowed predictable fault injection analysis to retrieve a full AES- 128 key [6]. Glitch attack cause due to glitch which define as undesired transition is occurs before a signal settles to its intended value. A glitch is create a transient fault that difficult to troubleshoot in hardwired crypto core. A clock glitches & power supply glitches are helpful corruption data. Using proper cascade structure of flip flop within synchronized system glitch attack reduce dynamical reduced. 4. RESULTS AND COMPARISONS The experimental results use the Xilinx Spartan 6 FPGA target device XC6SLX16-3-CSG324. A Xilinx ISE 14.7 tools used for synthesis & implementation of logic also XPower Analyzer for power estimation. A Xilinx Isim P.2013 and ModelSim SE 6.3c for testing & verification of simulation result. A proposed designs of AES encryptor and decryptor has area utilization as summarized in tables 1 & table 2 respectively. A table 3 describe Sbox design compared with previous Sbox designs. Our proposed design having very low dynamic power consumption with less number of 4 LUT’s count. It’s seen from table 4 that proposed design also achieves much higher throughput than previous AES encryption designs is summarized in detail. Table 1 Proposed work AES Encryption design utilization Parameter Encrypt core Slice Registers 554 3 % Slice LUTs 3531 38 % LUT FF 407 11 % Block RAM 8 25 % Maximum Frequency 277.369 MHz - Table 2 Proposed work AES Decryption design utilization Parameter Decrypt core Slice Registers 607 3 % Slice LUTs 3529 38 % Logic gate 426 11 % Block RAM 20 62 % Maximum Frequency 223.157 MHz - Table 3 Comparisons of Sbox Architecture Parameter Proposed Design [4] [5] Device XC6SLX16 XC2VP30 XC2VP30 # of Slice 69 40 37 # of 4 LUTs 7 71 66 Max. Delay (ns) 15.45 15.00 15.6 Total Dynamic Power (W) 0.020 7.271 9.74 Table 4 Comparisons of proposed Encryptor with existing design Paramete r Propose d Design [1] [2] [3] Platforms Xilinx Sparton- 6 XC6SLX 16 Xilinx Virtex-5 XC5VL5 0 Xilinx Virtex-2 XC2VP2 0 Altera APEX2 0K-C Data path (bit) 128 32 128 128 Area 554 slices/ 3531 LUT 769 slices/ 2350 LUT 9028 slices 40960 slices/ 895 LUT Frequency (MHz) 277.369 100.8 220.7 - Throughp ut (Mbps) 200 73.3 28250 1188 5. CONCLUSIONS This paper gives a design of AES algorithm using pipeline structure and parallel processing. The proposed design has ability to defend against glitch attacks without very extra larger area compare to conventional design. It shows improvement in area and power consumption compared to conventional architecture. Whereas using pipeline structure
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 484 for repeated computation it become lower down speed as well as data rate. But its capable follows as per standard of AES. REFERENCES [1] Z. Yuan, Y. Wang, J. Li, R. Li and W. Zhao, “FPGA based optimization for masked AES implementation”, Proc. IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), pp.1-4 2011. [2] Issam Hammad, Kamal El-Sankary, Ezz El-Masry, "High-Speed AES Encryptor with Efficient Merging Techniques" Proc. IEEE Embedded Systems Letters, vol. 2, no. 3, Sept 2010. [3] Hoang Trang, Nguyen Van Loi, “An efficient FPGA implementation of the Advanced Encryption Standard algorithm”, Proc. Computing and Communication Technologies RIVF International Conference, pp. 1-4 2012. [4] Saurabh Kumar, V.K. Sharma, K. K. Mahapatra, “Low Latency VLSI Architecture of S-box for AES Encryption”, Proc. International Conference on Circuits, Power and Computing Technologies, pp. 694-698 2013. [5] Saurabh Kumar, V.K. Sharma, K. K. Mahapatra, “An Improved VLSI Architecture of S-box for AES Encryption”, International Conference on Communication Systems & Network Technologies, pp. 2013. [6] FIPS 197, Advanced Encryption Standard http://csrc.nist.gov/publications/fips/ fips197/fips- 197.pdf