Fault Detection Scheme for AES Using Composite FieldAJAL A J
The cipher Rijndael is one of the five finalists of the Advanced Encryption Standard (AES)
The algorithm has been designed by Joan Daemen and Vincent Rijmen
It is a Block cipher.
The hardware implementation with 128-bit blocks and 128-bit keys is presented.
VLSI optimizations of the Rijndael algorithm are discussed and several hardware design modifications and techniques are used, such as memory sharing and parallelism.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
Fault Detection Scheme for AES Using Composite FieldAJAL A J
The cipher Rijndael is one of the five finalists of the Advanced Encryption Standard (AES)
The algorithm has been designed by Joan Daemen and Vincent Rijmen
It is a Block cipher.
The hardware implementation with 128-bit blocks and 128-bit keys is presented.
VLSI optimizations of the Rijndael algorithm are discussed and several hardware design modifications and techniques are used, such as memory sharing and parallelism.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
This design involves the implementation AES 128. Inside top module, enc, dec and key_generation modules are available. Both enc and dec are controlled via respective resets. When enc executes, key_generation runs and further fills the key memory. dec unit on its execution extracts key from the same memory. Working on to test the design with Side Channel Attacks.
AES and DES are two different crypto algorithms having different features. This projects consists of integrating these algorithms to develop a new structure. Here, read and write of text files is employed. Thus, the text files listed should exist in the same folder as the project is in. Implementation is carried in VHDL on Modelsim.
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
AES algorithm has been stated as secure against any attack but increasing fast computing is making hackers to develop the cracks for AES as well. Therefore to further increase the security of AES, i tried to replace Standard static and fixed Substitution Box with a dynamic S Box. Dynamicity is brought with the help of Input key. Static S box is altered using the input key and the new generated s box is used for encryption. Reverse steps goes for Decryption. Presently, working on to test this design against Side Channel attacks and would publish the results here.
Minor Project- AES Implementation in VerilogHardik Manocha
This presentation described about the Minor project I worked on for partial fulfillment of Bachelors Degree in G B Pant Engineering College. Presentation consisted of Advanced Encryption Standard (AES) and its implementation in Verilog. Different steps of the algorithm are presented.
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Inventive Cubic Symmetric Encryption System for Multimediacsandit
Cryptography is a security technique that must be applied in both communication sides to protect
the data during its transmission through the network from all kinds of attack. On the sender
side, the original data will be changed into different symbols or shapes by using a known key;
this is called encryption. On the other communication side, the decryption process will be done
and the data will be returned to its former shape by using the agreed key. The importance of
cryptography is to fulfil the communication security requirements. Real time applications (RTA)
are vulnerable for the moment because of their big size. However, some of the current algorithms
are not really appropriate for use with these kinds of information. In this paper, a novel
symmetric block cipher cryptography algorithm has been illustrated and discussed. The system
uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge
number of combinations that can produce a very strong algorithm and a long key size. Due to
the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared
to the majority of current algorithms, such as DES and AES.
Information and network security 18 modern techniques block ciphersVaibhav Khanna
The block cipher processes fixed-size blocks simultaneously, as opposed to a stream cipher, which encrypts data one bit at a time. Most modern block ciphers are designed to encrypt data in fixed-size blocks of either 64 or 128 bits
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
This paper aims at FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm. The
conventional designs use a separate module for 32 bit byte substitution and 128 bit byte substitution. The 32 bit
byte substitution is used in round key generation and the 128 bit byte substitution is used in the rounds. This
report presents a modified architecture of 128 bit byte substitution module using a single 32 bit byte substitution
module to reduce area.The AES encryption and decryption algorithm were designed using Verilog HDL. The
functionality of the modules were checked using ModelSim. The simulations were carried out in ModelSim and
Quartus II. The algorithm was implemented in FPGA and achieved a 2% reduction in the total logic element
utilization
This design involves the implementation AES 128. Inside top module, enc, dec and key_generation modules are available. Both enc and dec are controlled via respective resets. When enc executes, key_generation runs and further fills the key memory. dec unit on its execution extracts key from the same memory. Working on to test the design with Side Channel Attacks.
AES and DES are two different crypto algorithms having different features. This projects consists of integrating these algorithms to develop a new structure. Here, read and write of text files is employed. Thus, the text files listed should exist in the same folder as the project is in. Implementation is carried in VHDL on Modelsim.
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
AES algorithm has been stated as secure against any attack but increasing fast computing is making hackers to develop the cracks for AES as well. Therefore to further increase the security of AES, i tried to replace Standard static and fixed Substitution Box with a dynamic S Box. Dynamicity is brought with the help of Input key. Static S box is altered using the input key and the new generated s box is used for encryption. Reverse steps goes for Decryption. Presently, working on to test this design against Side Channel attacks and would publish the results here.
Minor Project- AES Implementation in VerilogHardik Manocha
This presentation described about the Minor project I worked on for partial fulfillment of Bachelors Degree in G B Pant Engineering College. Presentation consisted of Advanced Encryption Standard (AES) and its implementation in Verilog. Different steps of the algorithm are presented.
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Inventive Cubic Symmetric Encryption System for Multimediacsandit
Cryptography is a security technique that must be applied in both communication sides to protect
the data during its transmission through the network from all kinds of attack. On the sender
side, the original data will be changed into different symbols or shapes by using a known key;
this is called encryption. On the other communication side, the decryption process will be done
and the data will be returned to its former shape by using the agreed key. The importance of
cryptography is to fulfil the communication security requirements. Real time applications (RTA)
are vulnerable for the moment because of their big size. However, some of the current algorithms
are not really appropriate for use with these kinds of information. In this paper, a novel
symmetric block cipher cryptography algorithm has been illustrated and discussed. The system
uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge
number of combinations that can produce a very strong algorithm and a long key size. Due to
the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared
to the majority of current algorithms, such as DES and AES.
Information and network security 18 modern techniques block ciphersVaibhav Khanna
The block cipher processes fixed-size blocks simultaneously, as opposed to a stream cipher, which encrypts data one bit at a time. Most modern block ciphers are designed to encrypt data in fixed-size blocks of either 64 or 128 bits
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
This paper aims at FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm. The
conventional designs use a separate module for 32 bit byte substitution and 128 bit byte substitution. The 32 bit
byte substitution is used in round key generation and the 128 bit byte substitution is used in the rounds. This
report presents a modified architecture of 128 bit byte substitution module using a single 32 bit byte substitution
module to reduce area.The AES encryption and decryption algorithm were designed using Verilog HDL. The
functionality of the modules were checked using ModelSim. The simulations were carried out in ModelSim and
Quartus II. The algorithm was implemented in FPGA and achieved a 2% reduction in the total logic element
utilization
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemCSCJournals
The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If we can generate this S-Box dynamically, we increase the cryptographic strength of AES cipher system. In this paper we intend to introduce new algorithm that generate S-Box dynamically from cipher key. We describe how S-Box can be generated dynamically from cipher key and finally analyze the results and experiments.
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLidescitation
Advanced Encryption Standard (AES), is an
advancement of Federal Information Processing Standard
(FIPS) which is an initiated Process Standard of NIST. The
AES specifies the Rijndael algorithm, in which a symmetric
block cipher that processes fixed 128 bit data blocks using
cipher keys with different lengths of 128, 192 and 256 bits.
The earliest Rijndael algorithm had the advantage of
combining both data block sizes of 128, 192 and 256 bits with
any key lengths. AES can be programmed in pure hardware
Verilog HDL, Which includes Multiplexer to enhance more
secure to Cipher text. The results indicate that the hardware
implementation proposed in this project is Decrementing
Utilization of resource and power consumption of 113 mW
than other implementation. Using FPGA lead to reliability on
source modulations. This project presents the AES algorithm
with regard to FPGA and Verilog HDL. The software used for
Simulation is ModelSim-Altera 6.3g_p1 (Quartus II 8.1).
Synthesis and implementation of the code is carried out on
Xilinx ISE 13.4 (XC6VCX240T) device is used for hardware
evaluation.
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...iosrjce
This paper presents information on AES Encryption and Decryption for multi processors. In this
paper AES algorithm is used. The AES algorithm is a round based algorithm. The round based algorithm is
used to provide security to the information. In AES algorithm there are different types of keys, they are 128,192
and 256 bits. These bits are used to encrypt and decrypt the information. In this paper 128bits are used. In this
paper the main functional blocks are key generation, encryption and decryption. In order produce a new key sub
byte, rotate word, round constant and add round key operations are used. In order to convert plain text to
cipher message the sub bytes, shift rows, mix column and add round key operations are used. By doing these
operations the cipher information is obtained. This cipher will be given to the decryption and it is the total
reverse process of encryption. After completion of reverse process the outcome is original information.
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...ijceronline
This paper presents a high speed, FPGA implementation of AES Encryption and Decryption (acronym for Advance Encryption Standard, also known as Rijndael Algorithm) in which the different steps of AES is applied in a parallel manner. This implementation can reduce the latency in which the process of implementation is reduced in a drastic manner. The paper deals with a comparison of the normal implementation of steps of AES and the parallel implementation. Inorder to increase the throughput of the AES encryption process the latency of the AES process should be reduced. Among Add Round Key, Sub Bytes, Shift Rows and Mix Columns, Sub Bytes and Mix Columns produce more latency. The execution delay of Mix Columns results in 60 percent of the total latency. Therefore Parallel Mix Columns is used inorder to reduce the latency. In this the block computes one column at a time such that the four columns are executed at the same time rather than each byte executing at a time. In Parallel Sub Bytes, four columns are executed at the same time rather than each byte executing at a time, this reduces the latency. Encryption is the process of encoding information so it cannot be read by hackers. The information is encrypted using algorithms and is converted into unreadable form, called cipher text. The authorized person will decode the information using decryption algorithms. The cryptography algorithms are of three types -symmetric cryptography (using 1 key for encryption/decryption), asymmetric cryptography (using 2 different keys for encryption/decryption), and cryptographic hash functions using no keys (the key is not a separate input but is mixed with the data).
The Journal of MC Square Scientific Research is published by MC Square Publication on the monthly basis. It aims to publish original research papers devoted to wide areas in various disciplines of science and engineering and their applications in industry. This journal is basically devoted to interdisciplinary research in Science, Engineering and Technology, which can improve the technology being used in industry. The real-life problems involve multi-disciplinary knowledge, and thus strong inter-disciplinary approach is the need of the research.
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTIONijcisjournal
This paper proposes a new system of Substitution-Permutation network along with Randomization Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the Substitution- Permutation process. The middletext is transposed based on decimal value of the sub-key generated during the each round. A CBC mode is the best associated with this system.
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text ijcisjournal
This paper proposes a new system of Substitution-Permutation network along with Randomization
Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey
values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the SubstitutionPermutation
process. The middletext is transposed based on decimal value of the sub-key generated during
the each round. A CBC mode is the best associated with this system.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
“Optimized AES Algorithm Core Using FeedBack Architecture”
1. “Optimized AES Algorithm Core Using
FeedBack Architecture”
Chintan Raval1
, Nirav Desai2
1, 2,
Pursuing M.Tech., VLSI, U.V.Patel college of Engineering and Technology, Kherva, Mehsana, India
Chintanraval14@gmail.com, niravdesai712@gmail.com
Abstract—A new Feedback technology based design scheme
of the AES-128 (Advanced Encryption Standard, with 128-
bit key) encryption algorithm is proposed in this paper. For
maintaining the speed of encryption, the Feedback
technology is applied and the mode of data transmission is
modified in this design so that the chip size can be reduced.
The 128-bit plaintext and the 128- bit initial key, as well as
the 128-bit output of cipher text, are all divided into four 32-
bit consecutive units respectively controlled by the clock.
This new program can significantly decrease quantity of
chip pins and effectively optimize the area of chip.
KeyWords—Area Optimization, Encryption, Decryption,
Key Generation, PipeLine Arch., FeedBack Arch.
I. INTRODUCTION
The 3DES algorithm has been subjected to more
scrutiny than any other encryption algorithm over a long
period of time and no effective cryptanalytic attack based
on algorithm rather than brute force has been found.
Accordingly there is a high level of confidence that 3DES
is very resistant to cryptanalysis. If security were that
only consideration then 3DES would be an appropriate
choice for a standardized encryption algorithm for
decades to come.
The principle drawback of 3DES is that the
algorithm is relatively sluggish in software. The original
DES was designed for mid 1970s hardware
implementation and does not produce efficient software
code. 3DES which has 3 times as many rounds as DES is
correspondingly slower. A secondary drawback is that
both DES and 3DES use a 64-bit block size. For reasons
of both efficiency and security a larger block size is
desirable.
Just because of these drawbacks, 3DES is not
reasonable candidate for long term use. As a replacement,
NIST in 1997 issued a call for proposals for a new
Advanced Encryption Standard (AES) which should have
security strength equal or better than 3DES and
significantly improved efficiency. In addition to these
general requirements NIST specified that AES must be
symmetric block cipher with a block length of 128 bits
and support for key lengths of 128,192,256 bits.
In first round of evaluation, 15 proposed
algorithms were accepted. In second round 5 were
accepted. NIST completed its evaluation process and
published a final standard (FIPS 197) in November 2001.
NIST selected Rijndael as the proposed AES algorithm.
The two researchers who developed and submitted
Rijndael for the AES are both cryptographers from
Belgium: Dr. Joan Daemen and Dr. Vincent Rijmen.
The choice of platform, software, ASIC or
FPGA, is driven by several aspects, such as algorithm
performance, cost and flexibility. Although ASIC has
highest performance and lowest unit cost, it has no
flexibility at all. While software has the most flexibility
of all, the performance is very low.
II. AES Block Diagram & Description
Figure 1:AES Algorithm Block Diagram
As shown in Fig.1, The algorithm is divided into
three parts. Encryption, Decryption and Key Generation
Parts.
A. Encryption
The Encryption process consist of ten rounds of
transformation. But the input given to the round #1 will
be EX-OR of 128 bits plain text and 128 bit key. Each
round from round #1 to round #9 again consist of four
different transformation internally except 10 round. These
transformation are namely SubBytes, ShiftRows,
MixColumns and AddRound key transformation. The
result of one transformation is given as input to the next
transformation as shown in the figure. Round #10 is
2. slightly different from other rounds in that the
MixCloumns transformation is removed. The output of
each round is fed to the next round as input. Total ten
rounds of transformations produces encrypted output
called cipher text.
B. Decryption
The Decryption process is reverse process of
Encryption and it also consists of ten rounds of
transformation. But the input to round #1 will be EX-OR
of cipher text and key 10. Each round from round #1 to
round #9 again consists of four different transformation
internally except 10 round. These transformations are
namely InvSubBytes, InvShiftRows, InvMixColumns and
InvAddRound key transformation. Round #10 is slightly
different from other rounds in that the InvMixColumns
transformation is removed. Like in Encryption output of
one round is fed as input to the next round. The usage of
keys also reverse in this case i.e. round #1 uses key 9 and
round #2 uses key 8 and so on. Total ten rounds of
transformations produces decrypted output i.e. Plain Text.
C. Key Generation
This part takes a 128 bit key. The 128 bit key is
divided into four words represented in w[0,3]. These four
words are used as it is for encryption initially before
starting of a round and for round 10 of decryption part.
These 4 words are used for producing a new key
represented by w[4,7]. Which is used for round #1 of
encryption and round #9 of decryption. These 4 words
represented by w[4,7] which is key 1, is used for
producing key2 represented by w[8,11]. Like this it will
generate total 40 words i.e. 10 keys.
III. AES Specification
For the AES algorithm, the number of rounds to be
performed during the execution of the algorithm is
dependent on the key size. The number of rounds is
represented by Nr, where Nr = 10 when Nk = 4, Nr = 12
when Nk = 6, and Nr = 14 when Nk = 8. The only Key-
Block-Round combinations that conform to this
standard are given in Fig. 2.
Figure 2: Key-Block-Round Combinations.
A. Key Generation
The AES algorithm takes the cipher key, K, and
performs a Key Expansion routine to generate a key
schedule. The Key Expansion generates a total of Nb
(Nr + 1) words: the algorithm requires an initial set of Nb
words, and each of the Nr rounds require Nb words of
key data. The resulting key schedule consists of a linear
array of 4-byte words, denoted [wi], with I in the range
0≤ I <Nb(Nr + 1).
The key expansion has Temp, Subword(),
Rotword(), Rcon[i],w[i - Nk] stages. The following
example will show its detail.
Cipher Key =
2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f 3c
for Nk = 4, which results in
w0 = 2b7e1516, w1 = 28aed2a6, w2 = abf71588, w3 =
09cf4f3c
Figure 3:Key Generation Example.
B. Encryption (cipher)
The Encryption consists of 4 different
transformation. The individual transformations -
SubBytes(), ShiftRows(), MixColumns(), and
AddRoundKey() process the State and are described in
the following subsections. All Nr rounds are identical
with the exception of the final round, which does not
include the MixColumns()transformation.
1. SubBytes( ).
The SubBytes() transformation is a non-linear byte
substitution that operates independently on each byte of
the State using a substitution table (S-box). This S-box is
invertible, is constructed by composing two
transformations:
The following Figure.4. illustrates the effect of the
SubBytes() function on the state.
Figure 4: Subbytes applies the s-box to each of the state.
2. ShiftRows( ).
In the ShiftRows() transformation, the bytes in
the last three rows of the State are cyclically shifted
over different numbers of bytes (offsets). The first
row,r=0,is not shifted.Specifically, the ShiftRows( )
transformation proceeds as follows:
3. Figure 5 illustrates the ShiftRows()transformation.
Figure 5: Shiftrows cyclically shifts last three rows.
3. MixColumns( ).
The MixColumns() transformation operates on the
State column-by-column, treating each column as a four-
term polynomial as described previously. The columns
are considered as polynomials over GF(2
8
) and multiplied
modulo x
4
+ 1 with a fixed polynomial a(x), given by
a(x)={03}x3
+{01}x2
+{01}x+{02}.
Let,
S’(x) = a(x) XOR s(x).
As a result of this multiplication, the four bytes in a
column are placed by the following:
Figure 6: MixColumns operates on state column by column.
4. AddRoundKey( ).
In the AddRoundKey() transformation, a Round
Key is added to the State by a simple bitwise XOR
operation. Each Round Key consists of Nb words from
the key schedule. Those Nb words are each added into the
columns of the State, such that
The action of this transformation is illustrated in Fig. 7,
where l = round * Nb.
Figure 7: Addroundkey XORS each column of the state with a word
from the key schedule.
C. Decryption (Inverse Cipher)
The Cipher transformations can be inverted and
then implemented in reverse order to produce a
straightforward Inverse Cipher for the AES algorithm.
The individual transformations used in the Inverse Cipher
-InvShiftRows(), InvSubBytes(), InvMixColumns(),
and InvAddRoundKey() – process the State and are
described in the following subsections.
1. InvShiftRows( ).
InvShiftRows() is the inverse of the ShiftRows()
transformation. The bytes in the last three rows of the
State are cyclically shifted over different numbers of
bytes (offsets). The first row, r = 0, is not shifted. The
bottom three rows are cyclically shifted by Nb -shift(r,
Nb) bytes, where the shift value shift(r,Nb) depends on
the row number, Specifically, the InvShiftRows()
transformation proceeds as follows:
S’r,(c+Shift(r,Nb))mod Nb=sr,c for 0<r<4 and 0≤c<Nb.
Figure 8: InvShiftRows cyclically the last three rows in a state.
2. InvSubBytes( ).
InvSubBytes() is the inverse of the byte substitution
transformation, in which the inverse S-box is applied to
each byte of the State. This is obtained by applying the
inverse of the affine transformation followed by taking
the multiplicative inverse in GF(2
8
).
3. InvMixColumns( ).
InvMixColumns() is the inverse of the
MixColumns() function. InvMixColumns() operates on
the State column-by-column, treating each column as a
four-term polynomial. The columns are considered as
polynomials over GF(2
8
) and multiplied modulo x
4
+ 1
with a fixed polynomial a
-1
(x), given by
4. a-1
(x) = {0b}x3
+ {0d}x2
+ {09}x+ {0e}.
4. InvAddRoundKey( ).
It is the same AddRoundKey function of encryption.
IV. ALGORITHM IMPLEMENTATION
A. Implementation of KEY GENERATION Module.
This module takes in 128 bit key and a round
constant as input and generates a new 128 bit key. And
this makes use of S-BOX table to generate a new key.
The following RTL schematic gives the detail of this
entity.
Figure 9: RTL Schematic Entity For KEY Generation Round .
Figure 10: RTL Schematic of internally KEY Generation Round .
Figure 11: OUTPUT result of KEY Generation Unit .
B. Implementation of Encryption Module
The encryption module contains ten round and each
round has four stages namely, SubBytes, ShiftRows,
MixColumns and AddRoundKey except 10th
round which
has MixColumns removed. Here we are combining
SubBytes and ShiftRows into a single stage to reduce
device utilization. The important part at this stage is
implementing s-box. MixColumns and AddRoundKey
transformations and can be implemented directly using
VHDL Behavioral codes.
1. Implementing a Round.
A single round consists of four transformations
namely SubBytes, ShiftRows, MixColumns and
AddRoundKey. First two transformations are combined
into a single component. Hence a single round will have 3
components. The entity defined for a round takes in
128bit key for that particular round and 128bit data which
is either output of a previous round if the round is other
than 1st
round or it would e EX-OR of key and plain text
if it is Round #1. The following RTL schematic is
generated for this entity
Figure 12: RTL schematic for entity defined for a round..
2. Implementing Complete Encryption.
The entity defined for encryption takes in 10 round
keys, plain text and key as inputs and produces a cipher
text as output, all of them having length of 128 bits. The
RTL schematic for this entity is shown below.
Figure 13: RTL schematic of entity defined for encryption .
5. The following RTL schematic is generated for this
implementation.
Figure 14a: RTL schematic for encryption implementation(using
feedback arch).
Figure 14b: RTL schematic for encryption implementation(using
pipeline arch).
Figure 15: OUTPUT result of Encryption Unit(Feedback arch) .
C. Implementation of DECRYPTION module.
The decryption module also contain ten rounds and
each round has four stages namely, InvSubBytes,
InvShiftRows, InvMixColumns and InvAddRoundkey
except 10th
round which has InvMixColumn removed.
The important part at this stage is implementing
INVERSE S-OX. The internal architecture of decryption
module is similar to the Encryption module. The
differences are highlighted below.
1. Implementing Rounds
The architecture of a single round is similar to that of
encryption containing four transformations. Round #10
differs in that InvMixColumns transformation is
removed. The implementation of single round is done in
much the same way as that of encryption round using
VHDL.
Figure 16: RTL Schematic for round Decryption .
2. Implementing Complete Decryption.
The entity defined for decryption takes in 10 round
keys,output of encryption module i.e. cipher text and keys
as inputs and produces a plain text as output, all of them
having length of 128 bits. The RTL schematic for this
entity is shown below.
Figure 17: RTL schematic of entity defined for decryption.
6. V.COMPARISON BASED ON TWO DISTINCT
ARCH.
The following chart compares the previous
Pipeline Architecture and Latest Feedback Architecture.
In which it compares the resources used by these both
Architecture.
Figure 18: No. Of Resources Used By Individual Arch.
Number Of ROM’s used by an individual architecture
Architecture FeedBack PipeLine
Encryption 16 160
Decryption 16 160
Key Generation 04 20
Figure 19: Comparison Of Two Arch.
VI. APPLICATION OF AES ALGORITHM.
1. For wireless communication devices like PDA’s
multimedia cellular phones AES can apply.
2. It can be used for security of Smart cards, wireless
sensor networks, wireless mesh Networks.
3. AES have high computational efficiency, so as to be
usable in high speed applications, such as broad band
links.
4. AES is very well suited for restricted-space
environments where either encryption or decryption
is implemented. It has very low RAM and ROM
requirements.
5. Web servers that need to handle many encryption
sessions.
6. Any kind application where security is needed for
our current cryptosystems.
CONCLUSION AND FUTURE WORK
To overcome the issue of low efficiency over the
traditional CPU-based implementation of AES, we
proposed a new algorithm for AES method in this paper.
According to our proposal, we designed and implemented
the feedback AES algorithm. Our implementation
achieves up to 10x speedup over the implementation of
AES on a comparable CPU. Our implementation can be
applied for the computer forensics which requires high
speed of data encryption. In the future, we will focus on
efficient implementations of other common symmetric-
key encryption algorithms, such as Blowfish, Serpent and
Twofish. Besides, future work will also include GPU
implementations of hashing and public key
algorithms(e.g. MD5, SHA-1 and RSA) in order to create
a complete cryptographic framework.
REFERENCE
[1]. J. Daemen and V. Rijmen, AES Proposal:Rijndael,
AES Algorithm Submission, September 3, 1999.
http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.p
df.
[2]. J. Daemen and V. Rijmen, The block cipher Rijndael,
Smart Card research and Applications, LNCS 1820,
Springer-Verlag, pp. 288-296.
[3]. Maire McLoone, John V. McCanny:Single-Chip
FPGA Implementation of the advanced encryption
standard algorithm.
www.springerlink.com/index/eajtwybnuw9hhejjh.
[4]. FIPS PUB197, Advanced Encryption Standard
(AES),National Institute of Standards and
Technology, U.S. Department of Commerce,
November 2001.
http://csrc.nist.gov/publications/fips/fips197/fips-197
[5]. Suresh Sharma, T S BSudarshan: Design of an
Efficient Architecture for Advanced Encryption
Standard Algorithm Using Systonic Structure.
http://www.hipc.org/hipc2005/posters/systolic.pdf
0
100
200
300
400
PIPELINE ARCH FEEDBACK ARCH