SlideShare a Scribd company logo
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
Volume 5, Issue 1, Ver. III (Jan - Feb. 2015), PP 01-11
e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197
www.iosrjournals.org
DOI: 10.9790/4200-05130111 www.iosrjournals.org 1 | Page
Design and Analysis of Parallel AES Encryption and Decryption
Algorithm for Multi Processor Arrays
A.Anusha1
, N.Samba Murthy2
1
PG Student, ECE Department, Gudlavalleru Engineering College, Gudlavalleru, India
2
Assistant Professor, ECE Department, Gudlavalleru Engineering College, Gudlavalleru, India
1
anuece.anu@gmail.com,2
sambanaga009@gmail.com
Abstract: This paper presents information on AES Encryption and Decryption for multi processors. In this
paper AES algorithm is used. The AES algorithm is a round based algorithm. The round based algorithm is
used to provide security to the information. In AES algorithm there are different types of keys, they are 128,192
and 256 bits. These bits are used to encrypt and decrypt the information. In this paper 128bits are used. In this
paper the main functional blocks are key generation, encryption and decryption. In order produce a new key sub
byte, rotate word, round constant and add round key operations are used. In order to convert plain text to
cipher message the sub bytes, shift rows, mix column and add round key operations are used. By doing these
operations the cipher information is obtained. This cipher will be given to the decryption and it is the total
reverse process of encryption. After completion of reverse process the outcome is original information.
Index terms- Advanced Encryption Standards, cipher, multi processor.
I. Introduction
Encryption is the process of converting original message into cipher information by using key. In this
process the information must be in the form of hexadecimal or integer format only. Decryption is the process of
converting cipher information to original information by using same key. In decryption the format of message
must be in Hexadecimal or integer. In this paper the advanced encryption standard algorithm technique uses the
symmetric key that means private key. The main advantage of symmetric key is provide security to the data and
reduces the area also. This types of private keys mainly used in ATM machines and software’s also.
This paper mainly concentrates on developing suitable method for rapid and efficient way to perform
hardware implementation for some applications to provide security to the information. To accomplish high
security for a system the AES technique is used. Most of the users now a day’s using wireless communication
for fast sending and receiving the mails in less time and less cost. When this way of communication is going on,
the unauthorized people who have the intension to know about the conversation will hack the information. The
AES algorithm is used to provide security and hackers cannot hack the data even if they know the key and
algorithm also. In this paper the sub bytes and inv sub bytes operation will be done word wise. By doing these
operations reduce the area and increase the speed of the operation.
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 2 | Page
Fig1. Block Diagram Of AES
There are mainly 3 types of operations in advanced encryption standard algorithm. They are key generation;
encryption and decryption.
II. Key Generation
The key generation processes the data block of fixed size i.e. 128 bits using cipher key length of 128,192
and 256 bits. The number of operations will be depending on number of bits. By using different type of bits it
has some constant rounds of operation. For 128 bits it has 10 rounds of operations. By rounds of operations, it
provides security because by doing this types operation they cannot hack the data. The below table [1] shows the
number of keys and number of rounds for particular bits.
Table 1: key generation
For 128 bits (which we r using here) there are fixed 10 rounds. For getting 10 keys we have to done
some operations. They are sub bytes, rotate word, round constant and add round key operations.
No. of bits 128 bits 192 bits 256 bits
No. of keys 10 keys 12 keys 14 keys
No. of rounds 10 rounds 12 rounds 14 rounds
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 3 | Page
Fig2. Block diagram of key generation
2.1 Sub bytes operation
The sub bytes operations will be done word wise. This is non-linear substitution technique. It works on
every byte of the state independently. By using S-box table, it will operate. The S-box table is developed on 2
transformation techniques. They are
2.1.1 Take the replica of Rijndael’s conditions.
2.1.2 Apply a non-regular technique that is already implemented on Rijndael technique.
The predefined values of substitution table is used here. Every bytes of the state is compared with the value in
the equal positioned value in S-box.
B [1, 1] = S box [b (1, 1)]
Fig 2.1 Sub bytes operation
2.2 Rotate word operatio
Rotate word performs a one byte circular rotate left.
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 4 | Page
Rot word [A8 A7 A6 A5] = [A5 A8 A7 A6]
2.3 Round constant operation
The round constant operation is different for each step.
In the example take either one column or row
07 cf 3f 4c
Then rotate the equation
Cf 3f 4c 07
Now put these values through the AES s-box (component wise)
8a 75 29 c5
This is the operation for round1.Now we need the round constant operation. Add round one to the s-box output
8a 01 = 8b
75 00 = 75
29 00 = 29
C5 00 = c5
This is the operation for round constant 1. These are the operations for key generation.
2.4 Add round key operation
Every byte of the value is directly added with the key. The below figure shows the operation of add
round key
W1
1
W2
1
W3
1
W0
1
W3
W2
W1
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 5 | Page
Fig 2.2 Add round key operation
This is the operation for key 1.Repeat the above steps up to 10 rounds for every round will get one key total 10
keys because this technique using 128bits. For 128 bits it has 10 rounds of operation for each round it will
get one new key.
III. Encryption
It is defined as converting original message to cipher message.
Fig3. Block diagram of Encryption
There are mainly 4 types of operations in encryption. They are
3.1 Sub bytes operation
The sub bytes operations will be done word wise. This is non-linear substitution technique. It works on
every byte of the state independently. By using substitution table it will operate. The substitution table is
developed on 2 transformation techniques. They are
3.1.1 Take the replica of Rijndael’s conditions.
3.1.2 Apply a non-regular technique that is already implemented on Rijndael technique.
W0
11
W0
1
W3
1
W2
1
W1
1
W0
11
Key 1
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 6 | Page
The predefined values of substitution table is used here. Every bytes of the state is compared with the value in
the equal positioned value in s-box.
B [1, 1] = S box [b (1, 1)]
Fig 3.1 sub bytes operation
3.2 Shift rows
The shift rows operations were done with the shifting rows cyclically either right or left.
3.2.1 In first row there is no change.
3.2.2 In second row shift cyclically by one position either left side or right side
3.2.3 In third row shift cyclically by two positions.
3.2.4 In fourth row shift cyclically by three positions.
No change D0 D1 D2 D3 D0 D1 D2 D3
1st
shift D4 D5 D6 D7 D5 D6 D7 D4
2nd
shift D8 D9 D10 D11 D10 D11 D8 D9
3rd
shift D12 D13 D14 D15 D15 D12 D13 D14
3.3 Mix column operation
In mix column operation each column of the state array is considered as a multiplicative term. In mix
column operation the 4*4 matrix is multiplied with the constant matrix. In mix column operation, there are only
9 rounds (1 to 9). There is no 10th round for mix column operation. For 10th
round, the shift rows operation is
directly given to the add round key operation because there is no 10th
round for mix column.
3.4 Add round key operation
Every byte of the value is directly added with the key. The operation between mix column output with key
1 to 9 rounds only.
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 7 | Page
IV. Decryption
It is defined as the converting cipher message to original message. The decryption is the total reverse
operation of the encryption.
Fig4. Block diagram of Decryption
There are mainly 4 types of operations in decryption. They are
4.1 Inv sub bytes operation
The inv sub bytes operations will be done word wise. This is non-linear substitution technique. It works
on every byte of the state independently. It operates by using inverse substitution table. The inverse substitution
table is develops on 2 transformation techniques. They are
4.1.1 Take the replica of Rijndael’s finite field.
4.1.2 Apply a non-regular technique that is already implemented on Rijndael technique.
B [1, 1] = S box [b (1, 1)]
The predefined values of substitution table is used here. Every bytes of the state is compared with the value in
the equal positioned value in the inverse s-box.
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 8 | Page
Fig. 4.1 sub bytes operation
4.2 Inv shift rows operation
The inv shift rows operations were done with the shifting rows cyclically right. The inv shift rows
operation is same as the shift rows operation.
4.2.1 In first row there is no change.
4.2.2 In second row shift cyclically by one position either left side or right.
4.2.3 In third row shift cyclically by two positions.
4.2.4 In fourth row shift cyclically by three positions.
No change D0 D1 D2 D3 D0 D1 D2 D3
1st
shift D4 D5 D6 D7 D5 D6 D7 D4
2nd
shift D8 D9 D10 D11 D10 D11 D8 D9
3rd
shift D12 D13 D14 D15 D15 D12 D13 D14
4.3 Inv mix column operation
In inv mix column operation each column of the state array is considered as a multiplicative term. In
inv mix column operation the 4*4 matrix is multiplied with the constant matrix and we get same dimensional
matrix. In first round there is no inv mix column operation.
4.4 Inv add round key
Every byte of the value is directly added with the key. The key must be in reverse order i.e. 10 to 1 for
decryption
Applications:
1. It is used in online banking.
2. ATM machines and social networking also.
3. It is also used in business purpose also.
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 9 | Page
Fig 2.3 Timing diagram for key generation
After key generation is enabled and reset is high and key load is loaded, then the keys are produced.
Fig 3.2 RTL schematic for Encryption
Fig 3.2 Timing diagram for Encryption
After reset and key generation enabled encryptions starts. As encryption ends, encryption over signal is high
indicating that message is converted into encrypted information
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 10 | Page
Fig 4.2 RTL schematic for Decryption
Fig 4.3 Timing diagram for Decryption
After reset and key generation enabled decryptions starts. As decryption ends, decryption over signal is high
indicating that message is converted into original information
V. Analysis report:
Encryption Decryption
No .of Slices 717 717
No. of flip-flops 682 682
No. of 4 I/p LUT’s 1076 1075
No. of IOB’s 263 263
No. of CLK’s 1 1
Total Delay 5.014ns 5.014ns
Table2. Analysis report for encryption and decryption
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
DOI: 10.9790/4200-05130111 www.iosrjournals.org 11 | Page
VI. Conclusion
Xilinx is very helpful tool for software and hardware. By using this technique we can provide security
to information. By using AES we can reduce the area and reduction of cost will lead to the reduction of overall
production cost and 100% security of data. The future scope of this project is further to extend up to 256 bits
efficiently and successfully by using the same techniques.
Acknowledgement
I am glad to express my deep sense of gratitude to, Mr. N.Samba Murthy, Assistant Professor of
Electronics and Communication Engineering, for his guidance and cooperation in completing this project.
Through this, I want to convey my sincere thanks to him for his inspiring assistance during my project. I express
my heartfelt gratitude and deep indebtedness to the beloved Head of the Department, Dr. M.KAMARAJU, for
his great help and encouragement in completion of my project. I also express my gratitude to our principal Dr.
P.NAGESWARA REDDY, for his encouragement and facilities provided for my project. I thank one and all
who have rendered help to us directly or indirectly in the completion of this work.
References
[1]. Bin Liu and Bevan M. Baas “Parallel AES Encryption Engines for Many-Core Processor Arrays” IEEE Transactions on computer,
VOL. 62, NO. 3, MARCH 2013.
[2]. A. Still maker, “Exploration of Technology Scaling of CMOS Circuits from 180 nm to 22 nm Using PTM Models in HSPICE,
”Technical report, UC Davis, June 2011.
[3]. J. Granado-Criado, M. Vega-Rodriguez, J. Sanchez-Perez, and J. Gomez-Pulido, “A New Methodology to Implement the AES
Algorithm Using Partial and Dynamic Reconfiguration,” Integration, the VLSI J., vol. 43, no. 1, pp. 72-80, 2010.
[4]. S. Gueron, “Intel Advanced Encryption Standard (AES) Instructions Set,” Jan. 2010.
[5]. Z. Yu and B.M. Baas, “A Low-Area Multi-Link Interconnect Architecture for GALS Chip Multiprocessors,” IEEE Trans. Very
Large Scale Integration (VLSI) Systems, vol. 18, no. 5, pp. 750-762, May 2010.
[6]. M. Butler, “AMD Bulldozer Core—A New Approach to Multithreaded Compute Performance for Maximum Efficiency and
Throughput,” Proc. IEEE Hot Chips Symp High-Performance Chips (Hot Chips ’10), Aug. 2010.
Ad

More Related Content

What's hot (15)

System design using HDL - Module 2
System design using HDL - Module 2System design using HDL - Module 2
System design using HDL - Module 2
Aravinda Koithyar
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
CSCJournals
 
Matlab numbers
Matlab numbersMatlab numbers
Matlab numbers
pramodkumar1804
 
Mlp trainning algorithm
Mlp trainning algorithmMlp trainning algorithm
Mlp trainning algorithm
Hưng Đặng
 
Chap12alg
Chap12algChap12alg
Chap12alg
Munkhchimeg
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
IJECEIAES
 
Joining Large data at Scale
Joining Large data at ScaleJoining Large data at Scale
Joining Large data at Scale
Sigmoid
 
Report_NLNN
Report_NLNNReport_NLNN
Report_NLNN
Rishi Metawala
 
Task and Data Parallelism: Real-World Examples
Task and Data Parallelism: Real-World ExamplesTask and Data Parallelism: Real-World Examples
Task and Data Parallelism: Real-World Examples
Sasha Goldshtein
 
New c sharp3_features_(linq)_part_iii
New c sharp3_features_(linq)_part_iiiNew c sharp3_features_(linq)_part_iii
New c sharp3_features_(linq)_part_iii
Nico Ludwig
 
19. Data Structures and Algorithm Complexity
19. Data Structures and Algorithm Complexity19. Data Structures and Algorithm Complexity
19. Data Structures and Algorithm Complexity
Intro C# Book
 
(6) collections algorithms
(6) collections algorithms(6) collections algorithms
(6) collections algorithms
Nico Ludwig
 
02. Data Types and variables
02. Data Types and variables02. Data Types and variables
02. Data Types and variables
Intro C# Book
 
Java Foundations: Basic Syntax, Conditions, Loops
Java Foundations: Basic Syntax, Conditions, LoopsJava Foundations: Basic Syntax, Conditions, Loops
Java Foundations: Basic Syntax, Conditions, Loops
Svetlin Nakov
 
Distance Sort
Distance SortDistance Sort
Distance Sort
Waqas Tariq
 
System design using HDL - Module 2
System design using HDL - Module 2System design using HDL - Module 2
System design using HDL - Module 2
Aravinda Koithyar
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
CSCJournals
 
Mlp trainning algorithm
Mlp trainning algorithmMlp trainning algorithm
Mlp trainning algorithm
Hưng Đặng
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
IJECEIAES
 
Joining Large data at Scale
Joining Large data at ScaleJoining Large data at Scale
Joining Large data at Scale
Sigmoid
 
Task and Data Parallelism: Real-World Examples
Task and Data Parallelism: Real-World ExamplesTask and Data Parallelism: Real-World Examples
Task and Data Parallelism: Real-World Examples
Sasha Goldshtein
 
New c sharp3_features_(linq)_part_iii
New c sharp3_features_(linq)_part_iiiNew c sharp3_features_(linq)_part_iii
New c sharp3_features_(linq)_part_iii
Nico Ludwig
 
19. Data Structures and Algorithm Complexity
19. Data Structures and Algorithm Complexity19. Data Structures and Algorithm Complexity
19. Data Structures and Algorithm Complexity
Intro C# Book
 
(6) collections algorithms
(6) collections algorithms(6) collections algorithms
(6) collections algorithms
Nico Ludwig
 
02. Data Types and variables
02. Data Types and variables02. Data Types and variables
02. Data Types and variables
Intro C# Book
 
Java Foundations: Basic Syntax, Conditions, Loops
Java Foundations: Basic Syntax, Conditions, LoopsJava Foundations: Basic Syntax, Conditions, Loops
Java Foundations: Basic Syntax, Conditions, Loops
Svetlin Nakov
 

Viewers also liked (7)

SOA Program
SOA ProgramSOA Program
SOA Program
meymane
 
HackSwag.me Seedhack
HackSwag.me SeedhackHackSwag.me Seedhack
HackSwag.me Seedhack
Vincent Jacobs
 
St patrick's day
St patrick's daySt patrick's day
St patrick's day
ToNiKi7
 
Kk20503 1 introduction
Kk20503 1 introductionKk20503 1 introduction
Kk20503 1 introduction
Low Ying Hao
 
Stpatrick'sday
Stpatrick'sdayStpatrick'sday
Stpatrick'sday
ToNiKi7
 
Stpatrick'sday
Stpatrick'sdayStpatrick'sday
Stpatrick'sday
ToNiKi7
 
M.Tech: Algorithm Analysis and Design Assignment II
M.Tech: Algorithm Analysis and Design Assignment IIM.Tech: Algorithm Analysis and Design Assignment II
M.Tech: Algorithm Analysis and Design Assignment II
Vijayananda Mohire
 
SOA Program
SOA ProgramSOA Program
SOA Program
meymane
 
St patrick's day
St patrick's daySt patrick's day
St patrick's day
ToNiKi7
 
Kk20503 1 introduction
Kk20503 1 introductionKk20503 1 introduction
Kk20503 1 introduction
Low Ying Hao
 
Stpatrick'sday
Stpatrick'sdayStpatrick'sday
Stpatrick'sday
ToNiKi7
 
Stpatrick'sday
Stpatrick'sdayStpatrick'sday
Stpatrick'sday
ToNiKi7
 
M.Tech: Algorithm Analysis and Design Assignment II
M.Tech: Algorithm Analysis and Design Assignment IIM.Tech: Algorithm Analysis and Design Assignment II
M.Tech: Algorithm Analysis and Design Assignment II
Vijayananda Mohire
 
Ad

Similar to Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays (20)

Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
D010321824
D010321824D010321824
D010321824
IOSR Journals
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
 
icwet1097
icwet1097icwet1097
icwet1097
Sapna Agarwal
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
iosrjce
 
F017364451
F017364451F017364451
F017364451
IOSR Journals
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
IOSR Journals
 
11
1111
11
idescitation
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
VHDL Encryption
VHDL EncryptionVHDL Encryption
VHDL Encryption
Shubham Chauhan
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
A03530107
A03530107A03530107
A03530107
inventionjournals
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
iosrjce
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
IOSR Journals
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
Ad

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
iosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
iosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
iosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
iosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
iosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
iosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
iosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
iosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
iosrjce
 
An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
iosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
iosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
iosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
iosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
iosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
iosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
iosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
iosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
iosrjce
 

Recently uploaded (20)

Integration of AI and ML in Biotechnology
Integration of AI and ML in BiotechnologyIntegration of AI and ML in Biotechnology
Integration of AI and ML in Biotechnology
Sourabh Junawa
 
Macrolide and Miscellaneous Antibiotics.ppt
Macrolide and Miscellaneous Antibiotics.pptMacrolide and Miscellaneous Antibiotics.ppt
Macrolide and Miscellaneous Antibiotics.ppt
HRUTUJA WAGH
 
AP 2024 Unit 1 Updated Chemistry of Life
AP 2024 Unit 1 Updated Chemistry of LifeAP 2024 Unit 1 Updated Chemistry of Life
AP 2024 Unit 1 Updated Chemistry of Life
mseileenlinden
 
Components of the Human Circulatory System.pptx
Components of the Human  Circulatory System.pptxComponents of the Human  Circulatory System.pptx
Components of the Human Circulatory System.pptx
autumnstreaks
 
Funakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalogFunakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalog
fu7koshi
 
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
Sérgio Sacani
 
Examine human hair for cortex and medulla.
Examine human hair for cortex and medulla.Examine human hair for cortex and medulla.
Examine human hair for cortex and medulla.
NutanRathod6
 
Forestry_Exit_Exam_Wollega University_Gimbi Campus.pdf
Forestry_Exit_Exam_Wollega University_Gimbi Campus.pdfForestry_Exit_Exam_Wollega University_Gimbi Campus.pdf
Forestry_Exit_Exam_Wollega University_Gimbi Campus.pdf
ChalaKelbessa
 
2. peptic ulcer (1) (1) for Pharm D .pptx
2. peptic ulcer (1) (1) for Pharm D .pptx2. peptic ulcer (1) (1) for Pharm D .pptx
2. peptic ulcer (1) (1) for Pharm D .pptx
fafyfskhan251kmf
 
Brief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdfBrief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdf
BharathKumar556689
 
Seismic evidence of liquid water at the base of Mars' upper crust
Seismic evidence of liquid water at the base of Mars' upper crustSeismic evidence of liquid water at the base of Mars' upper crust
Seismic evidence of liquid water at the base of Mars' upper crust
Sérgio Sacani
 
Electroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_AignificancrElectroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_Aignificancr
klynct
 
Top 10 Biotech Startups for Beginners.pptx
Top 10 Biotech Startups for Beginners.pptxTop 10 Biotech Startups for Beginners.pptx
Top 10 Biotech Startups for Beginners.pptx
alexbagheriam
 
Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...
Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...
Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...
Professional Content Writing's
 
Micro-grooved zein macro-whiskers for large-scale proliferation and different...
Micro-grooved zein macro-whiskers for large-scale proliferation and different...Micro-grooved zein macro-whiskers for large-scale proliferation and different...
Micro-grooved zein macro-whiskers for large-scale proliferation and different...
mdokmeci
 
Transgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative BiolabsTransgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative Biolabs
Creative-Biolabs
 
university of arizona ~ favor's college candidate project.pptx
university of arizona ~ favor's college candidate project.pptxuniversity of arizona ~ favor's college candidate project.pptx
university of arizona ~ favor's college candidate project.pptx
favoranamelechi107
 
8. Gait cycle and it's determinants completely
8. Gait cycle and it's determinants completely8. Gait cycle and it's determinants completely
8. Gait cycle and it's determinants completely
Mominaakram4
 
Green Synthesis of Gold Nanoparticles.pptx
Green Synthesis of Gold Nanoparticles.pptxGreen Synthesis of Gold Nanoparticles.pptx
Green Synthesis of Gold Nanoparticles.pptx
Torskal Nanoscience
 
Cordaitales - Yudhvir Singh Checked[1].pptx gymnosperms
Cordaitales - Yudhvir Singh Checked[1].pptx gymnospermsCordaitales - Yudhvir Singh Checked[1].pptx gymnosperms
Cordaitales - Yudhvir Singh Checked[1].pptx gymnosperms
ReetikaMakkar
 
Integration of AI and ML in Biotechnology
Integration of AI and ML in BiotechnologyIntegration of AI and ML in Biotechnology
Integration of AI and ML in Biotechnology
Sourabh Junawa
 
Macrolide and Miscellaneous Antibiotics.ppt
Macrolide and Miscellaneous Antibiotics.pptMacrolide and Miscellaneous Antibiotics.ppt
Macrolide and Miscellaneous Antibiotics.ppt
HRUTUJA WAGH
 
AP 2024 Unit 1 Updated Chemistry of Life
AP 2024 Unit 1 Updated Chemistry of LifeAP 2024 Unit 1 Updated Chemistry of Life
AP 2024 Unit 1 Updated Chemistry of Life
mseileenlinden
 
Components of the Human Circulatory System.pptx
Components of the Human  Circulatory System.pptxComponents of the Human  Circulatory System.pptx
Components of the Human Circulatory System.pptx
autumnstreaks
 
Funakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalogFunakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalog
fu7koshi
 
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
Sérgio Sacani
 
Examine human hair for cortex and medulla.
Examine human hair for cortex and medulla.Examine human hair for cortex and medulla.
Examine human hair for cortex and medulla.
NutanRathod6
 
Forestry_Exit_Exam_Wollega University_Gimbi Campus.pdf
Forestry_Exit_Exam_Wollega University_Gimbi Campus.pdfForestry_Exit_Exam_Wollega University_Gimbi Campus.pdf
Forestry_Exit_Exam_Wollega University_Gimbi Campus.pdf
ChalaKelbessa
 
2. peptic ulcer (1) (1) for Pharm D .pptx
2. peptic ulcer (1) (1) for Pharm D .pptx2. peptic ulcer (1) (1) for Pharm D .pptx
2. peptic ulcer (1) (1) for Pharm D .pptx
fafyfskhan251kmf
 
Brief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdfBrief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdf
BharathKumar556689
 
Seismic evidence of liquid water at the base of Mars' upper crust
Seismic evidence of liquid water at the base of Mars' upper crustSeismic evidence of liquid water at the base of Mars' upper crust
Seismic evidence of liquid water at the base of Mars' upper crust
Sérgio Sacani
 
Electroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_AignificancrElectroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_Aignificancr
klynct
 
Top 10 Biotech Startups for Beginners.pptx
Top 10 Biotech Startups for Beginners.pptxTop 10 Biotech Startups for Beginners.pptx
Top 10 Biotech Startups for Beginners.pptx
alexbagheriam
 
Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...
Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...
Chemistry of Warfare (Chemical weapons in warfare: An in-depth analysis of cl...
Professional Content Writing's
 
Micro-grooved zein macro-whiskers for large-scale proliferation and different...
Micro-grooved zein macro-whiskers for large-scale proliferation and different...Micro-grooved zein macro-whiskers for large-scale proliferation and different...
Micro-grooved zein macro-whiskers for large-scale proliferation and different...
mdokmeci
 
Transgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative BiolabsTransgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative Biolabs
Creative-Biolabs
 
university of arizona ~ favor's college candidate project.pptx
university of arizona ~ favor's college candidate project.pptxuniversity of arizona ~ favor's college candidate project.pptx
university of arizona ~ favor's college candidate project.pptx
favoranamelechi107
 
8. Gait cycle and it's determinants completely
8. Gait cycle and it's determinants completely8. Gait cycle and it's determinants completely
8. Gait cycle and it's determinants completely
Mominaakram4
 
Green Synthesis of Gold Nanoparticles.pptx
Green Synthesis of Gold Nanoparticles.pptxGreen Synthesis of Gold Nanoparticles.pptx
Green Synthesis of Gold Nanoparticles.pptx
Torskal Nanoscience
 
Cordaitales - Yudhvir Singh Checked[1].pptx gymnosperms
Cordaitales - Yudhvir Singh Checked[1].pptx gymnospermsCordaitales - Yudhvir Singh Checked[1].pptx gymnosperms
Cordaitales - Yudhvir Singh Checked[1].pptx gymnosperms
ReetikaMakkar
 

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

  • 1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue 1, Ver. III (Jan - Feb. 2015), PP 01-11 e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197 www.iosrjournals.org DOI: 10.9790/4200-05130111 www.iosrjournals.org 1 | Page Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays A.Anusha1 , N.Samba Murthy2 1 PG Student, ECE Department, Gudlavalleru Engineering College, Gudlavalleru, India 2 Assistant Professor, ECE Department, Gudlavalleru Engineering College, Gudlavalleru, India 1 anuece.anu@gmail.com,2 sambanaga009@gmail.com Abstract: This paper presents information on AES Encryption and Decryption for multi processors. In this paper AES algorithm is used. The AES algorithm is a round based algorithm. The round based algorithm is used to provide security to the information. In AES algorithm there are different types of keys, they are 128,192 and 256 bits. These bits are used to encrypt and decrypt the information. In this paper 128bits are used. In this paper the main functional blocks are key generation, encryption and decryption. In order produce a new key sub byte, rotate word, round constant and add round key operations are used. In order to convert plain text to cipher message the sub bytes, shift rows, mix column and add round key operations are used. By doing these operations the cipher information is obtained. This cipher will be given to the decryption and it is the total reverse process of encryption. After completion of reverse process the outcome is original information. Index terms- Advanced Encryption Standards, cipher, multi processor. I. Introduction Encryption is the process of converting original message into cipher information by using key. In this process the information must be in the form of hexadecimal or integer format only. Decryption is the process of converting cipher information to original information by using same key. In decryption the format of message must be in Hexadecimal or integer. In this paper the advanced encryption standard algorithm technique uses the symmetric key that means private key. The main advantage of symmetric key is provide security to the data and reduces the area also. This types of private keys mainly used in ATM machines and software’s also. This paper mainly concentrates on developing suitable method for rapid and efficient way to perform hardware implementation for some applications to provide security to the information. To accomplish high security for a system the AES technique is used. Most of the users now a day’s using wireless communication for fast sending and receiving the mails in less time and less cost. When this way of communication is going on, the unauthorized people who have the intension to know about the conversation will hack the information. The AES algorithm is used to provide security and hackers cannot hack the data even if they know the key and algorithm also. In this paper the sub bytes and inv sub bytes operation will be done word wise. By doing these operations reduce the area and increase the speed of the operation.
  • 2. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 2 | Page Fig1. Block Diagram Of AES There are mainly 3 types of operations in advanced encryption standard algorithm. They are key generation; encryption and decryption. II. Key Generation The key generation processes the data block of fixed size i.e. 128 bits using cipher key length of 128,192 and 256 bits. The number of operations will be depending on number of bits. By using different type of bits it has some constant rounds of operation. For 128 bits it has 10 rounds of operations. By rounds of operations, it provides security because by doing this types operation they cannot hack the data. The below table [1] shows the number of keys and number of rounds for particular bits. Table 1: key generation For 128 bits (which we r using here) there are fixed 10 rounds. For getting 10 keys we have to done some operations. They are sub bytes, rotate word, round constant and add round key operations. No. of bits 128 bits 192 bits 256 bits No. of keys 10 keys 12 keys 14 keys No. of rounds 10 rounds 12 rounds 14 rounds
  • 3. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 3 | Page Fig2. Block diagram of key generation 2.1 Sub bytes operation The sub bytes operations will be done word wise. This is non-linear substitution technique. It works on every byte of the state independently. By using S-box table, it will operate. The S-box table is developed on 2 transformation techniques. They are 2.1.1 Take the replica of Rijndael’s conditions. 2.1.2 Apply a non-regular technique that is already implemented on Rijndael technique. The predefined values of substitution table is used here. Every bytes of the state is compared with the value in the equal positioned value in S-box. B [1, 1] = S box [b (1, 1)] Fig 2.1 Sub bytes operation 2.2 Rotate word operatio Rotate word performs a one byte circular rotate left.
  • 4. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 4 | Page Rot word [A8 A7 A6 A5] = [A5 A8 A7 A6] 2.3 Round constant operation The round constant operation is different for each step. In the example take either one column or row 07 cf 3f 4c Then rotate the equation Cf 3f 4c 07 Now put these values through the AES s-box (component wise) 8a 75 29 c5 This is the operation for round1.Now we need the round constant operation. Add round one to the s-box output 8a 01 = 8b 75 00 = 75 29 00 = 29 C5 00 = c5 This is the operation for round constant 1. These are the operations for key generation. 2.4 Add round key operation Every byte of the value is directly added with the key. The below figure shows the operation of add round key W1 1 W2 1 W3 1 W0 1 W3 W2 W1
  • 5. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 5 | Page Fig 2.2 Add round key operation This is the operation for key 1.Repeat the above steps up to 10 rounds for every round will get one key total 10 keys because this technique using 128bits. For 128 bits it has 10 rounds of operation for each round it will get one new key. III. Encryption It is defined as converting original message to cipher message. Fig3. Block diagram of Encryption There are mainly 4 types of operations in encryption. They are 3.1 Sub bytes operation The sub bytes operations will be done word wise. This is non-linear substitution technique. It works on every byte of the state independently. By using substitution table it will operate. The substitution table is developed on 2 transformation techniques. They are 3.1.1 Take the replica of Rijndael’s conditions. 3.1.2 Apply a non-regular technique that is already implemented on Rijndael technique. W0 11 W0 1 W3 1 W2 1 W1 1 W0 11 Key 1
  • 6. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 6 | Page The predefined values of substitution table is used here. Every bytes of the state is compared with the value in the equal positioned value in s-box. B [1, 1] = S box [b (1, 1)] Fig 3.1 sub bytes operation 3.2 Shift rows The shift rows operations were done with the shifting rows cyclically either right or left. 3.2.1 In first row there is no change. 3.2.2 In second row shift cyclically by one position either left side or right side 3.2.3 In third row shift cyclically by two positions. 3.2.4 In fourth row shift cyclically by three positions. No change D0 D1 D2 D3 D0 D1 D2 D3 1st shift D4 D5 D6 D7 D5 D6 D7 D4 2nd shift D8 D9 D10 D11 D10 D11 D8 D9 3rd shift D12 D13 D14 D15 D15 D12 D13 D14 3.3 Mix column operation In mix column operation each column of the state array is considered as a multiplicative term. In mix column operation the 4*4 matrix is multiplied with the constant matrix. In mix column operation, there are only 9 rounds (1 to 9). There is no 10th round for mix column operation. For 10th round, the shift rows operation is directly given to the add round key operation because there is no 10th round for mix column. 3.4 Add round key operation Every byte of the value is directly added with the key. The operation between mix column output with key 1 to 9 rounds only.
  • 7. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 7 | Page IV. Decryption It is defined as the converting cipher message to original message. The decryption is the total reverse operation of the encryption. Fig4. Block diagram of Decryption There are mainly 4 types of operations in decryption. They are 4.1 Inv sub bytes operation The inv sub bytes operations will be done word wise. This is non-linear substitution technique. It works on every byte of the state independently. It operates by using inverse substitution table. The inverse substitution table is develops on 2 transformation techniques. They are 4.1.1 Take the replica of Rijndael’s finite field. 4.1.2 Apply a non-regular technique that is already implemented on Rijndael technique. B [1, 1] = S box [b (1, 1)] The predefined values of substitution table is used here. Every bytes of the state is compared with the value in the equal positioned value in the inverse s-box.
  • 8. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 8 | Page Fig. 4.1 sub bytes operation 4.2 Inv shift rows operation The inv shift rows operations were done with the shifting rows cyclically right. The inv shift rows operation is same as the shift rows operation. 4.2.1 In first row there is no change. 4.2.2 In second row shift cyclically by one position either left side or right. 4.2.3 In third row shift cyclically by two positions. 4.2.4 In fourth row shift cyclically by three positions. No change D0 D1 D2 D3 D0 D1 D2 D3 1st shift D4 D5 D6 D7 D5 D6 D7 D4 2nd shift D8 D9 D10 D11 D10 D11 D8 D9 3rd shift D12 D13 D14 D15 D15 D12 D13 D14 4.3 Inv mix column operation In inv mix column operation each column of the state array is considered as a multiplicative term. In inv mix column operation the 4*4 matrix is multiplied with the constant matrix and we get same dimensional matrix. In first round there is no inv mix column operation. 4.4 Inv add round key Every byte of the value is directly added with the key. The key must be in reverse order i.e. 10 to 1 for decryption Applications: 1. It is used in online banking. 2. ATM machines and social networking also. 3. It is also used in business purpose also.
  • 9. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 9 | Page Fig 2.3 Timing diagram for key generation After key generation is enabled and reset is high and key load is loaded, then the keys are produced. Fig 3.2 RTL schematic for Encryption Fig 3.2 Timing diagram for Encryption After reset and key generation enabled encryptions starts. As encryption ends, encryption over signal is high indicating that message is converted into encrypted information
  • 10. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 10 | Page Fig 4.2 RTL schematic for Decryption Fig 4.3 Timing diagram for Decryption After reset and key generation enabled decryptions starts. As decryption ends, decryption over signal is high indicating that message is converted into original information V. Analysis report: Encryption Decryption No .of Slices 717 717 No. of flip-flops 682 682 No. of 4 I/p LUT’s 1076 1075 No. of IOB’s 263 263 No. of CLK’s 1 1 Total Delay 5.014ns 5.014ns Table2. Analysis report for encryption and decryption
  • 11. Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays DOI: 10.9790/4200-05130111 www.iosrjournals.org 11 | Page VI. Conclusion Xilinx is very helpful tool for software and hardware. By using this technique we can provide security to information. By using AES we can reduce the area and reduction of cost will lead to the reduction of overall production cost and 100% security of data. The future scope of this project is further to extend up to 256 bits efficiently and successfully by using the same techniques. Acknowledgement I am glad to express my deep sense of gratitude to, Mr. N.Samba Murthy, Assistant Professor of Electronics and Communication Engineering, for his guidance and cooperation in completing this project. Through this, I want to convey my sincere thanks to him for his inspiring assistance during my project. I express my heartfelt gratitude and deep indebtedness to the beloved Head of the Department, Dr. M.KAMARAJU, for his great help and encouragement in completion of my project. I also express my gratitude to our principal Dr. P.NAGESWARA REDDY, for his encouragement and facilities provided for my project. I thank one and all who have rendered help to us directly or indirectly in the completion of this work. References [1]. Bin Liu and Bevan M. Baas “Parallel AES Encryption Engines for Many-Core Processor Arrays” IEEE Transactions on computer, VOL. 62, NO. 3, MARCH 2013. [2]. A. Still maker, “Exploration of Technology Scaling of CMOS Circuits from 180 nm to 22 nm Using PTM Models in HSPICE, ”Technical report, UC Davis, June 2011. [3]. J. Granado-Criado, M. Vega-Rodriguez, J. Sanchez-Perez, and J. Gomez-Pulido, “A New Methodology to Implement the AES Algorithm Using Partial and Dynamic Reconfiguration,” Integration, the VLSI J., vol. 43, no. 1, pp. 72-80, 2010. [4]. S. Gueron, “Intel Advanced Encryption Standard (AES) Instructions Set,” Jan. 2010. [5]. Z. Yu and B.M. Baas, “A Low-Area Multi-Link Interconnect Architecture for GALS Chip Multiprocessors,” IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 18, no. 5, pp. 750-762, May 2010. [6]. M. Butler, “AMD Bulldozer Core—A New Approach to Multithreaded Compute Performance for Maximum Efficiency and Throughput,” Proc. IEEE Hot Chips Symp High-Performance Chips (Hot Chips ’10), Aug. 2010.
  翻译: