SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1981
FPGA Implementation of Mix and Inverse Mix Column for AES
Algorithm
Neethan Elizabeth Abraham1
Tibin Thomas2
1
Dept. of Electronics and Communication Engg. 2
Dept of Computer Science & Engg.
1, 2
Federal Institute of Science and Technology (FISAT), Angamaly, India
Abstract—advanced encryption standard was accepted as a
Federal Information Processing Standard (FIPS) standard. In
order to reduce the area consumption and to increase the
speed mix and inverse mix column transformation can be
used as a single module .This paper contains design of new
architecture, its simulation and implementation results and
comparison with previous architecture.
Key words: mix column, inverse mix column
I. INTRODUCTION
The rapidly growing Internet and wireless communication
users has led to increasing demand for security measures
and devices to protect user data transmitted over channels.
Two types of cryptographic systems have been developed
for that purpose: symmetric (secret key) and asymmetric
(public key) cryptosystems. Symmetric cryptography, such
as in the Data Encryption Standard (DES), and Advanced
Encryption Standard (AES) uses an identical key for the
sender and receiver, for encryption and decryption.
Asymmetric cryptography, such as in the Rivest-Shamir-
Adleman (RSA) and Elliptic Curve algorithms, uses
different keys for encryption and decryption. Symmetric
cryptography is best suitable for the encryption of a large
amount of data. The AES algorithm defined by the National
Institute of Standards and Technology (NIST) of the United
States has been widely accepted to replace DES as the new
symmetric encryption algorithm. AES encryption is an
efficient scheme for both hardware and software
implementation. Much work has been presented on
hardware implementations of AES using field
programmable gate arrays (FPGAs) [2–5], and
comprehensive analyses of the performance of the AES
finalists was presented based on FPGA implementations,
before Rijndael was selected as the AES algorithm.
II. THE AES ALGORITHM
The AES algorithm is a symmetric block cipher that
processes data blocks of 128 bits using a cipher key of
length 128, 192, or 256 bits. Each data block consists of a 4
× 4 array of bytes called the state, on which the basic
operations of the AES algorithm are performed. After an
initial round key addition, a round function consisting of
four different transformations — SubBytes(), ShiftRows(),
MixColumns(), and AddRoundKey() — is applied to the data
block (i.e., the state array). The round function is performed
iteratively 10, 12, or 14 times, depending on the key length.
During last round MixColumns() is not applied. The four
transformations are described briefly as follows:
1) SubBytes(): it is a nonlinear byte substitution that
operates independently on each byte of the state using
a substitution table (the SBox)
2) ShiftRows():it is a circular shifting operation on the
rows of the state with different numbers of bytes
(offsets)
3) MixColumns(): it is the operation that mixes the bytes
in each column by the multiplication of the state with a
fixed polynomial modulo x4
+ 1
4) AddRoundKey(): it is an XOR operation that adds a
round key to the state in each iteration, where the
round keys are generated during the key expansion
phase.
The decryption procedure of the AES is normally
the inverse of each transformation (InvSub-Bytes,
InvShiftRows, InvMixColumns, and AddRoundKey) in
reverse order. However, the order of InvSubBytes() and
InvShiftRows is indifferent. The decryption procedure has
to be rearranged as, where the InvRoundKey is obtained by
applying InvMixColumns() to the respective original Round
Key. Such a structural similarity in both the encryption and
decryption procedures makes hardware implementation
easier.
III. MIX AND INVERSE MIX COLUMN
TRANSFORMATION
The Mix column transformation performs a linear operation
on the columns of the state matrix. It operates on the
columns of the state matrix i.e., 32 bits. It causes every byte
in a column to affect every other byte. The state matrix is
represented as column polynomials over GF (28
) and the
transformation consists of matrix multiplication of the state
with a polynomial over a finite field. The mix column
transformation step is the only place in Rijndael’s round
transformation where the columns are mixed. This step
works with the Shift Row step to ensure that all parts of the
block affect each other. For a data block of 128 bits, the
state matrix has 4 rows. Therefore, the columns of the state
matrix are each viewed as the polynomial of degree 8 over
GF (28
).
The forward mix column transformation, called
MixColumns, operates on each column individually. Each
byte of a column is mapped into a new value that is a
function of all four bytes in that column. The transformation
can be defined by the following matrix multiplication on
State. The MixColumns transformation operates on the State
column-by-column, treating each column as a four-term
polynomial. The columns are considered as polynomials
over GF (28
) and multiplied modulo x4 + 1 with a fixed
polynomial a(x), given by
C(x) = (03x3
+01x2
+01x+02) moduli x4
+1
The coefficients of the fixed polynomial are in
hexadecimal and are the elements of GF (28
).The Mix
Column transformation for encryption and decryption is
represented as in Figures 1, 2 respectively. This can be
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
(IJSRD/Vol. 1/Issue 9/2013/0071)
All rights reserved by www.ijsrd.com 1982
represented in algebraic form as a matrix multiplication. Let
B(x) = C(x) *A(x).
[ ] [ ] [ ]
The multiplication of a fixed polynomial over GF
(28
) is calculated using shifts and exclusive OR operations.
The resulting equations for each byte in the column are as
follows
( ) ( )
( ) ( )
( ) ( )
( ) ( )
Fig. 1: Mix Column Transformation for Encryption
In decryption, each column of the state matrix is
multiplied by the fixed polynomial
C-1
(x) =D(X) = (0Bx3
+0Dx2
+09x+0E) modulo(x4
+1)
The coefficients of the fixed polynomial are in
hexadecimal and are the elements of GF (28
).Galois Field is
a finite field of 256 elements generated by an irreducible
polynomial of degree 8. The elements of GF (28
) are
represented as polynomials of degree less than eight in
numbers (mod2). As the numbers are taken modulo 2, the
addition is equivalent to XOR operation. An irreducible
polynomial is a polynomial which is divisible by 1 and
itself. In GF (2n
), n represents the number of bits required to
represent the polynomials in bit representation. This can be
represented as a matrix multiplication. Let A(x) = D(x) *
B(x).
Fig. 2: Mix Column Transformations for Decryption
The multiplication of a fixed polynomial over GF
(28
) is calculated using shifts and exclusive- OR operations.
The resulting equations for each byte in the column are as
follows:
[ ] [ ] [ ]
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( )( ) ( )
( ) ( ) ( ) ( )
The following is an example of Mix Columns:
IV. VARIOUS ARCHITECTURES FOR
IMPLEMENTATION
Various architectures have been proposed for the
implementation of the MixColumns/InvMixColumns
transformation. Applying substructure sharing both to the
computation of a byte and between the computation of the
four bytes in a column of the State, an efficient MixColumns
implementation architecture can be derived. The above
multiplication can be written as
S’0C = {02}16 (S0c + S1c) + (S2c + S3c) + S1c
S’1C = {02}16 (S 1c + S 2c) + (S 3c + S 0c) + S2c
S’2C = {02}16 (S 2c + S 3c) + (S 0c + S 1c) + S3c
S’3C = {02}16 (S 3c + S 0c) + (S 1c + S 2c) + S0c
According to the above equations, the MixColumns
transformation can be implemented by the following
architecture.
Fig. 3: Circuit diagram for MixColumns
The function of the block “Time” is to compute
constant multiplication by {02}16. An element of GF (28
)
can be expressed in polynomial form as S=s7x7
+ s6x6
+ s5x5
+
s4x4
+ s3x3
+ s2x2
+ s1x+ s0, where s0, s1, s2…. s7 £GF (2) and x
is a root of the field polynomial. Then
{02}16S = xS = s7x8
+ s6x7
+ s5x6
+ s4x5
+ s3x4
+ s2x3
+ s1x2
+
s0x mod p(x)
= s6x7
+ s5x6
+ s4x5
+ (s3 + s7) x4
+ (s2 + s7) x3
+ s1x2
+ (s0 + s7) s + s7.
Therefore, the “XTime” block can be implemented
by 3 XOR gates with only one XOR gate in the critical path.
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
(IJSRD/Vol. 1/Issue 9/2013/0071)
All rights reserved by www.ijsrd.com 1983
InvMixColumns() is the inverse of the
MixColumns() transformation. InvMixColumns() operates
on the State column-by-column, treating each column as a
four term polynomial. The columns are considered as
polynomials over GF (28
) and multiplied modulo x4
+ 1 with
a fixed polynomial a-1
(x), given by
a-1
(x) = {0b}x3
+ {0d}x2
+ {09}x + {0e}.
Similarly, in the InvMixColumns transformation,
can be rewritten as
S’0c = ({02}16(S0c + S1c) + (S2c + S3c) + S1c) +
({02}16({04}16(S0c + S2c) + {04}16(S1c + S3c)) + {04}16(S0c +
S2c))
S’1c = ({02}16(S1c + S2c) + (S3c + S0c) + S2c) +
({02}16({04}16(S1c + S3c) + {04}16(S2c + S2c)) +
{04}16(S1c + S3c))
S’2c = ({02}16(S2c + S3c) + (S0c + S1c) + S3c) +
({02}16({04}16(S2c + S0c) + {04}16(S3c + S1c)) + {04}16(S2c +
S0c))
S’3c = ({02}16(S3c + S0c) + (S1c + S2c) + S0c) +
({02}16({04}16(S3c + S1c) + {04}16(S0c + S0c)) + {04}16(S3c +
S1c))
Using substructure sharing this can be implemented
by the architecture shown. The “X4Time” block, which
computes the constant multiplication of {04}16, can be
implemented by two serially concatenated “XTime” block.
Alternatively, it can also be implemented according to the
equation derived below
{04}16S = X2
S = s7x9
+ s6x8
+ s5x7
+ s4x6
+ s3s5
+ s2x4
+ s1x3
+
s0x2
modp(x).
= S5x7
+ s4x6
+ (s3 + s7) x5
+ (s2 + (s6 + s7)) x4
+ (s1 +
s6) x3
+ (s0 + s7) x2
+ (s6 + s7)x + s6.
InvMixColumns transformation can be
implemented as follows:
Fig. 4: Circuit diagram for InvMixColumns
Meanwhile, the upper half is exactly the same as
the architecture for the implementation of the MixColumns.
Therefore in a joint encryptor/decryptor implementation,
only the architecture needs to be implemented for both the
MixColumns and the InvMixColumns transformations.
Fig. 5: Implementation of MixColumns/InvMixColumns
The architecture above can be used for both
MixColumns and inverse MixColumns
transformation.(a3,a0,a1,a2) gives the result of MixColumns
transformation and (b3,b1,b0,b2) gives the result of inverse
MixColumns transformation. Hence a single module can be
used for both transformation and hence area can be reduced.
V. SIMULATION AND IMPLEMENTATION RESULT
Here a single module is used for both mix and inverse
column and we can select the required.
Fig. 6: Simulation outputs of mix & inverse mix column
transformation
Parameter Value
Device xc3s1500
No of slices 68/13312
No of slice flip flops 32/26624
No of 4 input LUT 118/26624
Minimum input arrival time
before clock
9.484ns
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
(IJSRD/Vol. 1/Issue 9/2013/0071)
All rights reserved by www.ijsrd.com 1984
Maximum output required time
after clock
7.165ns
Table. 1: Implementation result of mix & inverse mix
column transformation
PARAMETER
MIX
COLOUMN
INVERSE
MIX
COLOU
MN
MIX&INVE
RSE
MERGE(OU
R DESIGN)
Device xc3s1500 xc3s1500 xc3s1500
No of slices 37/13312 81/13312 68/13312
No of slice
flip flops
32/26624 32/26624 32/26624
Minimum
input arrival
before clock
4.605ns 8.204ns 9.484ns
Maximum
output
required time
after clock
7.165ns 7.165ns 7.165ns
Table. 2: Comparison of mix and inverse mix column
VI. CONCLUSION
Instead of using two different modules of mix and inverse
mix column transformation, a single module can be used for
both transformations. It reduces the overall area of
consumption of the AES algorithm.
REFERENCES
[1] Advanced Encryption Standard (AES), FIPS PUB 197,
Nov. 26, 2001, Federal Information Processing
Standards publication 197.
[2] X. Zhang, K. K. Parhi, "High-speed VLSI architectures
for the AES algorithm", IEEE Transactions on Very
Large Scale Integration (VLSI) Systems, v.12 n.9,
p.957-967, September 2004.
[3] H. Kuo, and I. Verbauwhede. "Architecture
optimization for a 1.82Gbit/s VLSI implementation of
the AES Rijndael algorithm”. Proc. 3rd
Int.CHES 2001,
May 2001, pp. 51-64.
[4] Practical Implementation of Rijndael S-Box Using
Combinational Logic Edwin NC Mui Custom R & D
Engineer, Texco Enterprise Ptd. Ltd.
[5] On the Optimum Constructions of Composite Field for
the AES Algorithm Xinmiao Zhang, Member, IEEE,
and Keshab K. Parhi, Fellow, IEEE
[6] A High-Throughput Cost-Effective ASIC
Implementation of the AES Algorithm978-1-4244-
3870-9/09/$25.00 ©2009 IEEE.
Ad

More Related Content

What's hot (20)

Basics of vlsi
Basics of vlsiBasics of vlsi
Basics of vlsi
Scientech Technologies Pvt. Ltd.
 
Vlsi circuit design
Vlsi circuit designVlsi circuit design
Vlsi circuit design
Sirat Mahmood
 
Fpga Verification Methodology and case studies - Semisrael Expo2014
Fpga Verification Methodology and case studies - Semisrael Expo2014Fpga Verification Methodology and case studies - Semisrael Expo2014
Fpga Verification Methodology and case studies - Semisrael Expo2014
Avi Caspi
 
Simple Introduction about ESP32 Presentation
Simple Introduction about ESP32 PresentationSimple Introduction about ESP32 Presentation
Simple Introduction about ESP32 Presentation
Junido
 
VLSI Technology
VLSI TechnologyVLSI Technology
VLSI Technology
Hasib Hossen
 
VLSI Training presentation
VLSI Training presentationVLSI Training presentation
VLSI Training presentation
Daola Khungur
 
Field-programmable gate array
Field-programmable gate arrayField-programmable gate array
Field-programmable gate array
PrinceArjun1999
 
Introduction to VLSI
Introduction to VLSIIntroduction to VLSI
Introduction to VLSI
Shams Tabrej
 
System On Chip (SOC)
System On Chip (SOC)System On Chip (SOC)
System On Chip (SOC)
Shivam Gupta
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI
illpa
 
ASIC design Flow (Digital Design)
ASIC design Flow (Digital Design)ASIC design Flow (Digital Design)
ASIC design Flow (Digital Design)
Sudhanshu Janwadkar
 
FPGA Design Challenges
FPGA Design ChallengesFPGA Design Challenges
FPGA Design Challenges
Krishna Gaihre
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
Hina Saxena
 
Transmission media on Client server and high speed network
Transmission media on Client server and high speed networkTransmission media on Client server and high speed network
Transmission media on Client server and high speed network
Satya P. Joshi
 
Chip Design Trend & Fabrication Prospects In India
Chip  Design Trend & Fabrication Prospects In IndiaChip  Design Trend & Fabrication Prospects In India
Chip Design Trend & Fabrication Prospects In India
bibhuti bikramaditya
 
Vlsi Summer training report pdf
Vlsi Summer training report pdfVlsi Summer training report pdf
Vlsi Summer training report pdf
GirjeshVerma2
 
Floor plan & Power Plan
Floor plan & Power Plan Floor plan & Power Plan
Floor plan & Power Plan
Prathyusha Madapalli
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
Digital System Design with FPGAs Lab Manual.pdf
Digital System Design with FPGAs Lab Manual.pdfDigital System Design with FPGAs Lab Manual.pdf
Digital System Design with FPGAs Lab Manual.pdf
AmairullahKhanLodhi1
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
Aman Gupta
 
Fpga Verification Methodology and case studies - Semisrael Expo2014
Fpga Verification Methodology and case studies - Semisrael Expo2014Fpga Verification Methodology and case studies - Semisrael Expo2014
Fpga Verification Methodology and case studies - Semisrael Expo2014
Avi Caspi
 
Simple Introduction about ESP32 Presentation
Simple Introduction about ESP32 PresentationSimple Introduction about ESP32 Presentation
Simple Introduction about ESP32 Presentation
Junido
 
VLSI Training presentation
VLSI Training presentationVLSI Training presentation
VLSI Training presentation
Daola Khungur
 
Field-programmable gate array
Field-programmable gate arrayField-programmable gate array
Field-programmable gate array
PrinceArjun1999
 
Introduction to VLSI
Introduction to VLSIIntroduction to VLSI
Introduction to VLSI
Shams Tabrej
 
System On Chip (SOC)
System On Chip (SOC)System On Chip (SOC)
System On Chip (SOC)
Shivam Gupta
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI
illpa
 
ASIC design Flow (Digital Design)
ASIC design Flow (Digital Design)ASIC design Flow (Digital Design)
ASIC design Flow (Digital Design)
Sudhanshu Janwadkar
 
FPGA Design Challenges
FPGA Design ChallengesFPGA Design Challenges
FPGA Design Challenges
Krishna Gaihre
 
Transmission media on Client server and high speed network
Transmission media on Client server and high speed networkTransmission media on Client server and high speed network
Transmission media on Client server and high speed network
Satya P. Joshi
 
Chip Design Trend & Fabrication Prospects In India
Chip  Design Trend & Fabrication Prospects In IndiaChip  Design Trend & Fabrication Prospects In India
Chip Design Trend & Fabrication Prospects In India
bibhuti bikramaditya
 
Vlsi Summer training report pdf
Vlsi Summer training report pdfVlsi Summer training report pdf
Vlsi Summer training report pdf
GirjeshVerma2
 
Digital System Design with FPGAs Lab Manual.pdf
Digital System Design with FPGAs Lab Manual.pdfDigital System Design with FPGAs Lab Manual.pdf
Digital System Design with FPGAs Lab Manual.pdf
AmairullahKhanLodhi1
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
Aman Gupta
 

Similar to FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm (20)

E04612529
E04612529E04612529
E04612529
IOSR-JEN
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
IOSR Journals
 
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AESCFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
idescitation
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
ijmsr
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
IISRT
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
ijsrd.com
 
A03530107
A03530107A03530107
A03530107
inventionjournals
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
11
1111
11
idescitation
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
icwet1097
icwet1097icwet1097
icwet1097
Sapna Agarwal
 
Fault Detection AES
Fault Detection AESFault Detection AES
Fault Detection AES
Sumathi Reddy
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
A HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGNA HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGN
Giritharan Ravichandran
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
IOSRJECE
 
Area efficient parallel LFSR for cyclic redundancy check
Area efficient parallel LFSR for cyclic redundancy check  Area efficient parallel LFSR for cyclic redundancy check
Area efficient parallel LFSR for cyclic redundancy check
IJECEIAES
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
IOSR Journals
 
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AESCFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES
idescitation
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
ijmsr
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
IISRT
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
ijsrd.com
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
IOSRJECE
 
Area efficient parallel LFSR for cyclic redundancy check
Area efficient parallel LFSR for cyclic redundancy check  Area efficient parallel LFSR for cyclic redundancy check
Area efficient parallel LFSR for cyclic redundancy check
IJECEIAES
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
Ad

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 
IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 
Ad

Recently uploaded (20)

How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 

FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1981 FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm Neethan Elizabeth Abraham1 Tibin Thomas2 1 Dept. of Electronics and Communication Engg. 2 Dept of Computer Science & Engg. 1, 2 Federal Institute of Science and Technology (FISAT), Angamaly, India Abstract—advanced encryption standard was accepted as a Federal Information Processing Standard (FIPS) standard. In order to reduce the area consumption and to increase the speed mix and inverse mix column transformation can be used as a single module .This paper contains design of new architecture, its simulation and implementation results and comparison with previous architecture. Key words: mix column, inverse mix column I. INTRODUCTION The rapidly growing Internet and wireless communication users has led to increasing demand for security measures and devices to protect user data transmitted over channels. Two types of cryptographic systems have been developed for that purpose: symmetric (secret key) and asymmetric (public key) cryptosystems. Symmetric cryptography, such as in the Data Encryption Standard (DES), and Advanced Encryption Standard (AES) uses an identical key for the sender and receiver, for encryption and decryption. Asymmetric cryptography, such as in the Rivest-Shamir- Adleman (RSA) and Elliptic Curve algorithms, uses different keys for encryption and decryption. Symmetric cryptography is best suitable for the encryption of a large amount of data. The AES algorithm defined by the National Institute of Standards and Technology (NIST) of the United States has been widely accepted to replace DES as the new symmetric encryption algorithm. AES encryption is an efficient scheme for both hardware and software implementation. Much work has been presented on hardware implementations of AES using field programmable gate arrays (FPGAs) [2–5], and comprehensive analyses of the performance of the AES finalists was presented based on FPGA implementations, before Rijndael was selected as the AES algorithm. II. THE AES ALGORITHM The AES algorithm is a symmetric block cipher that processes data blocks of 128 bits using a cipher key of length 128, 192, or 256 bits. Each data block consists of a 4 × 4 array of bytes called the state, on which the basic operations of the AES algorithm are performed. After an initial round key addition, a round function consisting of four different transformations — SubBytes(), ShiftRows(), MixColumns(), and AddRoundKey() — is applied to the data block (i.e., the state array). The round function is performed iteratively 10, 12, or 14 times, depending on the key length. During last round MixColumns() is not applied. The four transformations are described briefly as follows: 1) SubBytes(): it is a nonlinear byte substitution that operates independently on each byte of the state using a substitution table (the SBox) 2) ShiftRows():it is a circular shifting operation on the rows of the state with different numbers of bytes (offsets) 3) MixColumns(): it is the operation that mixes the bytes in each column by the multiplication of the state with a fixed polynomial modulo x4 + 1 4) AddRoundKey(): it is an XOR operation that adds a round key to the state in each iteration, where the round keys are generated during the key expansion phase. The decryption procedure of the AES is normally the inverse of each transformation (InvSub-Bytes, InvShiftRows, InvMixColumns, and AddRoundKey) in reverse order. However, the order of InvSubBytes() and InvShiftRows is indifferent. The decryption procedure has to be rearranged as, where the InvRoundKey is obtained by applying InvMixColumns() to the respective original Round Key. Such a structural similarity in both the encryption and decryption procedures makes hardware implementation easier. III. MIX AND INVERSE MIX COLUMN TRANSFORMATION The Mix column transformation performs a linear operation on the columns of the state matrix. It operates on the columns of the state matrix i.e., 32 bits. It causes every byte in a column to affect every other byte. The state matrix is represented as column polynomials over GF (28 ) and the transformation consists of matrix multiplication of the state with a polynomial over a finite field. The mix column transformation step is the only place in Rijndael’s round transformation where the columns are mixed. This step works with the Shift Row step to ensure that all parts of the block affect each other. For a data block of 128 bits, the state matrix has 4 rows. Therefore, the columns of the state matrix are each viewed as the polynomial of degree 8 over GF (28 ). The forward mix column transformation, called MixColumns, operates on each column individually. Each byte of a column is mapped into a new value that is a function of all four bytes in that column. The transformation can be defined by the following matrix multiplication on State. The MixColumns transformation operates on the State column-by-column, treating each column as a four-term polynomial. The columns are considered as polynomials over GF (28 ) and multiplied modulo x4 + 1 with a fixed polynomial a(x), given by C(x) = (03x3 +01x2 +01x+02) moduli x4 +1 The coefficients of the fixed polynomial are in hexadecimal and are the elements of GF (28 ).The Mix Column transformation for encryption and decryption is represented as in Figures 1, 2 respectively. This can be
  • 2. FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm (IJSRD/Vol. 1/Issue 9/2013/0071) All rights reserved by www.ijsrd.com 1982 represented in algebraic form as a matrix multiplication. Let B(x) = C(x) *A(x). [ ] [ ] [ ] The multiplication of a fixed polynomial over GF (28 ) is calculated using shifts and exclusive OR operations. The resulting equations for each byte in the column are as follows ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) Fig. 1: Mix Column Transformation for Encryption In decryption, each column of the state matrix is multiplied by the fixed polynomial C-1 (x) =D(X) = (0Bx3 +0Dx2 +09x+0E) modulo(x4 +1) The coefficients of the fixed polynomial are in hexadecimal and are the elements of GF (28 ).Galois Field is a finite field of 256 elements generated by an irreducible polynomial of degree 8. The elements of GF (28 ) are represented as polynomials of degree less than eight in numbers (mod2). As the numbers are taken modulo 2, the addition is equivalent to XOR operation. An irreducible polynomial is a polynomial which is divisible by 1 and itself. In GF (2n ), n represents the number of bits required to represent the polynomials in bit representation. This can be represented as a matrix multiplication. Let A(x) = D(x) * B(x). Fig. 2: Mix Column Transformations for Decryption The multiplication of a fixed polynomial over GF (28 ) is calculated using shifts and exclusive- OR operations. The resulting equations for each byte in the column are as follows: [ ] [ ] [ ] ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )( ) ( ) ( ) ( ) ( ) ( ) The following is an example of Mix Columns: IV. VARIOUS ARCHITECTURES FOR IMPLEMENTATION Various architectures have been proposed for the implementation of the MixColumns/InvMixColumns transformation. Applying substructure sharing both to the computation of a byte and between the computation of the four bytes in a column of the State, an efficient MixColumns implementation architecture can be derived. The above multiplication can be written as S’0C = {02}16 (S0c + S1c) + (S2c + S3c) + S1c S’1C = {02}16 (S 1c + S 2c) + (S 3c + S 0c) + S2c S’2C = {02}16 (S 2c + S 3c) + (S 0c + S 1c) + S3c S’3C = {02}16 (S 3c + S 0c) + (S 1c + S 2c) + S0c According to the above equations, the MixColumns transformation can be implemented by the following architecture. Fig. 3: Circuit diagram for MixColumns The function of the block “Time” is to compute constant multiplication by {02}16. An element of GF (28 ) can be expressed in polynomial form as S=s7x7 + s6x6 + s5x5 + s4x4 + s3x3 + s2x2 + s1x+ s0, where s0, s1, s2…. s7 £GF (2) and x is a root of the field polynomial. Then {02}16S = xS = s7x8 + s6x7 + s5x6 + s4x5 + s3x4 + s2x3 + s1x2 + s0x mod p(x) = s6x7 + s5x6 + s4x5 + (s3 + s7) x4 + (s2 + s7) x3 + s1x2 + (s0 + s7) s + s7. Therefore, the “XTime” block can be implemented by 3 XOR gates with only one XOR gate in the critical path.
  • 3. FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm (IJSRD/Vol. 1/Issue 9/2013/0071) All rights reserved by www.ijsrd.com 1983 InvMixColumns() is the inverse of the MixColumns() transformation. InvMixColumns() operates on the State column-by-column, treating each column as a four term polynomial. The columns are considered as polynomials over GF (28 ) and multiplied modulo x4 + 1 with a fixed polynomial a-1 (x), given by a-1 (x) = {0b}x3 + {0d}x2 + {09}x + {0e}. Similarly, in the InvMixColumns transformation, can be rewritten as S’0c = ({02}16(S0c + S1c) + (S2c + S3c) + S1c) + ({02}16({04}16(S0c + S2c) + {04}16(S1c + S3c)) + {04}16(S0c + S2c)) S’1c = ({02}16(S1c + S2c) + (S3c + S0c) + S2c) + ({02}16({04}16(S1c + S3c) + {04}16(S2c + S2c)) + {04}16(S1c + S3c)) S’2c = ({02}16(S2c + S3c) + (S0c + S1c) + S3c) + ({02}16({04}16(S2c + S0c) + {04}16(S3c + S1c)) + {04}16(S2c + S0c)) S’3c = ({02}16(S3c + S0c) + (S1c + S2c) + S0c) + ({02}16({04}16(S3c + S1c) + {04}16(S0c + S0c)) + {04}16(S3c + S1c)) Using substructure sharing this can be implemented by the architecture shown. The “X4Time” block, which computes the constant multiplication of {04}16, can be implemented by two serially concatenated “XTime” block. Alternatively, it can also be implemented according to the equation derived below {04}16S = X2 S = s7x9 + s6x8 + s5x7 + s4x6 + s3s5 + s2x4 + s1x3 + s0x2 modp(x). = S5x7 + s4x6 + (s3 + s7) x5 + (s2 + (s6 + s7)) x4 + (s1 + s6) x3 + (s0 + s7) x2 + (s6 + s7)x + s6. InvMixColumns transformation can be implemented as follows: Fig. 4: Circuit diagram for InvMixColumns Meanwhile, the upper half is exactly the same as the architecture for the implementation of the MixColumns. Therefore in a joint encryptor/decryptor implementation, only the architecture needs to be implemented for both the MixColumns and the InvMixColumns transformations. Fig. 5: Implementation of MixColumns/InvMixColumns The architecture above can be used for both MixColumns and inverse MixColumns transformation.(a3,a0,a1,a2) gives the result of MixColumns transformation and (b3,b1,b0,b2) gives the result of inverse MixColumns transformation. Hence a single module can be used for both transformation and hence area can be reduced. V. SIMULATION AND IMPLEMENTATION RESULT Here a single module is used for both mix and inverse column and we can select the required. Fig. 6: Simulation outputs of mix & inverse mix column transformation Parameter Value Device xc3s1500 No of slices 68/13312 No of slice flip flops 32/26624 No of 4 input LUT 118/26624 Minimum input arrival time before clock 9.484ns
  • 4. FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm (IJSRD/Vol. 1/Issue 9/2013/0071) All rights reserved by www.ijsrd.com 1984 Maximum output required time after clock 7.165ns Table. 1: Implementation result of mix & inverse mix column transformation PARAMETER MIX COLOUMN INVERSE MIX COLOU MN MIX&INVE RSE MERGE(OU R DESIGN) Device xc3s1500 xc3s1500 xc3s1500 No of slices 37/13312 81/13312 68/13312 No of slice flip flops 32/26624 32/26624 32/26624 Minimum input arrival before clock 4.605ns 8.204ns 9.484ns Maximum output required time after clock 7.165ns 7.165ns 7.165ns Table. 2: Comparison of mix and inverse mix column VI. CONCLUSION Instead of using two different modules of mix and inverse mix column transformation, a single module can be used for both transformations. It reduces the overall area of consumption of the AES algorithm. REFERENCES [1] Advanced Encryption Standard (AES), FIPS PUB 197, Nov. 26, 2001, Federal Information Processing Standards publication 197. [2] X. Zhang, K. K. Parhi, "High-speed VLSI architectures for the AES algorithm", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, v.12 n.9, p.957-967, September 2004. [3] H. Kuo, and I. Verbauwhede. "Architecture optimization for a 1.82Gbit/s VLSI implementation of the AES Rijndael algorithm”. Proc. 3rd Int.CHES 2001, May 2001, pp. 51-64. [4] Practical Implementation of Rijndael S-Box Using Combinational Logic Edwin NC Mui Custom R & D Engineer, Texco Enterprise Ptd. Ltd. [5] On the Optimum Constructions of Composite Field for the AES Algorithm Xinmiao Zhang, Member, IEEE, and Keshab K. Parhi, Fellow, IEEE [6] A High-Throughput Cost-Effective ASIC Implementation of the AES Algorithm978-1-4244- 3870-9/09/$25.00 ©2009 IEEE.
  翻译: