Escolar Documentos
Profissional Documentos
Cultura Documentos
1
be divided into three parts as shown in Fig.1, according to
Daemen and Rijmen: initial part (Key Expansion,
AddRoundKey), iteration part – so-called round (SubBytes,
ShiftRows, MixColumns, AddRoundKey), final part
(SubBytes, ShiftRows an AddRoundKey).
Figure.3.ShiftRow
E. MixColumn
This operation processes in Fig.4each column
separately. It is substitution which works in the Galois Field
polynomial g(x) = 𝑥 8 + 𝑥 4 + 𝑥 3 + 𝑥 2 + 𝑥 1 .Matrix from the
previous step 2.3 ShiftRows is multiplied by so-called
Figure.1. AES block_diagram Mixing matrix, which is listed in the Table and that is the
basis of MixColumns transformation. The column of the
B. Key Expansion original matrix is multiplied by mixing matrix, and this will
create a new column of the transformed matrix.
The expansion of the key is performed at the beginning of
each encryption.The original input key is used for the
initiation part, the newly calculate keys are used for another
ten rounds. The number of rounds depends on the length of
the key
C. Substitute Byte
It is a simple substitution shown in Fig.2, where to every
input byte a predefined value of output byte is assigned.Each
Figure.4.MixColumn
byte is divided into two hexadecimal digits. The row in the
table is determined by the first digit and the column by using
the second digit. The substitution table consists of all 256
possible combinations of an input byte. If the input data block F. Add Round Key
is 16 bytes, each byte is replaced with a new value specified The last transformation is the addition of the round key. A
according to the substitution table. subsequent operation of addition between the matrix and the
key is made using logical operation XOR as shown in Fig.5.
The input data block is the same size as the encryption key,
therefore it is 128bits. Both of these values are known, so we
D. ShiftRow
can immediately perform a logical XOR operation.
When rows are rotated, the individual rows of the matrix
are adjusted as follows.There will be no change in the first
row of the matrix. Each byte of these row is shifted by one
byte to the left. Similarly, the third row is shifted by offsets of
two and the fourth rowis shifted by three bytes. This shifting
process is shown in Fig.3.
Figure.5.AddRoundKey
Figure.2.SubByte
2
1V. PROPOSED METHOD V. SIMULATION RESULTS
Figure.7.Pipeline process
3
Table 1. Comparison of Obtained results
Throughput 25 77.2
Figure.9.Simulation results of proposed AES algorithm
Number of 3 16
GCLKs
Max Frequency 515 412
4
VII. REFERENCES 13. A. Dandalis, V.K. Prasanna, and J.D.P. Rolim, “A
Comparative Study of Performance of AES Final
1. Jason Van Dyken, Jose G. Delgado-Frias, “FPGA Candidates Using FPGAs,” Proc. Third Advanced
schemes for minimizing the power-throughput trade- Encryption Standard (AES) Candidate Conf., Apr.
off in executing the Advanced Encryption Standard 2016.
algorithm" Journal of Systems Architecture pp. 116– 14. I. M. Verbauwhede, P.R. Schaumont, and, H. Kuo,
123,2010. "Design and Performance Testing of a 2.29 Gb/s
2. PRAVIN B. TEWARI, MRS. JAYMALA K. Rijndael Processor, "IEEE J. of Solid State-Circuit,
PATIL,AMIT B. CHOUGULE, “Efficient Hardware Vol.38, No. 3, March 2003, pp. 569 – 572,2017.
Design and Implementation of AES Cryptosystem”, 15. Xilinx, Inc., "Virtex 2.5 V Field Programmable Gate
International Journal of Engineering Science and Arrays," http://www. xilinx.com.
Technology Vol. 2(3), 2010.
3. O.S. Gomes, R.L. Moreno, and T.C. Piment, “A fast
cryptography pipelined hardware developed in
FPGA with VHDL", in Ultra Modern
Telecommunications and Control Systems and
Workshops(ICUMT), 2011 3rd International
Congress,pp.1-6, IEEE,2011.
4. T. Hoang et al, “An efficient FPGA implementation
of the AES algorithm" in computing and
communication technologies, research, innovation
and vision for the future(RIVF), IEEE
Conference,pp.1-4,2012.
5. P.N. Khose and V.G. Raut, “Implementation of AES
algorithm in FPGA for low area consumption", in
ICPC, International Conference,pp.1-4, IEEE,2015.
6. O.S. Dhede and S. Shah, “A review: Hardware
implementation of AES algorithm using minimal
resources on FPGA", in ICPC, International
Conference,pp.1-4, IEEE,2015.
7. Nation Institute of Standards and Technology
(NIST), Data Encryption Standard (DES), National
Technical Information Service, Springfield, VA
22161, Oct. 2015.
8. J. Daemen and V. Rijmen, “AES Proposal:
Rijndael”, AES Algorithm Submission, September
3, 2015.
9. J. Nechvatal et. al., Report on the development of
Advanced Encryption Standard, NIST publication,
Oct 2, 2016.
10. FIPS 197, “Advanced Encryption Standard (AES)”,
November 26, 2016.
11. K. Gaj and P. Chodowiec, Comparison of the
hardware performance of the AES candidates using
reconfigurable hardware, in The Third AES
Candidates Conference, printed by the National
Institute of Standards and Technology.
12. K. Gaj and P. Chodowiec, Comparison of the
hardware performance of the AES candidates using
reconfigurable hardware, in the Third AES
Candidates Conference, printed by the National
Institute of Standards and Technology,2016.