0% found this document useful (0 votes)
18 views6 pages

High Throughput and Fully Pipelined FPGA Implementation of AES-192 Algorithm

This document presents a high throughput FPGA implementation of the AES-192 encryption algorithm, achieving a throughput of 54.52 Gbps and a maximum operational frequency of 425.996 MHz. The implementation utilizes techniques such as loop-unrolling, fully pipelining, and sub-pipelining to enhance performance, particularly in complex operations like Mix-columns and S-boxes. The paper includes an overview of the AES algorithm, details of the proposed implementation, results, and conclusions regarding its effectiveness for high-speed applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

High Throughput and Fully Pipelined FPGA Implementation of AES-192 Algorithm

This document presents a high throughput FPGA implementation of the AES-192 encryption algorithm, achieving a throughput of 54.52 Gbps and a maximum operational frequency of 425.996 MHz. The implementation utilizes techniques such as loop-unrolling, fully pipelining, and sub-pipelining to enhance performance, particularly in complex operations like Mix-columns and S-boxes. The paper includes an overview of the AES algorithm, details of the proposed implementation, results, and conclusions regarding its effectiveness for high-speed applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

,QWHUQDWLRQDO&RQIHUHQFHRQ,QQRYDWLYH7UHQGVLQ&RPPXQLFDWLRQDQG&RPSXWHU(QJLQHHULQJ ,7&(¶ $VZDQ(J\SW)HE

High Throughput and Fully Pipelined FPGA


Implementation of AES-192 Algorithm
Mona Sayed Abdul-Karim1, Kamel Hussien Rahouma2 and Khalid Nasr3.
Electronics and communication section, Electrical Engineering Dept.
Faculty of Engineering, Minia University.
Minia, Egypt.
[email protected], [email protected], [email protected]

Abstract— AES (Advanced Encryption Standard) is one of the To do that, we apply the loop-unrolling, fully pipelining, and
most common and secured symmetric key cryptographic sub-pipelining techniques. Also, other efficient methods are
algorithms. AES has received considerable attention from utilized for the most complex parts of AES-192 such as Mix-
scientists in latest years due to its broad spectrum of applications columns, S-boxes. Such implementation is highly fast and thus
such as communication, military, network, electronic banking,
it can be utilized in high speed networks. The rest of this paper
Internet of Things (IoT), etc. AES can be implemented using
software and hardware. Hardware implementation can be based is organized as follows: Section II presents an overview of the
on Field Programmable Gate Array (FPGA). By using hardware, AES algorithm. Section III presents the proposed high
a higher data rate for fast applications such as routers can be throughput implementation for AES-192 algorithm. Section IV
achieved compared to software implementation. In this paper we presents results and comparison. Section V highlights some
present an FPGA implementation for AES-192. We employ loop- conclusions and at the end of the paper, a list of the used
unrolling, fully pipelining, and sub-pipelining techniques and references is given.
other efficient methods for the most complex parts of AES-192
such as Mix-columns, S-boxes. Our AES-192 implementation II. OVERVIEW OF ADVANCED ENCRYPTION STANDARD
using Xilinx Defense-Grade Virtex-7(XQ7VX330T-RF1157)
FPGA achieves high throughput of 54.52 Gbps and maximum
The National Institute of Standards and Technology (NIST)
operational frequency of 425.996 MHZ. published the Advanced Encryption Standard (AES) in 2002
[2]. It is released to replace Data Encryption Standard (DES)
Keywords— High-throughput, AES-192, fully pipelining, sub- [13-14]. The overall structure of the AES encryption process is
pipelining, FPGA shown in Fig. 1. The plain text message is divided into blocks
each of which is 16 bytes (128 bits) long. The key length is
I. INTRODUCTION taken 16, 24, or 32 bytes (128, 192, or 256 bits). Thus, the
algorithm is referred to as AES-128, AES-192, or AES-256,
Cryptography is the art and science of Encryption and
based on the key length [15]. In this paper we will present an
decryption. Encryption converts clear understandable
implementation for AES-192. AES-192 gives higher
information (i.e., plain text, audio or video) into a ciphered
percentage of encryption which makes it more secure than
form which is unclear and not understandable. Decryption
AES-128.
converts the ciphered form into the original information [1].
All operations in AES (i.e., addition, multiplication, and
Cryptographic algorithms are classified into symmetric and
division) are performed on 8-bits over the finite field GF(28)
asymmetric. In symmetric systems, the decryption and
decryption use the same keys. In asymmetric systems, the with the irreducible polynomial represented in Eq. 1 [15-16]:
encryption and decryption use different keys which are related ݉ሺܺሻ ൌ ܺ ଼ ൅ ܺ ସ ൅  ܺ ଷ ൅ ܺ ൅ ͳሺͳሻ
by a certain function. AES is a familiar popular symmetric key
Thus, each processed block is 16 bytes which are arranged as
cryptographic algorithm. Recently, AES has earned a
a 4 * 4 square matrix. This matrix is copied into the state array,
considerable attention from researchers due to its wide range
which is modified at each stage of encryption or decryption.
of applications in communication, military, network,
After the final stage, the resulting state array is copied into the
electronic banking, Internet of Things (IoT), etc. AES can be
output matrix [15-16].
implemented in either hardware or software form. Hardware
From Fig. 1, we can deal with AES in four main parts [16]:
can be implemented using reconfigurable devices such as
1) Adding an initial key
Field-Programmable Gate Arrays (FPGA) which gives high
performance requirements. 2) The middle rounds (1:11 in case of the AES-192)
Hardware implementation can also use the loop-unrolling 3) The final round
[2– 11] and partial rolling [12] techniques in order to increase 4) The key expansion unit
throughput to area ratio and to decrease the area cost.
In the first part, an initial key is added to the plain text block
Moreover, to increase running frequency and throughput,
using Add Round Key operation. In the second part, each
pipelining and sub-pipelining techniques can be applied. This
middle round contains four transformations
paper aims to introduce a FPGA implementation of AES-192.

978-1-7281-4801-4/20/$31.00 ©2020 IEEE


137
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on January 06,2025 at 03:36:31 UTC from IEEE Xplore. Restrictions ap
. These are the S-box (substitute bytes), the Shift Rows, the C. Mix-Columns Transformation
Mix Columns and the Add Round Key. These transformations
are applied to the state array. In the final round, the Mix Mix-Columns operation is processed individually based on
Columns transformation is removed [16-17]. the elements of each column of the state array. Each byte of a
column is replaced by a new value which is a function of all
four bytes in that column. Each column is represented by a four
term polynomial over GF(28). The column is multiplied by a
fixed polynomial a(x) given in Eq. 4 and then moduloሺܺ ସ ൅ ͳሻ
is computed. Eq. 5 presents a computation for the Mix-columns
transformation in matrix multiplication [15], [20].

ܽሺ‫ݔ‬ሻ ൌ ሺͲ͵ሻ‫ ݔ‬ଷ ൅ ሺͲͳሻ‫ ݔ‬ଶ ൅ ሺͲͳሻ‫ ݔ‬൅ ሺͲʹሻሺͶሻ


݀଴ Ͳʹ Ͳ͵ Ͳͳ Ͳͳ ݅଴
݀ଵ Ͳͳ Ͳʹ Ͳ͵ Ͳͳ ݅
൦ ൪ൌ൦ ൪ ൈ ൦ ହ ൪ሺͷሻ
݀ଶ Ͳͳ Ͳͳ Ͳʹ Ͳ͵ ݅ଵ଴
݀ଷ Ͳ͵ Ͳͳ Ͳͳ Ͳʹ ݅ଵହ

D. Add Round Key Transformation

The state array is added to the round key array over GF(28).
As mentioned before, this addition in GF(28) is performed
using a bitwise XOR operation [16].

E. Key expansion

Fig. 1. The structure of AES-192 Each round has its own key which is generated from the
original key using key expansion. A total of Nb(Nr+ 1) words
are generated from the key expansion. The AES algorithm
A. Substitute Bytes Transformation (S-Box) performs Nr rounds and each round needs an initial set of Nb
S-box is an invertible byte substitution transformation. It words of key data. The resulting key schedule consists of a
replaces each byte of the state array independently by a linear array of 4-byte words, denoted [wi], with i in the range
corresponding byte value using a look-up table with a fixed Ͳ ൑ ݅ ൏ ܾܰሺܰ‫ ݎ‬൅ ͳሻ [21].
size of 256 bytes. [16]. The S-box offers non-linearity and
KeyExpansion (byte key[4*Nk], word w[Nb*(Nr+1)],
confusion based on multiplicative inverse and affine
Nk)
transformation as shown in Eq.2 and 3 [16], [18].
begin
word temp
ܵሺܺሻ ൌ ‫݉ݎ݋݂ݏ݊ܽݎݐ݂݂݁݊݅ܣ‬ሺܺ ିଵ ሻሺʹሻ
i=0
while (i < Nk)
ͳ ͳ ͳ ͳ ͳ Ͳ Ͳ Ͳ ݅଻ Ͳ
w[i] = word(key[4*i], key[4*i+1], key[4*i+2],
Ͳ ͳ ͳ ͳ ͳ ͳ Ͳ Ͳ ݅଺ ͳ
‫Ͳۇ‬ ‫ۊ ۇ ۊ ۇ‬ key[4*i+3])
Ͳ ͳ ͳ ͳ ͳ ͳ Ͳ‫ۊ‬ ݅ହ
‫ۋͳ ۈ ۋ ۈ‬
‫ۈ‬ ‫ۋ‬ ݅ i = i+1
Ͳ Ͳ Ͳ ͳ ͳ ͳ ͳ ͳ‫ۋ‬ Ͳ
‫ ܶܣ‬ൌ  ‫ۈ‬  ൈ  ‫ ۈ‬ସ ‫ ۋ‬൅  ‫ ۋ ۈ‬ሺ͵ሻ end while
‫ͳۈ‬ Ͳ Ͳ Ͳ ͳ ͳ ͳ ͳ‫ۋ‬ ‫݅ۈ‬ଷ ‫ۋͲۈ ۋ‬ i = Nk
‫ͳۈ‬ ͳ Ͳ Ͳ Ͳ ͳ ͳ ͳ‫ۋ‬ ‫݅ۈ‬ଶ ‫ۋͲۈ ۋ‬
ͳ ͳ ͳ Ͳ Ͳ Ͳ ͳ ͳ ݅ଵ ͳ while (i < Nb * (Nr+1))
‫ͳۉ‬ ͳ ͳ ͳ Ͳ Ͳ Ͳ ͳ‫ی‬ ‫݅ۉ‬଴ ‫یͳۉ ی‬ temp = w[i-1]
if (i mod Nk = 0)
temp = SubWord(RotWord(temp)) xor Rcon[i/Nk]
Where, AT refers to Affine transform, ݅ ൌ ܺ ିଵ .
else if (Nk > 6 and i mod Nk = 4)
B. Shift Rows Transformation temp = SubWord(temp)
This transformation, cyclically left shifts each row of the end if
state array with different offsets where the values of the offset w[i] = w[i-Nk] xor temp
depend on the row number. The ith row is circularly left shifted i=i+1
by (i-1) bytes. For instance, the second row is circularly left end while
shifted by one byte and the fourth row is circularly left shifted end
Fig. 2. Pseudo Code for Key Expansion [21].
by three bytes [15], [19].

138
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on January 06,2025 at 03:36:31 UTC from IEEE Xplore. Restrictions ap
The pseudo code of input key expansion is given in Fig. 2 ሺܽ଻ ܺ ଼ ൅ ܽ଺ ܺ ଻ ൅ ܽହ ܺ ଺ ൅ ܽସ ܺ ହ ൅ ܽଷ ܺ ସ ൅ ܽଶ ܺ ଷ ൅ ܽଵ ܺ ଶ ൅
[21]. For AES-192, Nk is 6, Nb is 4, Nr is 12, SubWord() is a ܽ଴ ܺሻ ൌ  ܽ଻  ൈ ሺܺ ଼ ൅ ܺ ସ ൅ ܺ ଷ ൅ ܺ ൅ ͳሻ ൅  ܽ଺ ܺ ଻ ൅ ܽହ ܺ ଺ ൅
function that takes a four-byte input word and applies the S- ܽସ ܺ ହ ൅  ሺܽଷ ൅ܽ଻ ሻܺ ସ ൅ ሺܽଶ ൅ܽ଻ ሻܺ ଷ ൅ ܽଵ ܺ ଶ ൅ ሺܽ଴ ൅ ܽ଻ ሻܺ ൅
box (discussed earlier) to each byte and produces an output ܽ଻ ሺͻሻ
word, RotWord() is a function that performs a cyclic rotation
by one byte and Rcon[i] is the round constant word array. By substituting Eq. 8 in Eq. 7 and then simplifying, Eq. 9 is
obtained and it provides an efficient implementation of
multiplication by 02.
III. PROPOSED HIGH-THROUGHPUT
IMPLEMENTATION FOR AES-192 ALGORITHM B. Efficient S-box method using logic optimization based on
Our implementation is based on some previous work for truth table
AES128 [16]. In this paper, we modify this work by using
loop-unrolling to remove all required loops in AES algorithm Implementation of S-box based on composite field
which leads us to modify the critical path. We also employ full approach has high hardware complexities. Thus, an efficient
and sub-pipelining techniques to increase operational pipelined S-box implementation is used [16],[23]. It utilizes
frequency. Fig. 3 shows the general block diagram of loop- the combinational logic to solve the unbreakable delay
unrolled and pipelined AES-192. Fig. 4 shows a general sub- incurred by look-up tables. It also reduces the critical path
pipelined round of AES-192 [16],[22]. delay caused by composite field arithmetic. The S-box
transformation has a 16 ×16 bytes table. Thus, its truth table
contains 128 rows. This truth table provides an 8-bit output.
So, it is very difficult to simplify this big and complex table.
The solution is to divide the truth table of S-box into 16 sub-
truth table based on 4 least significant (or most) bits of the main
truth table. These 4 bits will be the input of sixteen module
logic functions (M1, M2, M3… M16) as shown in Fig. 5.

Fig. 3. The block diagram of loop-unrolled and pipelined AES-192

Fig. 4. The block diagram of Sub-pipelined round of AES-192.

A. Efficient Mix-Columns Transformation


Mix-Columns transformation is computed by applying
equations (4-5) [16]. The Mix-Columns matrix contains only
00;01;02, and 03 numbers. There is no processing time for
multiplication with 00 and 01. Also, the implementation of Fig. 5. Architecture of S-box using logic circuits.
multiplication with 03 is performed using Eq. 6 where a is an
element of GF(28). In [16] a mix-columns transformation for Simplification of these functions is derived using the
AES-128 is presented. we will use it in our implementation. Karnaugh map which is implemented using SOP (Sum of
͵ ൈ ܽ ൌ ʹ ൈ ܽ ൅ ܽሺ͸ሻ Products) approach by basic gates such as AND, OR, and
According to equations (4-5), multiplication with 02 can be NOT. After simplification of the sub-truth tables, sixteen 8-bit
written as follows: logic output functions are provided. Another 4 bit data of least
ʹ ൈ ܽ ൌ ሺܽ଻ ܽ଺ ܽହ ܽସ ܽଷ ܽଶ ܽଵ ܽ଴ ሻ ൈ ሺͲͲͲͲͲͲͳͲሻ݉‫݀݋‬ሺܺ ଼ ൅ ܺ ସ significant bit (LSB) are selected to be the input of a 16 to 1
൅ܺ ଷ ൅ ܺ ൅ ͳሻሺ͹ሻ multiplexer that will derive the final output of the S-box. An
efficient 16 to 1 multiplexer is proposed using five small 4 to
Thus, we have:
1 multiplexers as shown in Fig. 5 [16]. This method allows us
ʹ ൈ ܽ ൌ(ܽ଻ ܺ ଼ ൅ ܽ଺ ܺ ଻ ൅ ܽହ ܺ ଺ ൅ ܽସ ܺ ହ ൅ ܽଷ ܺ ସ ൅ ܽଶ ܺ ଷ ൅ to insert some registers between these multiplexers in order to
ܽଵ ܺ ଶ ൅ܽ଴ ܺሻ݉‫݀݋‬ሺܺ ଼ ൅ ܺ ସ ൅ ܺ ଷ ൅ ܺ ൅ ͳሻሺͺሻ accomplish sub-pipelining resulting in a decrease of critical
delay path and enhancing the S-box speed.
We can say that,

139
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on January 06,2025 at 03:36:31 UTC from IEEE Xplore. Restrictions ap
IV. RESULTS AND COMPARISON

A. Simulation Results

The previous modified AES-192 is programmed using


VHDL and simulation results are taken using ModelSim 10.3
as shown in Fig. 6.

Fig. 6 Timing Simulation of AES-192 using ModelSim 10.3.

Fig. 6 shows the timing simulation of the overall AES-192


algorithm. Input signal RST is used to reset the design, input
signal CLK is used to trigger the design, input signal PlainTxt
Fig. 7. RTL schematic of S-Box operation.
represents the message to be encrypted, output signal
CipherTxt represents the final encrypted message after 12
rounds. Signals K1 to K12 represent the sub-keys that are
generated from the original one (KEY) using key expansion
unit.

B. Implementation Results

FPGA implementation of AES-192 is carried out using


Defense-Grade Virtex-7 XQ7VX330T-RF1157 with Xilinx
Fig. 8. RTL schematic of one round of AES-192.
ISE Design Suite 14.7 as a synthesis tool. The top level RTL
schematics are given in figures 7, 8 and 9 to establish the fact
that the HDL codes are synthesizable.

Fig. 7 shows the RTL schematic of S-box operation, which


consists of five multiplexers, sixteen logic functions (M1, M2,
M3… M16) and pipelining registers as discussed earlier in
Fig.5.

Fig. 8 shows the RTL schematic of one round of the overall


Fig. 9. RTL schematic of AES-192 algorithm.
algorithm, which consists of some pipelining registers and the
main operations of each round (Add round key, Mix-columns,
Shift rows and Sub bytes).
The power (static and dynamic) analysis summary of the
Fig. 9 shows the RTL schematic of the overall algorithm, design at the maximum clock frequency (425.996 MHZ) is
which consists of 12 rounds, pipelining registers and expansion given in Fig. 10
key unit.

140
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on January 06,2025 at 03:36:31 UTC from IEEE Xplore. Restrictions ap
TABLE II. Comparison with previous work.

Device Throughput Max. Freq.


(MHZ)
Our Defense- 54.52 Gbps 428.996
Implementation Grade Virtex-7
(XQ7VX330T-RF1157)
[1] Virtex-5vlx50t (ff1136) 1.069 Gbps 100.251
[24] Virtex-7 XC7VX690T 1.07 Gbps 260.516
[13] VIRTEX-5 XC5VLX50 948.56 Mbps ---

V. CONCLUSIONS
In this paper we presented an FPGA implementation for
Fig. 10. Power analysis of AES-192 algorithm at maximum freq.
AES-192 using loop-unrolling, fully pipelining, and sub-
pipelining techniques and other efficient methods for the most
complex parts of AES-192 such as Mix-columns and S-box.
Table I gives the device utilization summary of AES-192 Our implementation of AES-192 using Xilinx Defense-Grade
implementation. Virtex-7 (XQ7VX330T-RF1157) FPGA achieves high
throughput of 54.52 Gbps and maximum operational frequency
TABLE I. Device utilization summary of AES-192. of 425.996 MHZ.

Logic Utilization Used Available Utilization


Number of Slice 48000 408000 11% REFERENCES
Registers [1] Mahmood A. Siddiqui, Kanwal Aslam, Adnan Afroz, Faheem Haider
Rizvi, Implementation of Advanced Encryption Standard (AES) 192 Bit
Number of Slice 43673 204000 21%
on FPGA, Journal of Computer Science of Newports Institute of
LUTs
Communications and Economics, 2014, pp. 35-46.
Number of fully used 40768 50905 80% [2] G.P. Saggese, A. Mazzeo, N. Mazzocca, A.G. Strollo, An fpga-based
LUT-FF pairs performance analysis of the unrolling, tiling, and pipelining of the AES
algorithm, in: Field Programmable Logic and Application, Springer,
Number of bonded 450 600 75%
2003, pp. 292–302.
IOBs
[3] A. Hodjat, I. Verbauwhede, A 21.54 gbits/s fully pipelined AES
Number of 2 32 6% processor on FPGA, 12th Annual IEEE Symposium on Field-
BUFG/BUFGCTRLs Programmable Custom Computing Machines, 2004, pp. 308-309.
[4] F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, Efficient
implementation of rijndael encryption in reconfigurable hardware:
improvements and design tradeoffs, Cryptographic Hardware and
Embedded Systems-CHES, 2003, pp. 334–350.
C. Comparison [5] X. Zhang, K.K. Parhi, High-speed VLSI architectures for the AES
algorithm, IEEE Trans. Very Large Scale Integration (VLSI) Systems,
Hardware implementation of encryption algorithms can be 2004, pp. 957–967.
[6] K. Gaj, P. Chodowiec, FPGA and ASIC implementations of AES,
characterized by multiple performance parameters such as Cryptographic Engineering, Springer, 2009, pp. 235–294.
latency and throughput [6]. Encryption/decryption throughput [7] S. Qu, G. Shou, Y. Hu, Z. Guo, Z. Qian, High throughput, pipelined
is described as the number of encrypted or decrypted bits in a implementation of AES on FPGA, International Symposium on
time unit. Typically, the encryption and decryption Information Engineering and Electronic Commerce, pp. 542–545.
[8] Y. Zhang, X. Wang, Pipelined implementation of AES encryption based
throughputs are equal. Consequently, only one parameter is on FPGA, IEEE International Conference on Information Theory and
reported. A typical unit of throughput is Mbit/s (megabit per Information Security (ICITIS), 2010, pp. 170–173.
second) or Gbit/s (gigabit per second) [6]. [9] N.C. Iyer, P. Anandmohan, D. Poornaiah, V. Kulkarni, High throughput,
Encryption/decryption latency is described as the time low cost, fully pipelined architecture for AES crypto chip, Annual IEEE
India Conference, 2006, pp. 1–6.
consumed to encrypt a single block of plaintext or to decrypt [10] L. Ali, I. Aris, F.S. Hossain, N. Roy, Design of an ultra high speed AES
its ciphertext. The typical unit of latency is ns (nanosecond). processor for next generation it security, Computer and Electrical
Latency and throughput are related by the following equation Engineering, 2011, pp. 1160–1170.
[6]. [11] K. Rahimunnisa, P. Karthigaikumar, N.A. Christy, S.S. Kumar, J.
Jayakumar, PSP: Parallel sub-pipelined architecture for high throughput
AES on FPGA and ASIC, Central European Journal of Computer
݄ܶ‫ݐݑ݌݄݃ݑ݋ݎ‬ Science, 2013, pp. 173–186.
‫ ݁ݖ݅ܵ݇ܿ݋݈ܤ‬ൈ ܰ‫ݕ݈ݏݑ݋݁݊ܽݐ݈ݑ݉݅ܵ݀݁ݏݏ݁ܿ݋ݎܲݏ݇ܿ݋݈ܤ݂݋ݎܾ݁݉ݑ‬ [12] Q. Hui, T. Sasao, Y. Iguchi, A design of AES encryption circuit with
ൌ
‫ݕܿ݊݁ݐܽܮ‬ 128-bit keys using look-up table ring on FPGA, IEICE Transactions on
Information and Systems, 2006, pp. 1139–1147.
Comparison between our implementation and previous work [13] S. El Adib, N. Raissouni, A. Chahboun, A. Azyat, M. Lahraoua, N. Ben
Achhab, A. Abbous, O. Benarchid and M. Dahman, Implementation of
in terms of throughput and maximum frequency is given at the AES-128, AES-192, and AES-256 On Virtex-5 FPGAs: Device
Table II.

141
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on January 06,2025 at 03:36:31 UTC from IEEE Xplore. Restrictions ap
Resources and Execution Time Reduction, International Journal of
Research in Electrical & Electronics Engineering, , 2013, pp. 08-12.
[14] Cheng Wang and Howard M. Heys, Using a Pipelined S-Box in
Compact AES Hardware Implementations, Proceedings of the 8th IEEE
International NEWCAS Conference, pp. 101-104.
[15] William Stallings, Cryptography and Network Security Principles and
Practices, Sixth Edition, Pearson Education, Inc., 2013, pp. 129-173.
[16] Abolfazl Soltani, Saeed Sharifian, An ultra-high throughput and fully
pipelined implementation of AES algorithm on FPGA, Microprocess.
Microsyst.39, 2015, pp. 480-493.
[17] Liting Yu, Dongrong Zhang, Liang Wu, Shuguo Xie, Donglin Su,
Xiaoxiao Wang, AES Design Improvements Towards Information
Security Considering Scan Attack, 17th IEEE International Conference
On Trust, Security And Privacy In Computing And Communications/
12th IEEE International Conference On Big Data Science And
Engineering, 2018, pp. 322-326.
[18] Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, A Proposal for
Improving AES S-box with Rotation and KeyDependent, International
Conference on Cyber Security, Cyber Warfare and Digital Forensic
(CyberSec), 2012, pp. 38-42.
[19] Soufiane Oukili, Seddik Bri, A.V. Senthil Kumar, High speed efficient
FPGA implementation of pipelined AES S-Box, 4th IEEE International
Colloquium on Information Science and Technology (CiSt), 2016, pp.
901-905.
[20] Rizky Riyaldhi, Rojali, Aditya Kurniawan, Improvement of Advanced
Encryption Standard with Shift Row and S.Box Modification Mapping
in Mix Column, 2nd International Conference on Computer Science and
Computational Intelligence, 2017, pp. 401-407.
[21] Rijmen and J. Daemen, Advanced encryption standard. Federal
Information Processing Standards Publications, National Institute of
Standards and Technology, 2001, pp. 19-22.
[22] Anuroop K.B, Neema M, Fully Pipelined-Loop unrolled AES with
Enhanced Key Expansion, IEEE International Conference On Recent
Trends In Electronics Information Communication Technology, 2016,
pp. 988-992.
[23] Nabihah Ahmad, Rezaul Hasan, Warsuzarina Mat Jubadi, Design of aes
s-box using combinational logic optimization, in: IEEE Symposium on
Industrial Electronics & Applications (ISIEA), 2010, pp. 696–699.
[24] N. S. SAI SRINIVAS, MD. AKRAMUDDIN, FPGA Based Hardware
Implementation of AES Rijndael Algorithm for Encryption and
Decryption, International Conference on Electrical, Electronics, and
Optimization Techniques (ICEEOT), 2016, pp. 1769-1776.

142
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on January 06,2025 at 03:36:31 UTC from IEEE Xplore. Restrictions ap

You might also like