A Pipelined FPGA Implementation of an Encryption Algorithm based on Genetic Algorithm

被引:1
作者
Thirer, Nonel [1 ]
机构
[1] HIT, Fac Engn, Dept Elect & Elect Engn, Holon, Israel
来源
MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VII | 2013年 / 8751卷
关键词
Cryptography; AES; Genetic algorithm; FPGA Implementation; Pipeline;
D O I
10.1117/12.2014829
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the evolution of digital data storage and exchange, it is essential to protect the confidential information from every unauthorized access. High performance encryption algorithms were developed and implemented by software and hardware. Also many methods to attack the cipher text were developed. In the last years, the genetic algorithm has gained much interest in cryptanalysis of cipher texts and also in encryption ciphers. This paper analyses the possibility to use the genetic algorithm as a multiple key sequence generator for an AES (Advanced Encryption Standard) cryptographic system, and also to use a three stages pipeline (with four main blocks: Input data, AES Core, Key generator, Output data) to provide a fast encryption and storage/transmission of a large amount of data.
引用
收藏
页数:7
相关论文
共 22 条
[1]  
Affenzeller M, 2009, NUMER INSIGHT, pXXV
[2]  
Agarwal A., 2012, INT J ADV RES COMPUT, V2, P216
[3]  
[Anonymous], GLOBAL J COMPUTER SC
[4]  
[Anonymous], FED INF PROC STAND P
[5]  
Bergmann K.P., 2008, 10th annual conference on Genetic and evolutionary computation, ACM New York, NY, USA, P1099
[6]  
Chitu C., 2002, HARDWARE IMPLEMENTAT, pI507
[7]  
Chodowiec P, 2003, LECT NOTES COMPUT SC, V2779, P319, DOI 10.1007/978-3-540-45238-6_26
[8]  
Deshpande A. M., 2009, P INT C CONTR AUT CO
[9]  
Garrett A., 2007, INT J INTELLIGENT CO, V12, P325
[10]  
LIN FT, 1995, GENETIC ALGORITHM CI, P650