A new ASIC implementation of an advanced encryption standard (AES) crypto-hardware accelerator

被引:5
|
作者
Ahmad, Nabihah [1 ]
Hasan, S. M. Rezaul [2 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, Johor Baharu, Malaysia
[2] Massey Univ, Ctr Res Analog & VLSI Microsyst DEsign CRAVE, Auckland, New Zealand
来源
MICROELECTRONICS JOURNAL | 2021年 / 117卷
关键词
AES; Encryption; Decryption; Composite-field; Low-power; High throughput; Low chip-area; Hardware accelerator; S-BOX; EFFICIENT; ARCHITECTURES; COMPACT; AREA;
D O I
10.1016/j.mejo.2021.105255
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Single-chip hardware implementation of Advanced Encryption Standard (AES) offers a low-power and low-area design that is suitable for portable devices. It is widely applicable for numerous encryption needs such as in Bluetooth controller, wireless communication and secure Internet transactions. This paper proposes a new fullcustom compact 8-bit data-path architecture core for a single-chip VLSI AES crypto-hardware accelerator. In order to optimize chip-area, power and performance, novel circuit-level techniques, logic minimization, resource sharing and low supply-voltage has been employed. The proposed design is implemented in 130 nm CMOS process and supports both encryption and decryption in Electronic-Codebook-Mode (EBC) using 128-bit keys. Novel S-box/InvS-box, MixColumn/InvMixColumn and ShiftRow/InvShiftRow using low-power Exclusive-OR (XOR) gate is employed to minimize the power consumption. This design utilized 3120 gate-equivalents (GE), including an on-the-fly key scheduling unit with an active chip-area of 640 mu m x 325 mu m (0.208 sq. mm) excluding the bonding pads. It has a power consumption of 4.23 mu W/MHz and a throughput of 0.05 Gbit/s (at 100 MHz clock). The proposed AES design thus achieved low-power dissipation, higher throughput with a compact chip-size (silicon-area) compared to other recent implementations.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Implementation of Advanced Encryption Standard (AES) and QR Code Algorithm on Digital Legalization System
    Okfalisa
    Yanti, Novi
    Surya, Wahyu Aidil Dita
    Akhyar, Amany
    Ambarwati, Frica A.
    3RD INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENTAL AND INFORMATION SYSTEM (ICENIS 2018), 2018, 73
  • [32] An ASIC Implementation of Low Area AES Encryption Core for Wireless Networks
    Van-Lan Dao
    Anh-Thai Nguyen
    Van-Phuc Hoang
    Tuan-Anh Tran
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2015, : 99 - 102
  • [33] Hardware implementation of a tessellation accelerator for the OpenVG standard
    Kim, Seung Hun
    Oh, Yunho
    Park, Karam
    Ro, Won Woo
    IEICE ELECTRONICS EXPRESS, 2010, 7 (06): : 440 - 446
  • [34] Hardware implementation of AES encryption and decryption system based on FPGA
    Zhu, Shihai
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 1373 - 1377
  • [35] A High Performance Hardware Implementation Image Encryption With AES Algorithm
    Farmani, Ali
    Jafari, Mohamad
    Miremadi, Seyed Sohrab
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
  • [36] Digital Image Encryption Based On Advanced Encryption Standard(AES) Algorithm
    Zhang, Qi
    Qun, Ding
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1218 - 1221
  • [37] Advanced encryption standard (AES) - An update - [Invited paper]
    Knudsen, LR
    CRYPTOGRAPHY AND CODING, 1999, 1746 : 185 - 185
  • [38] Validation of an advanced encryption standard (AES) IP core
    Tomashau, V
    Kean, T
    12TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2004, : 291 - 292
  • [39] Fault based cryptanalysis of the advanced encryption standard (AES)
    Blömer, J
    Seifert, JP
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 162 - 181
  • [40] Advanced Encryption Standard-XTS implementation in field programmable gate array hardware
    Ahmed, Shakil
    Samsudin, Khairulmizam
    Ramli, Abdul Rahman
    Rokhani, Fakhrul Zaman
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 516 - 522