A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application

被引:17
作者
Kumar, Thanikodi Manoj [1 ]
Reddy, Kasarla Satish [2 ]
Rinaldi, Stefano [3 ]
Parameshachari, Bidare Divakarachari [4 ]
Arunachalam, Kavitha [5 ]
机构
[1] Karpagam Inst Technol, Dept Elect & Commun Engn, Coimbatore 641105, Tamil Nadu, India
[2] CVR Coll Engn, Dept Elect & Commun Engn, Hyderabad 501510, India
[3] Univ Brescia, Dept Informat Engn, Via Branze 38, I-25123 Brescia, Italy
[4] GSSS Inst Engn & Technol Women, Dept Telecommun Engn, Mysuru 570016, India
[5] M Kumarasamy Coll Engn, Dept ECE, Karur 639113, India
关键词
advanced encryption standard; composite field arithmetic; device security; Look-Up Table; modified positive polarity reed muller; pipeline; SubBytes; HIGH-THROUGHPUT; BLOCK CIPHER; PERFORMANCE; ALGORITHM; HARDWARE; DESIGN; POWER; RESISTANT;
D O I
10.3390/electronics10162023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes. This research article details the low power high-speed hardware architectures for the efficient field programmable gate array (FPGA) implementation of the advanced encryption standard (AES) algorithm to provide data security. This work does not depend on the Look-Up Table (LUTs) for the implementation the SubBytes and InvSubBytes stages of transformations of the AES encryption and decryption; this new architecture uses combinational logical circuits for implementing SubBytes and InvSubBytes transformation. Due to the elimination of LUTs, unwanted delays are eliminated in this architecture and a subpipelining structure is introduced for improving the speed of the AES algorithm. Here, modified positive polarity reed muller (MPPRM) architecture is inserted to reduce the total hardware requirements, and comparisons are made with different implementations. With MPPRM architecture introduced in SubBytes stages, an efficient mixcolumn and invmixcolumn architecture that is suited to subpipelined round units is added. The performances of the proposed AES-MPPRM architecture is analyzed in terms of number of slice registers, flip flops, number of slice LUTs, number of logical elements, slices, bonded IOB, operating frequency and delay. There are five different AES architectures including LAES, AES-CTR, AES-CFA, AES-BSRD, and AES-EMCBE. The LUT of the AES-MPPRM architecture designed in the Spartan 6 is reduced up to 15.45% when compared to the AES-BSRD.
引用
收藏
页数:22
相关论文
共 54 条
  • [1] FPGA implementation of sound encryption system based on fractional-order chaotic systems
    Abd El-Maksoud, Ahmed J.
    Abd El-Kader, Ayman A.
    Hassan, Bahy G.
    Rihan, Nader G.
    Tolba, Mohamed F.
    Said, Lobna A.
    Radwan, Ahmed G.
    Abu-Elyazeed, Mohamed F.
    [J]. MICROELECTRONICS JOURNAL, 2019, 90 : 323 - 335
  • [2] Abdulazeez A.M., 2013, INT J SCI ENG RES, V4, P1988
  • [3] FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
    Abed, Sa'ed
    Jaffal, Reem
    Mohd, Bassam Jamil
    Alshayeji, Mohammad
    [J]. SENSORS, 2019, 19 (04)
  • [4] Reliable and Fault Diagnosis Architectures for Hardware and Software-Efficient Block Cipher KLEIN Benchmarked on FPGA
    Aghaie, Anita
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (04) : 901 - 905
  • [5] Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission
    Ahmad, Rafidah
    Kho, Daniel
    Abd Manaf, Asrulnizam
    Ismail, Widad
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (01) : 471 - 489
  • [6] Lightweight Hardware Architectures for the Present Cipher in FPGA
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2017, 64 (09) : 2544 - 2555
  • [7] Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
    Chen, Hao
    Wang, Tao
    Zhang, Fan
    Zhao, Xinjie
    He, Wei
    Xu, Lumin
    Ma, Yunfei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [8] De Meyer L., 2018, IACR T CRYPTOGR HARD, P596, DOI [10.46586/tches.v2018.i3.596-626, DOI 10.46586/TCHES.V2018.I3.596-626]
  • [9] Dedé A, 2015, 2015 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS), P276
  • [10] Del Rosal Edni., 2017, Journal of Circuits and Systems, V8, P237, DOI DOI 10.4236/CS.2017.89016