Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

FPGA Implementation of High Throughput Dual Key based AES Encryption and Decryption

Author : Naveen Kumar M S 1 Manjunath C Lakhannavar 2

Date of Publication :7th May 2016

Abstract: Data security plays a major role in today’s technology. Cryptography is one of the industry standards in providing data security since many years. Federal Information Processing Standard (FIPS) is approved Advance Encryption Standard (AES) cryptographic algorithm that can be used to protect electronic data. But the conventional scheme of AES is vulnerable for cryptanalysis, due to static S-box which will never vary with the input text/key. Noticeable drawbacks with AES are, it can only support one key, and is prone to easy reverse engineering which can lead to insecure data. Thus S-box value is necessary for changes in input key. In this paper, a new scheme of AES is discussed which involves in the generation of Key based S-Boxes, with dual key AES and implemented in pipeline architecture to improve the throughput with low latency.

Reference :

  1. 1) Advanced Encryption Standard, Federal Information Processing Standards 197”, National Institute of Standards and Technology, November 2001

    2) A.F Webster and S.E Travares, "On The Design of Sboxes," Queen's university Kingston, Springer- verlag, Canada1998

    3) Muhammad Asim, "Efficient and Simple Method for Designing Chaotic S-boxes" Electronic and Telecommunications Research Journal, University of Technology Petronas, Malaysia February 2008.

    4) Xinmiao Zhang and Keshab K. Parhi, “On the Optimum Constructions of Composite Field for the AES Algorithm”, IEEE, VOL. 53, NO. 10, OCTOBER 2006

    5) F. Fahmy and G. Salama, "A proposal for Keydependant AES, " 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (SETIT), TUNISIA March 2005.

    6) Joan Daemen and Vincent Rijmen.“Two-Round AES Differential”. Cryptology ePrint Archive, Report 2006/039, 2006.


Recent Article