Documente Academic
Documente Profesional
Documente Cultură
REVIEW ARTICLE
PG Scholor, ECE Department, Kongunadu College of Engineering and Technology, Trichy, India
gomathimp@gmail.com
2
147tamil@gmail.com
3
Asst.Professor, ECE Department, Kongunadu College of Engineering and Technology, Trichy, India
jayapal385@gmail.com
1
Abstract
Secure communication is necessary in transmitting data especially in the field of military, government and private Institutions.
Security is also necessary to store the information in addition to transmission. For this secure communication encryption is
used. It is also used in network security. This paper surveys about different techniques involved in the AES algorithm. It also
explains various methods involved to decrease area, increase speed and applications in different fields.
Key words
AES, Low Power, Encryption and Decryption
INTRODUCTION
Cryptography is used for keeping information secure
from unauthorized people. The history of cryptography
stretches from the times of ancient Egypt to today and
its importance is increasing day by day. People are
interested in protecting their information for different
reasons. The ancient Chinese used the ideographic
nature of their character-based language to hide the
trade secrets of silk manufacturing. While Germans
used Enigma machine during Second World War to
protect their military secrets from the enemies. In recent
years, with the explosive advancement of computers,
Internet and interconnectivity the dependence of both
organizations and individuals on the information stored
and communicated using these systems has increased.
This, in turn, has led to a heightened awareness of the
need to secure data and resources from hacking and
intrusion. Many lessons were learnt with the ignorance
of security measures over Internet. Now cryptography
has become mandatory and it is considered as a basic
building block for the security of any computer system
or network.
Network
Round of
operation
Block
size(bits)
Key size(bits)
Created by
Year
Triple DES
Feistel Network
48
64
112 or 168
IBM
1978
Blowfish
Feistel Network
16
128
Bruce Schneier
1993
Joan Daemen&
Vincent Rijmen
1998
Substitution10,12 or 14
Permutation Network
Table I: Comparison of different encryption algorithm
AES
128
128,192 or
256
128,192 or
256
Please Cite this Article at: M.P.Gomathi et al, Journal of Current Engineering Research, 4 (2), March-April 2014, 7-10
AES ALGORITHM
AES is a byte-oriented, symmetric block cipher. It
consists of data blocks of 128 bits (4 words) and keys
with 128, 192, and 256 bits. AES is capable of
processing additional block sizes (160, 192, and 244
bits) and key lengths (160 and 244 bits). Figure 1 shows
the AES encryption process.
DIFFERENT
TECHNIQUES
FOR
THE
HARDWARE IMPLEMENTATION OF S-BOX
One of the most common and straight forward
implementation of the S-Box for the SubByte operation
which was done in previous work was to have the precomputed values stored in a ROM based lookup table.
In [5], 128-bit AES encryption and decryption was
designed using Rijndael Algorithm and synthesized
using verilog code which can be easily implemented
with the help of FPGA. In this implementation, all 128
values are stored in a ROM and the input byte would be
wired to the ROMs address bus. However, this method
suffers from an unbreakable delay since ROMs have a
fixed access time for its read and write operation. This
implementation is expensive in terms of hardware.
Figure 2 shows the implementation of S-box using
Look Up Table(LUT).
Please Cite this Article at: M.P.Gomathi et al, Journal of Current Engineering Research, 4 (2), March-April 2014, 7-10
CONCLUSION
In this paper, various techniques used to implement Sbox in AES algorithm are analyzed. These various
techniques are implemented to achieve high throughput,
low power. AES algorithm is also used in image
encryption. It plays a vital role in security.
REFERENCES
[1] Wong M.M. Wong M.L.D. Nandi A.K. and Hijazin I.
(2012). Construction of Optimum Composite Field
Architecture for Compact High-Throughput AES SBoxes. IEEE Trans. Very Large Scale Integer.(VLSI)
systems,vol.20., No.6,.
[2] AlirezaHodjat and Ingrid Verbauwhede,(2006). AreaThroughput Trade-offs for Fully Pipelined 30 to 70
Gbits/s AES Processors. IEEE TRANSACTIONS ON
COMPUTERS, VOL. 55, No. 4.
[3] G. Alisha Evangeline, S. Krithiga and S. Sheeba Rani
Gnanamalar, (2013). Least Complex S-Box and Its Fault
Detection for Robust Advanced Encryption Standard
Algorithm, IEEE.
[4] Rudra A, Dubey P K, Jutla C S, Kumar V, Rao J R, and
Rohatgi P, (2001). Efficient implementation of Rijndael
Please Cite this Article at: M.P.Gomathi et al, Journal of Current Engineering Research, 4 (2), March-April 2014, 7-10
[5]
[6]
[7]
[8]
10