AES Algorithm using Dynamic Shift Rows, Sub Bytes and Mix Column Operations for Systems Security wih Optimal Delay

Author:

K Gavaskar1ORCID,S Ragupathy U1,G Ravivarma1,S Priyadharshan P1

Affiliation:

1. Kongu Engineering College

Abstract

Abstract In the digital world, all the transmitted data is vulnerable and prone to attack. To reduce the vulnerability, security is needed for the data. The security of the data can be enhanced by implementing cryptographic techniques. Thus, the sender and the receiver can only view the data by implementing cryptography, whereas a third party cannot intervene. Cryptographic algorithms are used in the IoT, online banking, Web servers, etc. The Advanced Encryption Standard (AES) is symmetric-key cryptography; it has the same key for both the encryption and decryption process. Each step in the AES algorithm is modified by using the key generated for each round, so each step of the AES is made key-dependent. This gives the dynamic AES algorithm. However, the delay and area are comparatively higher than the traditional method. Thus, the proposed method involves combining two steps, the sub-byte transformation and shifting rows. By doing this, the registers used to store the sub-byte data are removed. Thus, eliminating registers leads to less area consumption. Simulation is done using Verilog HDL in ModelSim and the synthesis is done in Xilinx Design Suite.

Publisher

Research Square Platform LLC

Reference32 articles.

1. "A novel method of improvement in advanced encryption standard algorithm with dynamic shift rows, sub byte and mixcolumn operations for the secure communication";Kumar T;International Journal of Information Technology,2020

2. Sulaiman, J. J. R. M., Salasiah, & Jazrin Ramli. (2012). and. "Enhancing advanced encryption standard S-box generation based on round key",International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol.1, No.3, pp183–188

3. Sukhanya, M., & Gavaskar, K. (2017, March). Functional verification environment for I2C master controller using system verilog. In 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) (pp. 1–6). IEEE

4. Galety, M. G., Atroshi, C. A., & Arul Kumar, N. (2019). "Improved Crypto Algorithm for High-Speed Internet of Things (IoT) Applications", International Conference on Information, Communication and Computing Technology

5. Low power self-controllable voltage level and low swing logic based 11T SRAM cell for high speed CMOS circuits;Gavaskar K;Analog Integrated Circuits and Signal Processing,2019

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3