Hierarchical Dynamic Key Generation and Selective Transformation Model for Optimized AES Block Cipher Core
Keywords:
AES (Advanced Encryption Standard), FPGA (field programmable gate array), LUT (Look up table), Mbps (megabit per second), sub (sub bytes), shift (shift rows), mix (mix column), add (add round key).Abstract
The inadequacies inherent in the existing cryptosystem have driven the development of new optimal hardware architecture and to exploit the benefits of cipher key characteristics and associated key generation tasks in cryptosystems for high-performance security systems. In this work, some of the prominent issues related to the existing AES core system, namely, lack of data rate, vulnerability towards attacks, reliability and discriminative key management problems are considered and solved using appropriate hierarchical transformation measures. Here inner stage pipelining is introduced over composite field based S-box transformation models to reduce the path delay. In addition to that, this work also includes some bit level masking technique for AES which constitutes simpler arithmetic such as inverter and modulo operation. With improved diffusion and confusion metrics this bit masking transformation model mitigates key management related issues in AES. An extensive analysis of data rate performance proved that proposed AES model offers improved system performance as compared to conventional AES core and robustness of improved FF masking model and associated security improvements in AES system is also proved with appropriate test input stimulus models.
References
- M. Rajeswara Rao, Dr.R.K.Sharma, SVE Department, NIT Kurushetra FPGA Implementation of combined S-box and Inv S-box of AES 2017 4th International conference on signal processing and integrated networks (SPIN).
- Nalini C. Iyer ; Deepa ; P.V. Anandmohan ; D.V. Poornaiah Mix/InvMixColumn decomposition and resource sharing in AES .
- Xinmiao Zhang, Student Member, IEEE, and Keshab K. Parhi, Fellow, High Speed VLSI architectures for the AES Algorithm , IEEE. VOL.12. No.9. September 2004
- Shrivathsa Bhargav, larry Chen, abhinandan Majumdar, Shiva Ramudit 128 bit AES Decryption , CSEE 4840 – Embedded system Design spring 2008, Columbia University.
- Atul M. Borkar ; R. V. Kshirsagar ; M. V. Vyawahare FPGA implementation of AES algorithm .
- Announcing the ADVANCED ENCRYPTION STANDARD (AES), November 26 2001.
- Yulin Zhang ; Xinggang Wang; Pipelined implementation of AES encryption based on FPGA 2010 IEEE International Conference on Information Theory and Information Security.
- Yuwen Zhu ; Hongqi Zhang ; Yibao Bao ; Study of the AES Realization Method on the Reconfigurable Hardware 2013 International Conference on Computer Sciences and Applications.
- Tsung-Fu Lin ; Chih-Pin Su ; Chih-Tsun Huang ; Cheng-Wen Wu; A high-throughput low-cost AES cipher chip Proceedings. IEEE AsiaPacific Conference on ASIC.
- C. Sivakumar ; A. Velmurugan ; High Speed VLSI Design CCMP AES Cipher for WLAN (IEEE 802.11i) 2007 International Conference on Signal Processing, Communications and Networking.
- W. -K. Lee, H. J. Seo, S. C. Seo and S. O. Hwang, "Efficient Implementation of AES-CTR and AES-ECB on GPUs With Applications for High-Speed FrodoKEM and Exhaustive Key Search," in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 69, no. 6, pp. 2962-2966, June 2022, doi: 10.1109/TCSII.2022.3164089.
- G. Peng and S. Zhu, "FPGA Implementation of AES Encryption Optimization Algorithm," 2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), 2021, pp. 650-653, doi: 10.1109/ICITBS53129.2021.00165.
- P. R. Surabhi and T. V. Meenu, "Advanced 256-Bit Aes Encyption With Plain Text Partitioning," 2021 International Conference on Advances in Computing and Communications (ICACC), 2021, pp. 1-3, doi: 10.1109/ICACC-202152719.2021.9708158.
- S. Sharma and A. Pokharana, "Comparative Analysis of AES-ECC and AES-ECDH Hybrid Models for a Client-Server System," 2021 2nd Global Conference for Advancement in Technology (GCAT), 2021, pp. 1-7, doi: 10.1109/GCAT52182.2021.9587474
- N. Cherrid, R. Saidi, T. Bentahar and H. Mayache, "Study of the Sensitivity of an InSAR Interferogram Encrypted by the AES-128 Algorithm," 2021 18th International Multi-Conference on Systems, Signals & Devices (SSD), 2021, pp. 457-462, doi: 10.1109/SSD52085.2021.9429323.
- S. Arman, T. Rehnuma and M. Rahman, "Design and Implementation of a Modified AES Cryptography with Fast Key Generation Technique," 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), 2020, pp. 191-195, doi: 10.1109/WIECON-ECE52138.2020.9397992.
- K. Kumar, A. Kaur, K. R. Ramkumar, A. Shrivastava, V. Moyal and Y. Kumar, "A Design of Power-Efficient AES Algorithm on Artix-7 FPGA for Green Communication," 2021 International Conference on Technological Advancements and Innovations (ICTAI), 2021, pp. 561-564, doi: 10.1109/ICTAI53825.2021.9673435.
- C. Equihua et al., "A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm," in IEEE Latin America Transactions, vol. 19, no. 9, pp. 1443-1450, Sept. 2021, doi: 10.1109/TLA.2021.9468436.
- B. Pandey, V. Bisht, D. M. Akbar Hussain, M. Jamil and M. K. Hasan, "Energy-efficient implementation of AES algorithm on 16nm FPGA," 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), 2021, pp. 740-744, doi: 10.1109/CSNT51715.2021.9509662.
- L. Han, N. Wu, F. Ge, F. Zhou, J. Wen and P. Qing, "Differential Fault Attack for the Iterative Operation of AES-192 Key Expansion," 2020 IEEE 20th International Conference on Communication Technology (ICCT), 2020, pp. 1156-1160, doi: 10.1109/ICCT50939.2020.9295779.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.