SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2148
AN EFFICIENT VLSI ARCHITECTURE FOR AES AND its FPGA
IMPLEMENTATION
Siddesh G K, Shruthi J
Professor, and Guide, Dept of ECE, JSSATE, Bengaluru, Karnataka, India
M. Tech, (VLSI Design, and Embedded Systems), JSSATE, Bengaluru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Security is the most vital element in information
communicationsystem, wheregreaterrandomizationinsecret
keys increases the safety as well as the complexity of the
cryptography algorithms. The algorithms corresponding to
DES, Triple DES are compensating with enormous memory
spaces and cannot be executed on the hardware platform. By
using Field programmable gate arrays(FPGA'S) we can
implement hardware platform situation owing to its
reconfiguration nature, low chargeandadvertisingspace. The
main objective of this paper is to reduce the delay in order to
speed up the process by using pipelining. The RIJNDAEL
cryptography algorithmic rule may be a block cipher used to
encrypt/decrypt digital information and is capable of using
cryptographical keys of 128, 192 and 256 bits. A unique
characteristic of the proposed pipelined layout is that the
round keys, that are consumed during distinct iterations of
encryption, are generated in parallel with the encryption
method. The overall delay related to each round key of coding
delay of a plaintext block is reduced. This approach can by
experimentation simulate the usage of Xilinx programming
with Verilog hardware Description Language and hardware
implementation on FPGA Spartan 3E.
Key Words: AES, Cipher text, Cryptography, FPGA,
Pipelining, Rijndael(Encryption, Decryption).
1. INTRODUCTION
Information needs to be secured from an unauthorized
party. Cryptography is one in all of the secured mechanisms
to protect data from public access. Cryptography is a Greek
origin word this means that “secret writing” to make the
records at ease and proof against attacks. Traditional
cryptography was used for top-secret communications
between humans. These days it's changed into the
algorithmic program based mostly cryptography keep with
demand through the users. It consists of 2 methods
encryption and decryption, inside the primary method
encryption; the plain text (original message) might be
converted into secured textual content or Ciphertext
(Encrypted message) using a specific algorithm. Besides,
decoding here ciphertext might be changed into the plain
content the utilization of all the reverse process connected
for encryption. AES encryption is based on a personal key
(additionally referred to as a symmetric key) and public key
algorithm. personal Key algorithms contain only one key,
each for encryption as well as decryption whereas; public
key algorithms involve a pair of keys,one forencryption and
other for decryption. Advancedencryptionstandardisbased
on a public key algorithm.
2. ADVANCED (AES) ENCRYPTION
STANDARD/RIJNDAEL
The AES is a subset of a much larger encryption algorithm
known as Rijndael, which become one among many
proposals to the NIST competing for becominga widespread
encryption algorithm. On October of 2000, the NIST
introduced the Rijndael algorithm as thewinnerduetohigh-
quality normal routing in security, overall performance,
efficiency, implementation capability, and ease.
The AES algorithm is a symmetric cipher. In Symmetric
ciphers, a single secret key is used for both the encryption
and decryption, whereas in asymmetric ciphers, there are
two sets of keys referred to as a private key and public keys.
The plaintext has encrypted the usage of the public key and
can only be decrypted using the private key.
Further, the AES algorithm is a block cipher because it
operates on fixed-length groups of bits(blocks), whereas in
stream ciphers, the plaintext bits are encrypted one by one,
and the set of transformations carried out to successive bits
may also vary throughout the encryption technique.
The AES algorithm operates on blocks of 128 bits, with the
aid of the usage of cipher keys with lengths of 128, 192 or
256 bits for the encryption process. The inputandoutputfor
the AES algorithms are blocks of 128 bits. The cipher key
input is a series of 128, 192 or 256 bits. In different words,
the length of the cipher key, NK, is either 4,6 or 8 words
which represent the number of columns in the cipher key.
The AES algorithm is classified into three versions based
totally on cipher key length.
3. AES ALGORITHM
All operations are performed on a two- dimensional 4x4
array of bytes which is called the state, and any individual
byte within the state is referred to as Sr,c, where 'r' represent
the row and 'c' denotes the column. At the beginning of the
encryption process, the state is populated withtheplaintext.
Then the cipher key performs a set of substitutions and
permutations in the state. After the cipher operations are
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2149
conducted in the state, the final value of the state iscopiedto
the ciphertext output.
The AES cipher operates on state or an entire row/column.
Then, an initial Round Key addition isperformedinthestate.
Round keys are derived from the cipher key using the Key
expansion routine. The key expansion routine generates a
sequence of round keys for every round of transformations
that are performed on the state.
The transformations performed in each state array are
different and each round depends on cipher key.Eachround
of AES cipher(except the last one) consists of all the
following transformations. SubBytes(s-box), ShiftRows,
MixColumns, AddRoundKey.
3.1 Bytes substitution
This transformation operates on each byte of thestate using
substitution table which is a non-linear byte. Substitution
table consists of ff rows/columns.
Fig(1a)
3.2 Shift rows
With the Shift Row, transformation first row is not shifted
and the remaining three rows are shifted circularly. In the
second row, one byte is left shifted circularly. For the three
row, a 2-byte round left shift is done. For the fourth row, a
three-byte round left shift is accomplished. And for the
decryption technique, it will be shifting towards right
circularly.
Fig(1b)
3.3 Mix Columns Transformation
This transformation is based on Galois field multiplication.
Each byte of a column is changed with the different value
that may be a feature of all 4 bytes in the given column. The
transformation operates on the state column, treating each
column as a polynomial. The columns are considered as
polynomials over GF (28).
Fig(1c)
3.4 AddRoundKey
The AddRoundKey operation is meant as a cipher; all the
128 bits of the state unit of activity XORed with four, 32-bit
words of the extended key on account of key enlargement.
AddRoundKey is the most effective operation that entails
using the key to making sure safety. The AES key expansion
set takes a four-word (16-byte) as input and produces a
linear array of 44 words.
Fig(1d)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2150
Below figure shows block diagram of RIJNDAEL
encryption/decryption.
(a) Encryption (b)Decryption
fig(2a) Rijndael encryption/decryption
4. AES KEY EXPANSION
The AES algorithm requires 4 words of round keys for each
encryption round. That can be a typical offour*(Nr+1)round
keys thinking about the initial set of keys required for the
number one upload round Key transformation. All of the
round keys are derived from the cipher key itself.
The AES key expansion algorithm takes as inputa four-word
key and produces a linear array of 44 words. The Key is
copied into the primary 4 words of the expanded key. Then
the rest of the key is filled in 4 words at a time. Each added
word w[i] relies upon on the straight away preceding word,
w[i− 1],and the word four positions returned w[i − 4]. In
three out of four instances, a simple XOR is used.
Every round uses four of these words as shown in fig 2(b).
Each word incorporates 32 bytes whichsuggest eachsubkey
is 128 bits long.
Fig (2b) AES key expansion
5. METHODOLOGY
As discussed above the round key generation in the
proposed design is pipelined with the encryption rounds.
The pipelined operation of round key expansion and the
cipher is shown in fig 2(c). Each AES encryption round 'n' is
pipelined with the key generation for round 'n+1'.
Pipelining techniques offer improvement in speed with the
cost in terms of area. By using pipelining methodology very
high throughput and efficiency are achieved.
The most important advantage of the pipelined design is the
lower delay for each encryption iteration.
since the round keys for every encryption, iteration is
present at the beginning of the iteration cycle. The lower
delay in every encryption, iteration means that quicker
completion of every round of encryption. This reduces the
overall encryption delay and allows the design to control at
higher clock frequencies. The higher clock frequency will
increase the message encryption rate making its design
suitable for time critical encryption applications.
Fig(2c) pipelined Round key generation and cipher
rounds
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2151
Fig 2(d) below shows complete pipelined structure which
consists of k registers. One pipeline stage consists of one
round and each round consists of different transformation.
The key output of the first transformation is fed as input to
the second transformation through registers and so on till it
completes last round.
Fig(2d) pipelined structure
6. RESULTS AND OUTCOME
In this project, a hardware accelerator for the AES128
encryption algorithm was designed, modeled and verified
using the System Verilog hardware description language.
The pipelined design of the AES encryption algorithm
reduces the delay related to every round of encryption, that
allows the hardware to control at a way higher clock
frequencies, compared to a non-pipelined design. This will
increase the message encryption throughput and makes the
hardware model appropriate for time essential encryption
applications. Additionally, the hardware implementation of
AES encryption algorithm provides final secrecy of the
encryption key, with much faster speed compared to
software implementation, and higher throughput by means
of inherent hardware concurrency.
ACKNOWLEDGEMENT
I express my sincere gratitude to Dr.Siddesh G K Dept ofECE
JSSATE, Bengaluru, for his stimulating guidance, &
constructive suggestionstoimprovethequalityofthis paper.
REFERENCES
[1]Joan Daemen and Vincent Rijmen, The design of Rijndael,
AES, Springer-Verlag 2002.
[2]International Journal of Advances in Engineering &
Technology, May 2012. AN EFFICIENT FPGA
IMPLEMENTATION OF AES ALGORITHM Shylashree.N,
Nagarjun Bhat and V. Shridhar Research Scholar (R.N.S.I.T),
in E.C.E, at PESCE, Mandya, Karnataka, India.
[3]ARPN Journal of Engineering and Applied Sciences.
VLSI Implementation of Enhanced AES Cryptography
Lakavath Srinivas, Zuber M. Patel, B Chandra Sekhar Naik
Electronics Department, SVNIT, Surat, Gujarat, India, 2
Assistant Professor, Electronics Department, SVNIT, Surat,
Gujarat, India.
[4]International Journal Of Advanced Research and
Innovation -Vol.7, Issue. FPGA Based ImplementationofAES
Encryption and Decryption with Verilog HDL Y.Aruna1,
Prof.S.N.Shelke2 M.Tech (Electronics), JDCOE, Nagpur.
Algorithm in FPGA Device,” in IEEE, 2007.
[5]Shylashree. N, Nagarjun Bhat, and V Sridhar, “FPGA
implementations of advanced encryption standard”: a
survey,” in ijaet, 2012.
[6]Mr. Atul M. Borkar, Dr. R. V. Kshirsagar and Mrs. M. V.
Vyawahare “FPGA Implementation of AES Algorithm” 2011
IEEE
[7]William Stalling (2006), Network Security Essential
Applications and Standards(chapter 4.6 Finite Fields of the
Form GF(2n)) , New Jersey Pearson, Education, 2000.
[8]L.Thulasimani, ”A Single Chip DesignandImplementation
of AES-128/192/256 Encryption Algorithms”-International
Journal of Engineering Science and Technology,
Vol.2(5),2010,1052-1059.

More Related Content

PDF
Hardware implementation of aes encryption and decryption for low area & power...
PDF
Implementation of aes and blowfish algorithm
PDF
hardware implementation of aes encryption and decryption for low area & low p...
PPTX
Rc6 algorithm
PDF
G05124550
PDF
Enhanced Advanced Encryption Standard (E-AES): using ESET
PDF
Advanced Encryption Standard (AES)
PPTX
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
Hardware implementation of aes encryption and decryption for low area & power...
Implementation of aes and blowfish algorithm
hardware implementation of aes encryption and decryption for low area & low p...
Rc6 algorithm
G05124550
Enhanced Advanced Encryption Standard (E-AES): using ESET
Advanced Encryption Standard (AES)
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

What's hot (20)

PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
PDF
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
PDF
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
PDF
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PDF
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
PDF
cns 2marks
PDF
Simulated Analysis and Enhancement of Blowfish Algorithm
PDF
AES by example
PPTX
Blow fish final ppt
PDF
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
PDF
Wireless Network Security Architecture with Blowfish Encryption Model
PPT
Minor Project- AES Implementation in Verilog
PPT
Fault Detection Scheme for AES Using Composite Field
PPT
RC4&RC5
PDF
Fpga based encryption design using vhdl
PDF
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PDF
Aes 128 192_256_bits_project_report
PDF
Hybrid AES DES
PDF
Analysis of symmetric key cryptographic algorithms
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
cns 2marks
Simulated Analysis and Enhancement of Blowfish Algorithm
AES by example
Blow fish final ppt
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
Wireless Network Security Architecture with Blowfish Encryption Model
Minor Project- AES Implementation in Verilog
Fault Detection Scheme for AES Using Composite Field
RC4&RC5
Fpga based encryption design using vhdl
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
Aes 128 192_256_bits_project_report
Hybrid AES DES
Analysis of symmetric key cryptographic algorithms
Ad

Similar to An Efficient VLSI Architecture for AES and It's FPGA Implementation (20)

PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
PDF
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
PDF
Image encryption and decryption using aes algorithm
PDF
Renas Rajab Asaad
PDF
Secure image encryption using aes
PDF
Secure image encryption using aes
PDF
IRJET - Enhancement in AES Algorithm
PPTX
694 lecture1aes
PPTX
Information and data security advanced encryption standard (aes)
PPT
AES.ppt
PPTX
Lecture # 007 AES.pptx
PDF
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
PPTX
Cryptography
PDF
EFFECTIVE AES IMPLEMENTATION
PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
PDF
Analytical Study of AES and Proposed Variant with Enhance Block Length and Ke...
PDF
PPT
AES.ppt
“Optimized AES Algorithm Core Using FeedBack Architecture”
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Image encryption and decryption using aes algorithm
Renas Rajab Asaad
Secure image encryption using aes
Secure image encryption using aes
IRJET - Enhancement in AES Algorithm
694 lecture1aes
Information and data security advanced encryption standard (aes)
AES.ppt
Lecture # 007 AES.pptx
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
Cryptography
EFFECTIVE AES IMPLEMENTATION
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Analytical Study of AES and Proposed Variant with Enhance Block Length and Ke...
AES.ppt
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Welding lecture in detail for understanding
PPTX
Sustainable Sites - Green Building Construction
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
web development for engineering and engineering
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
DOCX
573137875-Attendance-Management-System-original
PPTX
Geodesy 1.pptx...............................................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Internet of Things (IOT) - A guide to understanding
R24 SURVEYING LAB MANUAL for civil enggi
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT on Performance Review to get promotions
Welding lecture in detail for understanding
Sustainable Sites - Green Building Construction
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT 4 Total Quality Management .pptx
OOP with Java - Java Introduction (Basics)
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
web development for engineering and engineering
Lecture Notes Electrical Wiring System Components
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
573137875-Attendance-Management-System-original
Geodesy 1.pptx...............................................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Internet of Things (IOT) - A guide to understanding

An Efficient VLSI Architecture for AES and It's FPGA Implementation

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2148 AN EFFICIENT VLSI ARCHITECTURE FOR AES AND its FPGA IMPLEMENTATION Siddesh G K, Shruthi J Professor, and Guide, Dept of ECE, JSSATE, Bengaluru, Karnataka, India M. Tech, (VLSI Design, and Embedded Systems), JSSATE, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Security is the most vital element in information communicationsystem, wheregreaterrandomizationinsecret keys increases the safety as well as the complexity of the cryptography algorithms. The algorithms corresponding to DES, Triple DES are compensating with enormous memory spaces and cannot be executed on the hardware platform. By using Field programmable gate arrays(FPGA'S) we can implement hardware platform situation owing to its reconfiguration nature, low chargeandadvertisingspace. The main objective of this paper is to reduce the delay in order to speed up the process by using pipelining. The RIJNDAEL cryptography algorithmic rule may be a block cipher used to encrypt/decrypt digital information and is capable of using cryptographical keys of 128, 192 and 256 bits. A unique characteristic of the proposed pipelined layout is that the round keys, that are consumed during distinct iterations of encryption, are generated in parallel with the encryption method. The overall delay related to each round key of coding delay of a plaintext block is reduced. This approach can by experimentation simulate the usage of Xilinx programming with Verilog hardware Description Language and hardware implementation on FPGA Spartan 3E. Key Words: AES, Cipher text, Cryptography, FPGA, Pipelining, Rijndael(Encryption, Decryption). 1. INTRODUCTION Information needs to be secured from an unauthorized party. Cryptography is one in all of the secured mechanisms to protect data from public access. Cryptography is a Greek origin word this means that “secret writing” to make the records at ease and proof against attacks. Traditional cryptography was used for top-secret communications between humans. These days it's changed into the algorithmic program based mostly cryptography keep with demand through the users. It consists of 2 methods encryption and decryption, inside the primary method encryption; the plain text (original message) might be converted into secured textual content or Ciphertext (Encrypted message) using a specific algorithm. Besides, decoding here ciphertext might be changed into the plain content the utilization of all the reverse process connected for encryption. AES encryption is based on a personal key (additionally referred to as a symmetric key) and public key algorithm. personal Key algorithms contain only one key, each for encryption as well as decryption whereas; public key algorithms involve a pair of keys,one forencryption and other for decryption. Advancedencryptionstandardisbased on a public key algorithm. 2. ADVANCED (AES) ENCRYPTION STANDARD/RIJNDAEL The AES is a subset of a much larger encryption algorithm known as Rijndael, which become one among many proposals to the NIST competing for becominga widespread encryption algorithm. On October of 2000, the NIST introduced the Rijndael algorithm as thewinnerduetohigh- quality normal routing in security, overall performance, efficiency, implementation capability, and ease. The AES algorithm is a symmetric cipher. In Symmetric ciphers, a single secret key is used for both the encryption and decryption, whereas in asymmetric ciphers, there are two sets of keys referred to as a private key and public keys. The plaintext has encrypted the usage of the public key and can only be decrypted using the private key. Further, the AES algorithm is a block cipher because it operates on fixed-length groups of bits(blocks), whereas in stream ciphers, the plaintext bits are encrypted one by one, and the set of transformations carried out to successive bits may also vary throughout the encryption technique. The AES algorithm operates on blocks of 128 bits, with the aid of the usage of cipher keys with lengths of 128, 192 or 256 bits for the encryption process. The inputandoutputfor the AES algorithms are blocks of 128 bits. The cipher key input is a series of 128, 192 or 256 bits. In different words, the length of the cipher key, NK, is either 4,6 or 8 words which represent the number of columns in the cipher key. The AES algorithm is classified into three versions based totally on cipher key length. 3. AES ALGORITHM All operations are performed on a two- dimensional 4x4 array of bytes which is called the state, and any individual byte within the state is referred to as Sr,c, where 'r' represent the row and 'c' denotes the column. At the beginning of the encryption process, the state is populated withtheplaintext. Then the cipher key performs a set of substitutions and permutations in the state. After the cipher operations are
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2149 conducted in the state, the final value of the state iscopiedto the ciphertext output. The AES cipher operates on state or an entire row/column. Then, an initial Round Key addition isperformedinthestate. Round keys are derived from the cipher key using the Key expansion routine. The key expansion routine generates a sequence of round keys for every round of transformations that are performed on the state. The transformations performed in each state array are different and each round depends on cipher key.Eachround of AES cipher(except the last one) consists of all the following transformations. SubBytes(s-box), ShiftRows, MixColumns, AddRoundKey. 3.1 Bytes substitution This transformation operates on each byte of thestate using substitution table which is a non-linear byte. Substitution table consists of ff rows/columns. Fig(1a) 3.2 Shift rows With the Shift Row, transformation first row is not shifted and the remaining three rows are shifted circularly. In the second row, one byte is left shifted circularly. For the three row, a 2-byte round left shift is done. For the fourth row, a three-byte round left shift is accomplished. And for the decryption technique, it will be shifting towards right circularly. Fig(1b) 3.3 Mix Columns Transformation This transformation is based on Galois field multiplication. Each byte of a column is changed with the different value that may be a feature of all 4 bytes in the given column. The transformation operates on the state column, treating each column as a polynomial. The columns are considered as polynomials over GF (28). Fig(1c) 3.4 AddRoundKey The AddRoundKey operation is meant as a cipher; all the 128 bits of the state unit of activity XORed with four, 32-bit words of the extended key on account of key enlargement. AddRoundKey is the most effective operation that entails using the key to making sure safety. The AES key expansion set takes a four-word (16-byte) as input and produces a linear array of 44 words. Fig(1d)
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2150 Below figure shows block diagram of RIJNDAEL encryption/decryption. (a) Encryption (b)Decryption fig(2a) Rijndael encryption/decryption 4. AES KEY EXPANSION The AES algorithm requires 4 words of round keys for each encryption round. That can be a typical offour*(Nr+1)round keys thinking about the initial set of keys required for the number one upload round Key transformation. All of the round keys are derived from the cipher key itself. The AES key expansion algorithm takes as inputa four-word key and produces a linear array of 44 words. The Key is copied into the primary 4 words of the expanded key. Then the rest of the key is filled in 4 words at a time. Each added word w[i] relies upon on the straight away preceding word, w[i− 1],and the word four positions returned w[i − 4]. In three out of four instances, a simple XOR is used. Every round uses four of these words as shown in fig 2(b). Each word incorporates 32 bytes whichsuggest eachsubkey is 128 bits long. Fig (2b) AES key expansion 5. METHODOLOGY As discussed above the round key generation in the proposed design is pipelined with the encryption rounds. The pipelined operation of round key expansion and the cipher is shown in fig 2(c). Each AES encryption round 'n' is pipelined with the key generation for round 'n+1'. Pipelining techniques offer improvement in speed with the cost in terms of area. By using pipelining methodology very high throughput and efficiency are achieved. The most important advantage of the pipelined design is the lower delay for each encryption iteration. since the round keys for every encryption, iteration is present at the beginning of the iteration cycle. The lower delay in every encryption, iteration means that quicker completion of every round of encryption. This reduces the overall encryption delay and allows the design to control at higher clock frequencies. The higher clock frequency will increase the message encryption rate making its design suitable for time critical encryption applications. Fig(2c) pipelined Round key generation and cipher rounds
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2151 Fig 2(d) below shows complete pipelined structure which consists of k registers. One pipeline stage consists of one round and each round consists of different transformation. The key output of the first transformation is fed as input to the second transformation through registers and so on till it completes last round. Fig(2d) pipelined structure 6. RESULTS AND OUTCOME In this project, a hardware accelerator for the AES128 encryption algorithm was designed, modeled and verified using the System Verilog hardware description language. The pipelined design of the AES encryption algorithm reduces the delay related to every round of encryption, that allows the hardware to control at a way higher clock frequencies, compared to a non-pipelined design. This will increase the message encryption throughput and makes the hardware model appropriate for time essential encryption applications. Additionally, the hardware implementation of AES encryption algorithm provides final secrecy of the encryption key, with much faster speed compared to software implementation, and higher throughput by means of inherent hardware concurrency. ACKNOWLEDGEMENT I express my sincere gratitude to Dr.Siddesh G K Dept ofECE JSSATE, Bengaluru, for his stimulating guidance, & constructive suggestionstoimprovethequalityofthis paper. REFERENCES [1]Joan Daemen and Vincent Rijmen, The design of Rijndael, AES, Springer-Verlag 2002. [2]International Journal of Advances in Engineering & Technology, May 2012. AN EFFICIENT FPGA IMPLEMENTATION OF AES ALGORITHM Shylashree.N, Nagarjun Bhat and V. Shridhar Research Scholar (R.N.S.I.T), in E.C.E, at PESCE, Mandya, Karnataka, India. [3]ARPN Journal of Engineering and Applied Sciences. VLSI Implementation of Enhanced AES Cryptography Lakavath Srinivas, Zuber M. Patel, B Chandra Sekhar Naik Electronics Department, SVNIT, Surat, Gujarat, India, 2 Assistant Professor, Electronics Department, SVNIT, Surat, Gujarat, India. [4]International Journal Of Advanced Research and Innovation -Vol.7, Issue. FPGA Based ImplementationofAES Encryption and Decryption with Verilog HDL Y.Aruna1, Prof.S.N.Shelke2 M.Tech (Electronics), JDCOE, Nagpur. Algorithm in FPGA Device,” in IEEE, 2007. [5]Shylashree. N, Nagarjun Bhat, and V Sridhar, “FPGA implementations of advanced encryption standard”: a survey,” in ijaet, 2012. [6]Mr. Atul M. Borkar, Dr. R. V. Kshirsagar and Mrs. M. V. Vyawahare “FPGA Implementation of AES Algorithm” 2011 IEEE [7]William Stalling (2006), Network Security Essential Applications and Standards(chapter 4.6 Finite Fields of the Form GF(2n)) , New Jersey Pearson, Education, 2000. [8]L.Thulasimani, ”A Single Chip DesignandImplementation of AES-128/192/256 Encryption Algorithms”-International Journal of Engineering Science and Technology, Vol.2(5),2010,1052-1059.