SlideShare a Scribd company logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
95
DATA SECURITY USING ADVANCED ENCRYPTION
STANDARD (AES) IN RECONFIGURABLE HARDWARE
FOR SDR BASED WIRELESS SYSTEMS
Sharanagouda N Patil1
, R.M.Vani2
, P.V.Hunagund3
1
Dept. of Applied Electronics, Gulbarga University, India
2
Dept. of USIC, Gulbarga University, India
3
Dept. of Applied Electronics, Gulbarga University, India
ABSTRACT
A software defined radio (SDR) is a radio transmitter/receiver that uses reconfigurable
hardware and software for encoding/decoding, modulation/demodulation, and encrypting/decrypting.
This allows much more power and flexibility when designing any radio system. The AES algorithm
is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of
using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the
official Advanced Encryption Standard (AES) as it is well suited for reconfigurable hardware. The
Advanced Encryption Standard can be programmed in software or built with hardware. However
Field Programmable Gate Arrays (FPGAs) offer a more customized solution. This paper talks of
AES 128 bit block and 128 bit cipher key and is implemented using VHDL as the hardware
description language. Here a new FPGA-based implementation scheme of the AES-128 (Advanced
Encryption Standard, with 128-bit key) encryption algorithm is proposed for software defined radio
applications. This system aims at reduced hardware structure and high throughput. Xilinx - Project
Navigator, ISE 9.1i suite is used for simulation and synthesis.
Keywords: AES, Cipher text, FPGA, SDR, VHDL
I. INTRODUCTION
With ever increasing demand for mobile communication and emergence of many new
systems and standards like 3G and 4G and even many researches are going to develop new wireless
standards. It has become imperative to implement and design a flexible architecture of radio system
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 6, Issue 1, January (2015), pp. 95-100
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2015): 8.9958 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
96
which accommodates the feature of interoperability and multi functionality and operation of the
devices in heterogeneous, variable operating conditions. Different standards of Mobile
communication use different type of hardware circuitry. The existing mobile communication
standards are primarily designed along national standards and not using a common global standard.
So efforts are going on to develop systems which can support multiple mobile communication
standards using same hardware but changing the software / firmware or a combination of both. This
gave rise to Software Defined Radio which is a new technology being developed.
A SDR refers to any reconfigurable or reprogrammable radio system that can show different
functionality with the same hardware. A Software Defined Radio can simply be defined as “ Radio in
which some or all of the physical layer functions are software defined”. The encryption/decryption
functions of the system are defined using higher abstraction levels of HDLs. Today software defined
technology offers advantages such as improvements or enhancements without altering the radio
hardware, terminals that can cope with the unpredictable dynamic characteristics of highly variable
wireless links, efficient use of radio spectrum and power, and many others. The users can use
relatively generic reprogrammable hardware and customize it to their needs by choosing only the
software implementation that fits their specific application [1,2]. The difference between a digital
radio and an SDR is that a digital radio is not reconfigurable. Although a Digital radio has software
running on it; the functionality of the components cannot be changed on air. New technology
insertion is not available.
II. BACKGROUND OF SOFTWARE DEFINED RADIO
One of the first software radios was the US Air Force’s Integrated Communications
Navigation and Identification Avionics (ICNIA) system, which was developed in the late 1970’s.
The system used a DSP based modem that is reprogrammable for different platforms. ICNIA’s
technology has been the foundation for many other military radios. SDR is a radio communication
technology which is capable of being re-programmed or reconfigured. SPEAKeasy is a joint
Department of Defense and industry program initiated to develop a software programmable radio
operating in the range from 2 MHz to 2 GHz, employing waveforms selected from memory or
downloaded from disk or reprogrammed over the air [3]. The improvements in DSP and ADC
technologies facilitated the shift to software defined radios. Modern functions can be implemented in
software with today’s high DSPs and General Purpose Processors (GPPs). The low power
requirements of the processors enable them to be used in hand terminals. The increased dynamic
operating ranges and higher conversion rates of modern ADCs enables digital processing at higher
bands. The improvements in middleware technologies permit software functionality to be
independent of the underlying hardware [4].The General structure of SDR are given below Figure 1.
Figure 1: General Block Diagram of a SDR
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
97
III. BACKGROUND OF AES
The AES algorithm is a symmetric block cipher that can encrypt and decrypt information.
Encryption converts data to an unintelligible form called cipher-text [5]. Decryption of the cipher-
text converts the data back into its original form, which
is called plain-text.
3.1 AES encryption
The AES algorithm operates on a 128-bit block of data and executed Nr - 1 loop times. A
loop is called a round and the number of iterations of a loop, Nr, can be 10, 12 or 14 depending on
the key length. The key length is 128, 192 or 256 bits in length respectively. The first and last rounds
differ from other rounds in that there is an additional AddRoundKey transformation at the beginning
of the first round and no MixCoulmns transformation is performed in the last round. In this paper, we
use the key length of 128 bits (AES-128) as a model for general explanation
3.1.1 SubBytes Transformation
The SubBytes transformation is a non-linear byte substitution, operating on each of the state
bytes independently. The SubBytes transformation is done using a once-pre-calculated substitution
table called S-box. That S-box table contains 256 numbers (from 0 to 255) and their corresponding
resulting values. More details of the method of calculating the S-box table refers to [4]. In this
design, we use a look-up table as shown in Table 1.
This approach avoids complexity of hardware implementation and has the significant
advantage of performing the S-box computation in a single clock cycle, thus reducing the latency.
3.1.2 ShiftRows Transformation
In ShiftRows transformation, the rows of the state are cyclically left shifted over different
offsets. Row 0 is not shifted, row 1 is shifted one byte to the left, row 2 is shifted two bytes to the left
and row 3 is shifted three bytes to the left.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
98
3.1.3 MixColumns Transformation
In MixColumns transformation, the columns of the state are considered as polynomials over
GF (28
) and multiplied by modulo x4
+ 1 with a fixed polynomialc(x), given by: c(x)={03}x3
+
{01}x2
+ {01}x + {02}.
3.1.4 AddRoundKey Transformation
In the AddRoundKey transformation, a Round Key is added to the State - resulted from the
operation of the MixColumns transformation - by a simple bitwise XOR operation. The RoundKey
of each round is derived from the main key using the Key Expansion algorithm [1]. The
encryption/decryption algorithm needs eleven 128-bit RoundKey, which are denoted RoundKey[0]
RoundKey[10] (the first RoundKey [0] is the main key).
3.2 AES decryption
Decryption is a reverse of encryption which inverse round transformations to computes out
the original plaintext of an encrypted cipher-text in reverse order. The round transformation of
decryption uses the functions AddRoundKey, InvMixColumns, InvShiftRows, and InvSubBytes
successively.
3.2.1 AddRoundKey
AddRoundKey is its own inverse function because the XOR function is its own inverse. The
round keys have to be selected in reverse order. The description of the other transformations will be
given as follows.
3.2.2 InvShiftRows Transformation
InvShiftRows exactly functions the same as ShiftRows, only in the opposite direction. The
first row is not shifted, while the second, third and fourth rows are shifted right by one, two and three
bytes respectively.
3.2.3 InvSubBytes transformation
The InvSubBytes transformation is done using a once-pre- calculated substitution table called InvS-
box. That InvS-box table contains 256 numbers (from 0 to 255) and their corresponding values.
InvS-box is presented in Table II.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
99
3.2.4 InvMixColumns Transformation
In the InvMixColumns transformation, the polynomials of degree less than 4 over GF(28
),
which coefficients are the elements in the columns of the state, are multiplied modulo (x4
+ 1) by a
fixed polynomial d(x) = {0B}x3
+ {0D}x2
+ {09}x + {0E}, where {0B}, {0D}; {09}, {0E} denote
hexadecimal values.The implementation of the AES is carried out using VHDL.
IV.AES IMPLEMENTATION USING VHDL
The Figure 2 shows the AES core architecture implemented for Software Defined radio framework.
Figure 2: Architecture of AES core
V. RESULTS
The following results were obtained for individual steps on AES encryption method. The
design has been coded by VHDL. All the results are simulated using Xilinx ISE simulator. The
results of simulating the encryption algorithm from the ISE simulator are shown in Figure.3
a)
b)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME
100
c)
d)
Figure 3: Simulation waveforms on Xilinx ISE simulator for different steps of encryption. a) S Box
transformation b) Shift row c) Top byte substitution d) Shift row transformation:
VI. CONCLUSIONS
The Advanced Encryption Standard algorithm is a symmetric block cipher that can process
data blocks of 128 bits through the use of cipher keys with lengths of 128, 192, and 256 bits. An
efficient FPGA implementation of 128 bit block and 128 bit key AES algorithm has been presented
in this paper. This can be used for secure data transmission in various wireless communication
standards without changing the hardware. The proposed design is implemented based on the
iterative approach for cryptographic algorithms. There is a lot of potential applications of SDRs and
in future we will see that a wide array of radio applications like Blue- tooth, WLAN, GPRS, Radar,
WCDMA etc. being implemented by using SDR technology [6].
VII. REFERENCES
1. J. Mitola III. Software Radio Architecture. Wiley-Interscience, 2000
2. B. Bing and N. Jayant. A Cell phone for all Standards.IEEE Spectrum, May 2002.
3. SPEAKeasy web page, http://www.if.afrl.af.mil/div/IFB/techtrans/datasheets/Speakeasy
.html
4. M. W. Oliphant. Radio Interfaces Make the Difference in 3G Cellular Systems. IEEE
Spectrum Magazine, Vol. 37,No. 10, October 2000
5. FIPS 197, “Advanced Encryption Standard (AES)”, November 26, 2001.
6. Online reference, Available: http://www.broadcastpapers.com.
7. Anubhav Gupta and Harish Bansal, “Design of Area Optimized AES Encryption Core Using
Pipelining Technology” International journal of Electronics and Communication Engineering
&Technology (IJECET), Volume 4, Issue 2, 2012, pp. 308 - 314, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.

More Related Content

PDF
Wireless data transmission through uart port using arm & rf transceiver
PDF
Designing Of Time and Power Efficient Model for Controlling Of Critical Process
PDF
Modeling & Design of Dtmf Technique Based Automatic Mobile Switching & Contro...
PDF
Allen Bradley PLC V/S Siemens PLC
PDF
Serial Communication Interface with Error Detection
PDF
Mobile robotic platform to gathering real time sensory data in wireless perso...
PDF
A continuous time adc and digital signal processing system for smart dust and...
PDF
A continuous time adc and digital signal processing system for smart dust and...
Wireless data transmission through uart port using arm & rf transceiver
Designing Of Time and Power Efficient Model for Controlling Of Critical Process
Modeling & Design of Dtmf Technique Based Automatic Mobile Switching & Contro...
Allen Bradley PLC V/S Siemens PLC
Serial Communication Interface with Error Detection
Mobile robotic platform to gathering real time sensory data in wireless perso...
A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...

What's hot (19)

PDF
A remote monitoring system for a three phase 10-kva switchable distribution t...
PDF
A remote monitoring system for a three phase 10-kva switchable distribution t...
PDF
GSM Based Device Controlling and Fault Detection
PPT
Practical Data Communications & Networking for Engineers & Technicians
PDF
5x7 matrix led display
PDF
Am044253258
PDF
Development and Application of a Failure Monitoring System by Using the Vibra...
PDF
Secure remote protocol for fpga reconfiguration
PDF
Application of Microcontroller in Transmitter Section of Wireless System
PDF
Optimized Layout Design of Priority Encoder using 65nm Technology
PDF
Network Based Data Acquisition and Logging System using PIC Microcontroller
PDF
RESUME__SUMER SAILI
PDF
IRJET- Digital Pen for Handicapped and Old Age People
PDF
Performance analysis and implementation of modified sdm based noc for mpsoc o...
DOCX
Fpga based heart rate monitoring system using gsm
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
PDF
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
PDF
Implementation of flex sensor for hand gesture based wireless automation of j...
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...
GSM Based Device Controlling and Fault Detection
Practical Data Communications & Networking for Engineers & Technicians
5x7 matrix led display
Am044253258
Development and Application of a Failure Monitoring System by Using the Vibra...
Secure remote protocol for fpga reconfiguration
Application of Microcontroller in Transmitter Section of Wireless System
Optimized Layout Design of Priority Encoder using 65nm Technology
Network Based Data Acquisition and Logging System using PIC Microcontroller
RESUME__SUMER SAILI
IRJET- Digital Pen for Handicapped and Old Age People
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Fpga based heart rate monitoring system using gsm
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
Implementation of flex sensor for hand gesture based wireless automation of j...
Ad

Similar to Data security using advanced encryption standard aes in reconfigurable hardware for sdr based wireless systems (20)

PDF
Design and Implementation A different Architectures of mixcolumn in FPGA
PDF
Iisrt swathi priya(26 30)
PDF
Implementation and Design of AES S-Box on FPGA
PDF
Design of area optimized aes encryption core using pipelining technology
PDF
Wrapped rsa cryptography check on window
PDF
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
PDF
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
PDF
Implementation of the advanced encryption standard algorithm on an FPGA for ...
PDF
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
PDF
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
PDF
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
PDF
Publication
PDF
PDF
Hardware implementation of aes encryption and decryption for low area & power...
PDF
Iaetsd an survey of efficient fpga implementation of advanced encryption
PDF
Implementation of Cryptography Architecture with High Secure Core
PDF
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
PDF
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
PDF
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...
PDF
Fpga implementation of encryption and decryption algorithm based on aes
Design and Implementation A different Architectures of mixcolumn in FPGA
Iisrt swathi priya(26 30)
Implementation and Design of AES S-Box on FPGA
Design of area optimized aes encryption core using pipelining technology
Wrapped rsa cryptography check on window
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
Implementation of the advanced encryption standard algorithm on an FPGA for ...
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
Publication
Hardware implementation of aes encryption and decryption for low area & power...
Iaetsd an survey of efficient fpga implementation of advanced encryption
Implementation of Cryptography Architecture with High Secure Core
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...
Fpga implementation of encryption and decryption algorithm based on aes
Ad

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
sap open course for s4hana steps from ECC to s4
PDF
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine Learning_overview_presentation.pptx
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
sap open course for s4hana steps from ECC to s4
cuic standard and advanced reporting.pdf

Data security using advanced encryption standard aes in reconfigurable hardware for sdr based wireless systems

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 95 DATA SECURITY USING ADVANCED ENCRYPTION STANDARD (AES) IN RECONFIGURABLE HARDWARE FOR SDR BASED WIRELESS SYSTEMS Sharanagouda N Patil1 , R.M.Vani2 , P.V.Hunagund3 1 Dept. of Applied Electronics, Gulbarga University, India 2 Dept. of USIC, Gulbarga University, India 3 Dept. of Applied Electronics, Gulbarga University, India ABSTRACT A software defined radio (SDR) is a radio transmitter/receiver that uses reconfigurable hardware and software for encoding/decoding, modulation/demodulation, and encrypting/decrypting. This allows much more power and flexibility when designing any radio system. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) as it is well suited for reconfigurable hardware. The Advanced Encryption Standard can be programmed in software or built with hardware. However Field Programmable Gate Arrays (FPGAs) offer a more customized solution. This paper talks of AES 128 bit block and 128 bit cipher key and is implemented using VHDL as the hardware description language. Here a new FPGA-based implementation scheme of the AES-128 (Advanced Encryption Standard, with 128-bit key) encryption algorithm is proposed for software defined radio applications. This system aims at reduced hardware structure and high throughput. Xilinx - Project Navigator, ISE 9.1i suite is used for simulation and synthesis. Keywords: AES, Cipher text, FPGA, SDR, VHDL I. INTRODUCTION With ever increasing demand for mobile communication and emergence of many new systems and standards like 3G and 4G and even many researches are going to develop new wireless standards. It has become imperative to implement and design a flexible architecture of radio system INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2015): 8.9958 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 96 which accommodates the feature of interoperability and multi functionality and operation of the devices in heterogeneous, variable operating conditions. Different standards of Mobile communication use different type of hardware circuitry. The existing mobile communication standards are primarily designed along national standards and not using a common global standard. So efforts are going on to develop systems which can support multiple mobile communication standards using same hardware but changing the software / firmware or a combination of both. This gave rise to Software Defined Radio which is a new technology being developed. A SDR refers to any reconfigurable or reprogrammable radio system that can show different functionality with the same hardware. A Software Defined Radio can simply be defined as “ Radio in which some or all of the physical layer functions are software defined”. The encryption/decryption functions of the system are defined using higher abstraction levels of HDLs. Today software defined technology offers advantages such as improvements or enhancements without altering the radio hardware, terminals that can cope with the unpredictable dynamic characteristics of highly variable wireless links, efficient use of radio spectrum and power, and many others. The users can use relatively generic reprogrammable hardware and customize it to their needs by choosing only the software implementation that fits their specific application [1,2]. The difference between a digital radio and an SDR is that a digital radio is not reconfigurable. Although a Digital radio has software running on it; the functionality of the components cannot be changed on air. New technology insertion is not available. II. BACKGROUND OF SOFTWARE DEFINED RADIO One of the first software radios was the US Air Force’s Integrated Communications Navigation and Identification Avionics (ICNIA) system, which was developed in the late 1970’s. The system used a DSP based modem that is reprogrammable for different platforms. ICNIA’s technology has been the foundation for many other military radios. SDR is a radio communication technology which is capable of being re-programmed or reconfigured. SPEAKeasy is a joint Department of Defense and industry program initiated to develop a software programmable radio operating in the range from 2 MHz to 2 GHz, employing waveforms selected from memory or downloaded from disk or reprogrammed over the air [3]. The improvements in DSP and ADC technologies facilitated the shift to software defined radios. Modern functions can be implemented in software with today’s high DSPs and General Purpose Processors (GPPs). The low power requirements of the processors enable them to be used in hand terminals. The increased dynamic operating ranges and higher conversion rates of modern ADCs enables digital processing at higher bands. The improvements in middleware technologies permit software functionality to be independent of the underlying hardware [4].The General structure of SDR are given below Figure 1. Figure 1: General Block Diagram of a SDR
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 97 III. BACKGROUND OF AES The AES algorithm is a symmetric block cipher that can encrypt and decrypt information. Encryption converts data to an unintelligible form called cipher-text [5]. Decryption of the cipher- text converts the data back into its original form, which is called plain-text. 3.1 AES encryption The AES algorithm operates on a 128-bit block of data and executed Nr - 1 loop times. A loop is called a round and the number of iterations of a loop, Nr, can be 10, 12 or 14 depending on the key length. The key length is 128, 192 or 256 bits in length respectively. The first and last rounds differ from other rounds in that there is an additional AddRoundKey transformation at the beginning of the first round and no MixCoulmns transformation is performed in the last round. In this paper, we use the key length of 128 bits (AES-128) as a model for general explanation 3.1.1 SubBytes Transformation The SubBytes transformation is a non-linear byte substitution, operating on each of the state bytes independently. The SubBytes transformation is done using a once-pre-calculated substitution table called S-box. That S-box table contains 256 numbers (from 0 to 255) and their corresponding resulting values. More details of the method of calculating the S-box table refers to [4]. In this design, we use a look-up table as shown in Table 1. This approach avoids complexity of hardware implementation and has the significant advantage of performing the S-box computation in a single clock cycle, thus reducing the latency. 3.1.2 ShiftRows Transformation In ShiftRows transformation, the rows of the state are cyclically left shifted over different offsets. Row 0 is not shifted, row 1 is shifted one byte to the left, row 2 is shifted two bytes to the left and row 3 is shifted three bytes to the left.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 98 3.1.3 MixColumns Transformation In MixColumns transformation, the columns of the state are considered as polynomials over GF (28 ) and multiplied by modulo x4 + 1 with a fixed polynomialc(x), given by: c(x)={03}x3 + {01}x2 + {01}x + {02}. 3.1.4 AddRoundKey Transformation In the AddRoundKey transformation, a Round Key is added to the State - resulted from the operation of the MixColumns transformation - by a simple bitwise XOR operation. The RoundKey of each round is derived from the main key using the Key Expansion algorithm [1]. The encryption/decryption algorithm needs eleven 128-bit RoundKey, which are denoted RoundKey[0] RoundKey[10] (the first RoundKey [0] is the main key). 3.2 AES decryption Decryption is a reverse of encryption which inverse round transformations to computes out the original plaintext of an encrypted cipher-text in reverse order. The round transformation of decryption uses the functions AddRoundKey, InvMixColumns, InvShiftRows, and InvSubBytes successively. 3.2.1 AddRoundKey AddRoundKey is its own inverse function because the XOR function is its own inverse. The round keys have to be selected in reverse order. The description of the other transformations will be given as follows. 3.2.2 InvShiftRows Transformation InvShiftRows exactly functions the same as ShiftRows, only in the opposite direction. The first row is not shifted, while the second, third and fourth rows are shifted right by one, two and three bytes respectively. 3.2.3 InvSubBytes transformation The InvSubBytes transformation is done using a once-pre- calculated substitution table called InvS- box. That InvS-box table contains 256 numbers (from 0 to 255) and their corresponding values. InvS-box is presented in Table II.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 99 3.2.4 InvMixColumns Transformation In the InvMixColumns transformation, the polynomials of degree less than 4 over GF(28 ), which coefficients are the elements in the columns of the state, are multiplied modulo (x4 + 1) by a fixed polynomial d(x) = {0B}x3 + {0D}x2 + {09}x + {0E}, where {0B}, {0D}; {09}, {0E} denote hexadecimal values.The implementation of the AES is carried out using VHDL. IV.AES IMPLEMENTATION USING VHDL The Figure 2 shows the AES core architecture implemented for Software Defined radio framework. Figure 2: Architecture of AES core V. RESULTS The following results were obtained for individual steps on AES encryption method. The design has been coded by VHDL. All the results are simulated using Xilinx ISE simulator. The results of simulating the encryption algorithm from the ISE simulator are shown in Figure.3 a) b)
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 95-100 © IAEME 100 c) d) Figure 3: Simulation waveforms on Xilinx ISE simulator for different steps of encryption. a) S Box transformation b) Shift row c) Top byte substitution d) Shift row transformation: VI. CONCLUSIONS The Advanced Encryption Standard algorithm is a symmetric block cipher that can process data blocks of 128 bits through the use of cipher keys with lengths of 128, 192, and 256 bits. An efficient FPGA implementation of 128 bit block and 128 bit key AES algorithm has been presented in this paper. This can be used for secure data transmission in various wireless communication standards without changing the hardware. The proposed design is implemented based on the iterative approach for cryptographic algorithms. There is a lot of potential applications of SDRs and in future we will see that a wide array of radio applications like Blue- tooth, WLAN, GPRS, Radar, WCDMA etc. being implemented by using SDR technology [6]. VII. REFERENCES 1. J. Mitola III. Software Radio Architecture. Wiley-Interscience, 2000 2. B. Bing and N. Jayant. A Cell phone for all Standards.IEEE Spectrum, May 2002. 3. SPEAKeasy web page, http://www.if.afrl.af.mil/div/IFB/techtrans/datasheets/Speakeasy .html 4. M. W. Oliphant. Radio Interfaces Make the Difference in 3G Cellular Systems. IEEE Spectrum Magazine, Vol. 37,No. 10, October 2000 5. FIPS 197, “Advanced Encryption Standard (AES)”, November 26, 2001. 6. Online reference, Available: http://www.broadcastpapers.com. 7. Anubhav Gupta and Harish Bansal, “Design of Area Optimized AES Encryption Core Using Pipelining Technology” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2012, pp. 308 - 314, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.