SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 408
LATENCY AND POWER OPTIMIZED AES CRYPTOGRAPHY SYSTEM USING
SCAN CHAIN REORDERING
POLABATHULA SATYA SOWJANYA1, SATISH VENKATA DHULIPUDI2
1M.Tech Student, Dept. of ECE, Prasiddha College of Engineering & Technology, Anathavaram, AP
2Assistant Professor, Dept. of ECE, Prasiddha College of Engineering & Technology, Anathavaram, AP
--------------------------------------------------------------------------***----------------------------------------------------------------------------
ABSTRACT: This project plays vital role in all type of communication applications. The security can be enhanced by using
standardized and proven-secure block ciphers as advanced encryption standard (AES) for data encryption and authentication.
However, these security functions take a large amount of processing power and power/energy consumption. In this paper, we
present our hardware optimization strategies for AES for high-speed ultralow-power ultralow-energy IoT applications with
multiple levels of security. This project includes a novel low-transition linear feedback shift register (LFSR) that is based on
some new observations about the output sequence of a conventional LFSR. Security of a hardware implementation can be
compromised by a random fault or a deliberate attack. Cell reordering plays vital role in transitions reduction to further
improvement of timing constraint.
KEYWORDS: Linear feedback shit register, Advanced Encryption Standards, Scan chain reordering, Trojansns, stuck-at fault,
Hardware optimization.
INTRODUCTION: THE fast development of Internet-of-Thing (IoT) devices enables the massive integration of technologies
from sensing technology, communication technology, data processing, to cloud computing, and artificial intelligence. In this
scenario, sensors in the perception layer collect data from the environment and do fast processing. Then, these data are
transmitted through the network layers over the Internet to the cloud. In the cloud, data are further processed by different
applications, for example, big data applications or data miningapplications to make decisions and/or to notify users, etc.
However, IoT devices and data transmitted through multilayer networks may contain private data or secrete data; while the
Internet environment exposes security issues such as personal privacy, cyber-attacks, and organized crimes. This recently
raises the concerns about the security and privacy of the IoTs [1]–[3]. The solution to security and privacy problems is to
include security features such as device identification, device/user authentication, and data encryption. These security
functions are often based on the cryptographic algorithms, including public-key cryptography and symmetric cryptography,
which occupy processing power and increase power and energy consumption. In contrast, IoT devices are supposed to be
constrained low-cost devices with limited processing power, limited memory footprint, and even limited power/energy
budget, for example, power-harvesting devices and batterybased devices. This leads to the importance of optimizing
cryptographic algorithms in hardware for cost, throughput, and especially power and energy consumption. However, cost,
throughput, and power/energy consumption are different features which are hard to achieve at the same time. In this paper,
we chose to find a good tradeoff among them for advanced encryption standard (AES) [4], a widely-used block cipher for
emerging IoT proposals, such as IEEE 802.15.4 [5], LoraWAN [6], Sigfox [7], and ZWave [8]. We also made comparison with an
extreme lightweight data encryption algorithm PRESENT [9], a candidate for highly constrained devices. PRESENT is a
hardware-oriented block cipher with reduced security level but it has small area footprint and very lowpower consumption.
However, to the best of our knowledge, lightweight block ciphers, such as PRESENT, are not yet adopted to any IoT proposals.
From its standardization in 2001 by the U.S. National Institute of Standards and Technology (NIST) to replace data encryption
standard, AES has been studied by researchers in terms of security, performance, and hardware/software implementations. In
terms of security, different IoT applications may require different security levels with different power/energy budgets and
different throughputs. At the algorithmic level, security level depends on the design of the algorithm and the length of the key.
AES supports multiple security levels by providing three different key sizes. AES is proven to support long-term and very long-
term security. Because of its popularity and proved security, AES is widely used in data encryption, security protocols, and
secure applications. The optimization for AES in hardware is not only beneficial to IoT applications but also to other
applications, which have the same constraints. In terms of implementation and performance, AES is designed to benefit from
software optimization in modern computing systems. However, AES implementation in software not only introduces delay to
data processing and transmission, but also increases the power and energy consumption. This is the main limitation of AES to
constrained devices.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 409
ADVANCED ENCRYPTION STANDARD (AES):-
Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and
Technology (NIST) after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology
Management Reform Act of 1996 (Public Law 104-106) and the Computer Security Act of 1987 (Public Law 100-235). The
Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic
data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information.
Encryption converts data to an unintelligible form called cipher text; decrypting the cipher text converts the data back into its
original form, called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt
and decrypt data in blocks of 128 bits. This standard specifies the Rijndael algorithm, a symmetric block cipher that can
process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits. Rijndael was designed to handle
additional block sizes and key lengths; however they are not adopted in this standard. Throughout the remainder of this
standard, the algorithm specified here in will be referred to as “the AES algorithm.” The algorithm may be used with the three
different key lengths indicated above, and therefore these different “flavours” may be referred to as “AES-128”, “AES-192”, and
“AES-256”.
This specification includes the following sections:
1. Definitions of terms, acronyms, and algorithm parameters, symbols, and functions.
2. Notation and conventions used in the algorithm specification, including the ordering and numbering of bits, bytes, and
words.
3. Mathematical properties that is useful in understanding the algorithm.
4. Algorithm specification, covering the key expansion, encryption, and decryption routines.
5. Implementation issues, such as key length support, keying restrictions, and additional block/key/round sizes.
The standard concludes with several appendices that include step-by-step examples for Key. At the start of the Cipher, the
input is copied to the State array using the conventions. After an initial Round Key addition, the State array is transformed by
implementing a round function 10, 12, or 14 times (depending on the key length), with the final round differing slightly from
the first Nr -1 rounds. The final State is then copied to the output. The round function is parameterized using a key schedule
that consists of a one-dimensional array of four-byte words derived using the Key Expansion routine.
The Cipher is described in the pseudo code. The individual transformations -
Sub Bytes (), Shift Rows (), Mix Columns (), and AddRoundKey () – process the State and are described in the following
subsections.
All Nr rounds are identical with the exception of the final round, which does
Not include the Mix Columns () transformation.
A block cipher processes the data blocks of fixed size. Usually, the size of a message is larger than the block size. Hence, the
long message is divided into a series of sequential message blocks, and the cipher operates on these blocks one at a time.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 410
Fig: Our proposed AES architecture.
To reduce area and power consumption in the datapath, we minimized the number of flip-flops and control logics in the
datapath by using shift registers with a special organization. Shift registers help simplify loading data and loading key steps.
The 32-b of both plaintext and key are loaded at the same time into the state register and the key register by using shift
operations. By minimizing the number of flip-flops, we also reduced the number of clock buffers and the power consumption
of the clock tree because clock buffers in the clock tree consume a large amount of power. A further optimization is to select S-
boxes with minimal power dissipation. Fig. 3 shows the organization of our proposed state register. The state register is
organized so that after loading the input data and the input key, the encryption is done by shifting the data 32 b in each clock
cycle. The state register consists of sixteen 8-b registers (forming a “state matrix”) which are further divided into four 4-stage
shift registers. AES standard specifies that ShiftRow is a permutation operation on the rows of the state matrix, while
MixColum is an operation on the columns. However, in our design, based on ShiftRow specification, we completely eliminated
ShiftRows by selecting the diagonal of the state matrix (from lower-left corner to upper-right corner). The output of the state
register after each shift operation is one column of the state matrix after ShiftRow. This reduces the control logics for the state
register, and completely removes the logic for ShiftRow steps. In our datapath, in contrast with 8-b architectures, MixColum is
designed as pure combinational logics to reduce the number of flip-flops. Thanks to this structure, the state register’s contents
will be updated by next state data which are the contents of the output register concatenated with four last bytes of the round
operation every four cycles (or after each round finishes) as described in Fig. 4. Consequently, we saved a 32-b register
because we need to store only 3 × 4-B temporary data from the encryption path in the output register, while the last 32-b data
are written back directly into the state register. The output register is a simple 4 × 3-stage shift register to save area and
power.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 411
In between the state register and the output register, there are four S-boxes followed by the MixColums to enable processing 4
B in each clock cycle. The temporary results are stored in the output register. When the encryption finished, the results are
written out from the output register. In the 128-b key configuration, AES encryption module needs ten rounds, which leads to
40 cycles to finish the encryption for a 128-b block of data. The total number of cycles to encrypt a block in our architecture is
44 cycles. For other key configurations, our architecture needs 52 and 60 cycles to encrypt a data block for 192- and 256-b key
modes, respectively. Clock gating technique is applied on the state register and the output register separately to save the
dynamic power consumption. For example, in data loading state, the clock to the output register is disabled to save power
because there are no valid data to the output register. Furthermore, when in the inactive state, the output of these registers is
not changed, which means that there is no activity in the encryption path. The power estimation results show that even in the
highest throughput mode (44 cycles/encryption for 128-b key mode) the applied clock gating technique can save more than
13% of power. Certainly, with smaller throughput the clock gating technique can even save much more power consumption.
SUBSTITUTION BOX:
The S-box has a big impact on area and power consumption of the AES design. In our architecture, we chose S-box
implementation for the lowest power consumption. S-boxes may occupy up to 60% of the total cell area, while they consume
about 10%–20% of the total power consumption. The smallest implementation of S-boxes until now is from Canright [18].
Canright S-box demonstrates optimized area (292 gates/S-box) but needs more power/energy consumption
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 412
because it creates more activities especially in architectures with eight S-boxes. The most popular and straightforward S-box
implementation is the LUT-based S-box. LUT-based S-box is bigger in terms of area (434 gates/S-box) but smaller in
power/energy consumption than Canright S-box. The most efficient S-box in terms of power consumption is DSE S-box;
however, it occupies a larger area. DSE S-box can be further optimized for power consumption using the structure proposed in
[20] and described in Fig. 5. The idea is to use an onehot decoder to convert S-box inputs into onehot representation. The
nonlinear operations are done by using wire permutation as in lightweight cryptography algorithms. After that, the S-box
output in onehot encoding is converted back into theoriginal field. DSE S-Box can reduce the power consumption because it
minimizes the activity inside the S-box circuit. After decoding state, only one signal changes its value to go to the encoding
state. Most of the area lost is because of the size of encoder and decoder circuits. This optimization can leads to 10% power
reduction to the whole design. Our synthesized DSE S-box has the size of 466 GEs/S-box that is 7% increase in size in
comparison with LUT-based S-Box or 1.6 times the size of the smallest S-boxes. The S-boxes in our design consume only 10%
of the total power consumption.
SCAN CHAIN REORDERING:
In VLSI design for testability, a scan chain is commonly used to connect the shift registers that store the input and output
vectors during the testing phase of manufacturing. Registers in the scan chain are connected as a single path with ends of the
path connected to a primary input (PI) pad and a primary output (PO) pad. Test input values are shifted into the registers
through the PI pad; then, a test is performed and the test output values are shifted out through the PO pad. Figure 1 depicts a
simple example of a scan chain.
One of the primary objectives in design-for-testability is to minimize the impact of test circuitry on chip performance and cost.
Thus, it is essential to minimize the wirelength of a scan chain: this decreases wiring congestion and/or reduces the chip area
while, at the same time, increasing signal speed by reducing capacitive loading effects on nets that share register pins with the
scan chain. Previous placement-based scan chain ordering approaches compute the cost of stitching one flip-flop to another as
either cell-to-cell Manhattan distance [Hirech et al. 1998; Makar 1998; Barbagello et al. 1996] or pin-to-pin Manhattan
distance [Boese et al. 1994; Kobayashi et al. 1999]. The former metric gives a symmetric TSP, while the latter gives rise to an
almost symmetric TSP [Boese et al. 1994]. The fundamental assumption in all current work on layout-driven scan chain
ordering is that the wirelength overhead due to scan insertion is equal to the Manhattan distance between the scan-in and
scan-out pins of the flip-flops. However, this assumption is incorrect: the scan connection need only reach the output net, not
the output pin. In this work, we propose a (trial) routing-based flow for scan chain ordering that uses the incremental routing
cost (connecting to existing or anticipated routing, rather than to the output pin) as the cost measure for a scan connection.
This is in contrast to existing placement-based methods which use simply the Manhattan distance from the flip-flop output pin
to the scan-in pin of the other flip-flop as the cost measure. Under our formulation, the resulting Asymmetric Traveling
Salesman Problem (ATSP) may be highly nonmetric. We give an efficient method to calculate the costs of the ATSP instance
based on a trial routing of nonscan nets. Our work considers the possibility of using both Q and Q¯ pins of the flip-flop to make
any given scan connection, and it also extends to timing- and noise-driven scan chain ordering (in a more detailed routing-
driven context).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 413
RESULT:
CONCLUSION:-
Crypto may be seen as a continuous struggle between cryptographers & cryptanalysts. Attacks on cryptography have an
equally long history. The security of cryptographic modules for providing a practical degree of protection against white-box
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 414
(total access) attacks should be examined in a totally un-trusted execution environment. So many developers design so many
devices to protect the data very powerful when it is done right, but it is not a panacea. But by using this crypto devices
technique we are providing secure scan architecture can easily be integrated into the scan-based DFT design flow as the
synthesis register can be specified to the corresponding bit of the secret key. The secure control circuit & multiplexers
between the MKR & secret key can be inserted In this project a solution is presented that consists in using an AES-based
cryptographic core commonly embedded in secure system. Three addition modes are added to the current mission of the AES
crypto core. One for pseudo- random test pattern generation & one for signature analysis. Efficiency of these three modes has
been demonstrated. Extra cost in terms of area is very low compared to other techniques. Because only one AES core will be
originally embedded in the system. This reduces the reduction of test cost will lead to the reduction of overall production cost
& 100% security of data.
REFERENCES
1. S. Reddy, “Easily testable realizations for logic functions,” IEEE Transactions on Computers, vol. 21, no. 11, pp. 1183–
1188, 1972.
2. S. Golomb, Shift Register Sequences. Aegean Park Press, 1982.
3. R. K. Brayton, C. McMullen, G. Hatchel, and A. Sangiovanni-Vincentelli, Logic Minimization Algorithms For VLSI
Synthesis. Kluwer Academic Publishers, 1984.
4. E. McCluskey, “Built-in self-test techniques,” IEEE Design and Test of Computers, v Vol. 2, pp. 21–28, 1985.
5. D. H. Green, “Families of Reed-Muller canonical forms,” International Journal of Electronics, vol. 70, pp. 259–280,
1991.
6. M. Abramovici, M. A. Breuer, and A. D. Friedman, Digital Systems Testing and Testable Design. Jon Willey and Sons,
New Jersey, 1994
7. H.-J. Wunderlich, “BIST for systems-on-a-chip,” Integration, the VLSI Journal, vol. 26, no. 1-2, pp. 55 – 78, 1998.
8. M.G. Kuhn, R.J. Anderson. Soft tempest: hidden data transmission using electromagnetic emanations. Information
Hiding 1998, LNCS 1525, pp.124-142,1998.

More Related Content

PDF
IRJET - A Review on Crypto-Algorithm using Different Hardware
PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
PDF
Iec61508 guide
PDF
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
PDF
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
PDF
Cloud Computing –Analysing Healthcare and ECG Monitoring system
PDF
IRJET- Power Monitoring with Time Controlling & Data Logging
PDF
Overview of Various Industrial Fault Diagnosis Methods
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET- Enhanced SIT Algorithm for Embedded Systems
Iec61508 guide
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
Cloud Computing –Analysing Healthcare and ECG Monitoring system
IRJET- Power Monitoring with Time Controlling & Data Logging
Overview of Various Industrial Fault Diagnosis Methods

What's hot (20)

PDF
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
PPTX
How I Learned To Stop Worrying And Love the Smart Meter
PDF
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
PDF
IRJET- Smart Authentication System for Airport
PDF
IRJET- Authentication and Context Awareness Access Control in Internet of Things
PDF
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
PDF
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
PDF
IRJET - Cryptographic Communication between Two ESP32 Devices
PDF
Industrial Control System Cyber Security and the Employment of Industrial Fir...
PDF
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
PDF
IRJET- Hiding Sensitive Medical Data using Encryption
PDF
35 9142 it s-execution evaluation of end-to-end edit septian
PPTX
Presentation1 160729072733
PDF
The interconnecting mechanism for monitoring regular domestic condition
PPTX
Smart grid chinedu opara(m00560830)
PDF
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
PDF
Comparative Study on Various System Based on Raspberry-Pi Technology
PDF
Chapter 5 IoT Design methodologies
PDF
Wireless e-passport using smart card technology
PDF
TTEthernet article
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
How I Learned To Stop Worrying And Love the Smart Meter
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Smart Authentication System for Airport
IRJET- Authentication and Context Awareness Access Control in Internet of Things
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
IRJET - Cryptographic Communication between Two ESP32 Devices
Industrial Control System Cyber Security and the Employment of Industrial Fir...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Hiding Sensitive Medical Data using Encryption
35 9142 it s-execution evaluation of end-to-end edit septian
Presentation1 160729072733
The interconnecting mechanism for monitoring regular domestic condition
Smart grid chinedu opara(m00560830)
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Comparative Study on Various System Based on Raspberry-Pi Technology
Chapter 5 IoT Design methodologies
Wireless e-passport using smart card technology
TTEthernet article
Ad

Similar to IRJET- Latency and Power Optimized AES Cryptography System using Scan Chain Reordering (20)

PDF
Tdp.a029a10
PDF
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
PDF
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
PDF
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
PDF
IRJET- Data Security in Cloud Computing through AES under Drivehq
PDF
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
PDF
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
PDF
Application Layer Security for IoT: The Case Study of a Smart Home
PDF
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
PDF
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
PDF
Go3611771182
PDF
The pattern and realization of zigbee wi-fi wireless pathway
PDF
The pattern and realization of zigbee wi-fi
PDF
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
PDF
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
PDF
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
PDF
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
Tdp.a029a10
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
Application Layer Security for IoT: The Case Study of a Smart Home
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
Go3611771182
The pattern and realization of zigbee wi-fi wireless pathway
The pattern and realization of zigbee wi-fi
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPT
Project quality management in manufacturing
PPTX
Construction Project Organization Group 2.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Well-logging-methods_new................
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
composite construction of structures.pdf
PPTX
Welding lecture in detail for understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
R24 SURVEYING LAB MANUAL for civil enggi
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Automation-in-Manufacturing-Chapter-Introduction.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Project quality management in manufacturing
Construction Project Organization Group 2.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Well-logging-methods_new................
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Digital Logic Computer Design lecture notes
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lecture Notes Electrical Wiring System Components
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
composite construction of structures.pdf
Welding lecture in detail for understanding
CYBER-CRIMES AND SECURITY A guide to understanding
bas. eng. economics group 4 presentation 1.pptx

IRJET- Latency and Power Optimized AES Cryptography System using Scan Chain Reordering

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 408 LATENCY AND POWER OPTIMIZED AES CRYPTOGRAPHY SYSTEM USING SCAN CHAIN REORDERING POLABATHULA SATYA SOWJANYA1, SATISH VENKATA DHULIPUDI2 1M.Tech Student, Dept. of ECE, Prasiddha College of Engineering & Technology, Anathavaram, AP 2Assistant Professor, Dept. of ECE, Prasiddha College of Engineering & Technology, Anathavaram, AP --------------------------------------------------------------------------***---------------------------------------------------------------------------- ABSTRACT: This project plays vital role in all type of communication applications. The security can be enhanced by using standardized and proven-secure block ciphers as advanced encryption standard (AES) for data encryption and authentication. However, these security functions take a large amount of processing power and power/energy consumption. In this paper, we present our hardware optimization strategies for AES for high-speed ultralow-power ultralow-energy IoT applications with multiple levels of security. This project includes a novel low-transition linear feedback shift register (LFSR) that is based on some new observations about the output sequence of a conventional LFSR. Security of a hardware implementation can be compromised by a random fault or a deliberate attack. Cell reordering plays vital role in transitions reduction to further improvement of timing constraint. KEYWORDS: Linear feedback shit register, Advanced Encryption Standards, Scan chain reordering, Trojansns, stuck-at fault, Hardware optimization. INTRODUCTION: THE fast development of Internet-of-Thing (IoT) devices enables the massive integration of technologies from sensing technology, communication technology, data processing, to cloud computing, and artificial intelligence. In this scenario, sensors in the perception layer collect data from the environment and do fast processing. Then, these data are transmitted through the network layers over the Internet to the cloud. In the cloud, data are further processed by different applications, for example, big data applications or data miningapplications to make decisions and/or to notify users, etc. However, IoT devices and data transmitted through multilayer networks may contain private data or secrete data; while the Internet environment exposes security issues such as personal privacy, cyber-attacks, and organized crimes. This recently raises the concerns about the security and privacy of the IoTs [1]–[3]. The solution to security and privacy problems is to include security features such as device identification, device/user authentication, and data encryption. These security functions are often based on the cryptographic algorithms, including public-key cryptography and symmetric cryptography, which occupy processing power and increase power and energy consumption. In contrast, IoT devices are supposed to be constrained low-cost devices with limited processing power, limited memory footprint, and even limited power/energy budget, for example, power-harvesting devices and batterybased devices. This leads to the importance of optimizing cryptographic algorithms in hardware for cost, throughput, and especially power and energy consumption. However, cost, throughput, and power/energy consumption are different features which are hard to achieve at the same time. In this paper, we chose to find a good tradeoff among them for advanced encryption standard (AES) [4], a widely-used block cipher for emerging IoT proposals, such as IEEE 802.15.4 [5], LoraWAN [6], Sigfox [7], and ZWave [8]. We also made comparison with an extreme lightweight data encryption algorithm PRESENT [9], a candidate for highly constrained devices. PRESENT is a hardware-oriented block cipher with reduced security level but it has small area footprint and very lowpower consumption. However, to the best of our knowledge, lightweight block ciphers, such as PRESENT, are not yet adopted to any IoT proposals. From its standardization in 2001 by the U.S. National Institute of Standards and Technology (NIST) to replace data encryption standard, AES has been studied by researchers in terms of security, performance, and hardware/software implementations. In terms of security, different IoT applications may require different security levels with different power/energy budgets and different throughputs. At the algorithmic level, security level depends on the design of the algorithm and the length of the key. AES supports multiple security levels by providing three different key sizes. AES is proven to support long-term and very long- term security. Because of its popularity and proved security, AES is widely used in data encryption, security protocols, and secure applications. The optimization for AES in hardware is not only beneficial to IoT applications but also to other applications, which have the same constraints. In terms of implementation and performance, AES is designed to benefit from software optimization in modern computing systems. However, AES implementation in software not only introduces delay to data processing and transmission, but also increases the power and energy consumption. This is the main limitation of AES to constrained devices.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 409 ADVANCED ENCRYPTION STANDARD (AES):- Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology Management Reform Act of 1996 (Public Law 104-106) and the Computer Security Act of 1987 (Public Law 100-235). The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called cipher text; decrypting the cipher text converts the data back into its original form, called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. This standard specifies the Rijndael algorithm, a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits. Rijndael was designed to handle additional block sizes and key lengths; however they are not adopted in this standard. Throughout the remainder of this standard, the algorithm specified here in will be referred to as “the AES algorithm.” The algorithm may be used with the three different key lengths indicated above, and therefore these different “flavours” may be referred to as “AES-128”, “AES-192”, and “AES-256”. This specification includes the following sections: 1. Definitions of terms, acronyms, and algorithm parameters, symbols, and functions. 2. Notation and conventions used in the algorithm specification, including the ordering and numbering of bits, bytes, and words. 3. Mathematical properties that is useful in understanding the algorithm. 4. Algorithm specification, covering the key expansion, encryption, and decryption routines. 5. Implementation issues, such as key length support, keying restrictions, and additional block/key/round sizes. The standard concludes with several appendices that include step-by-step examples for Key. At the start of the Cipher, the input is copied to the State array using the conventions. After an initial Round Key addition, the State array is transformed by implementing a round function 10, 12, or 14 times (depending on the key length), with the final round differing slightly from the first Nr -1 rounds. The final State is then copied to the output. The round function is parameterized using a key schedule that consists of a one-dimensional array of four-byte words derived using the Key Expansion routine. The Cipher is described in the pseudo code. The individual transformations - Sub Bytes (), Shift Rows (), Mix Columns (), and AddRoundKey () – process the State and are described in the following subsections. All Nr rounds are identical with the exception of the final round, which does Not include the Mix Columns () transformation. A block cipher processes the data blocks of fixed size. Usually, the size of a message is larger than the block size. Hence, the long message is divided into a series of sequential message blocks, and the cipher operates on these blocks one at a time.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 410 Fig: Our proposed AES architecture. To reduce area and power consumption in the datapath, we minimized the number of flip-flops and control logics in the datapath by using shift registers with a special organization. Shift registers help simplify loading data and loading key steps. The 32-b of both plaintext and key are loaded at the same time into the state register and the key register by using shift operations. By minimizing the number of flip-flops, we also reduced the number of clock buffers and the power consumption of the clock tree because clock buffers in the clock tree consume a large amount of power. A further optimization is to select S- boxes with minimal power dissipation. Fig. 3 shows the organization of our proposed state register. The state register is organized so that after loading the input data and the input key, the encryption is done by shifting the data 32 b in each clock cycle. The state register consists of sixteen 8-b registers (forming a “state matrix”) which are further divided into four 4-stage shift registers. AES standard specifies that ShiftRow is a permutation operation on the rows of the state matrix, while MixColum is an operation on the columns. However, in our design, based on ShiftRow specification, we completely eliminated ShiftRows by selecting the diagonal of the state matrix (from lower-left corner to upper-right corner). The output of the state register after each shift operation is one column of the state matrix after ShiftRow. This reduces the control logics for the state register, and completely removes the logic for ShiftRow steps. In our datapath, in contrast with 8-b architectures, MixColum is designed as pure combinational logics to reduce the number of flip-flops. Thanks to this structure, the state register’s contents will be updated by next state data which are the contents of the output register concatenated with four last bytes of the round operation every four cycles (or after each round finishes) as described in Fig. 4. Consequently, we saved a 32-b register because we need to store only 3 × 4-B temporary data from the encryption path in the output register, while the last 32-b data are written back directly into the state register. The output register is a simple 4 × 3-stage shift register to save area and power.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 411 In between the state register and the output register, there are four S-boxes followed by the MixColums to enable processing 4 B in each clock cycle. The temporary results are stored in the output register. When the encryption finished, the results are written out from the output register. In the 128-b key configuration, AES encryption module needs ten rounds, which leads to 40 cycles to finish the encryption for a 128-b block of data. The total number of cycles to encrypt a block in our architecture is 44 cycles. For other key configurations, our architecture needs 52 and 60 cycles to encrypt a data block for 192- and 256-b key modes, respectively. Clock gating technique is applied on the state register and the output register separately to save the dynamic power consumption. For example, in data loading state, the clock to the output register is disabled to save power because there are no valid data to the output register. Furthermore, when in the inactive state, the output of these registers is not changed, which means that there is no activity in the encryption path. The power estimation results show that even in the highest throughput mode (44 cycles/encryption for 128-b key mode) the applied clock gating technique can save more than 13% of power. Certainly, with smaller throughput the clock gating technique can even save much more power consumption. SUBSTITUTION BOX: The S-box has a big impact on area and power consumption of the AES design. In our architecture, we chose S-box implementation for the lowest power consumption. S-boxes may occupy up to 60% of the total cell area, while they consume about 10%–20% of the total power consumption. The smallest implementation of S-boxes until now is from Canright [18]. Canright S-box demonstrates optimized area (292 gates/S-box) but needs more power/energy consumption
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 412 because it creates more activities especially in architectures with eight S-boxes. The most popular and straightforward S-box implementation is the LUT-based S-box. LUT-based S-box is bigger in terms of area (434 gates/S-box) but smaller in power/energy consumption than Canright S-box. The most efficient S-box in terms of power consumption is DSE S-box; however, it occupies a larger area. DSE S-box can be further optimized for power consumption using the structure proposed in [20] and described in Fig. 5. The idea is to use an onehot decoder to convert S-box inputs into onehot representation. The nonlinear operations are done by using wire permutation as in lightweight cryptography algorithms. After that, the S-box output in onehot encoding is converted back into theoriginal field. DSE S-Box can reduce the power consumption because it minimizes the activity inside the S-box circuit. After decoding state, only one signal changes its value to go to the encoding state. Most of the area lost is because of the size of encoder and decoder circuits. This optimization can leads to 10% power reduction to the whole design. Our synthesized DSE S-box has the size of 466 GEs/S-box that is 7% increase in size in comparison with LUT-based S-Box or 1.6 times the size of the smallest S-boxes. The S-boxes in our design consume only 10% of the total power consumption. SCAN CHAIN REORDERING: In VLSI design for testability, a scan chain is commonly used to connect the shift registers that store the input and output vectors during the testing phase of manufacturing. Registers in the scan chain are connected as a single path with ends of the path connected to a primary input (PI) pad and a primary output (PO) pad. Test input values are shifted into the registers through the PI pad; then, a test is performed and the test output values are shifted out through the PO pad. Figure 1 depicts a simple example of a scan chain. One of the primary objectives in design-for-testability is to minimize the impact of test circuitry on chip performance and cost. Thus, it is essential to minimize the wirelength of a scan chain: this decreases wiring congestion and/or reduces the chip area while, at the same time, increasing signal speed by reducing capacitive loading effects on nets that share register pins with the scan chain. Previous placement-based scan chain ordering approaches compute the cost of stitching one flip-flop to another as either cell-to-cell Manhattan distance [Hirech et al. 1998; Makar 1998; Barbagello et al. 1996] or pin-to-pin Manhattan distance [Boese et al. 1994; Kobayashi et al. 1999]. The former metric gives a symmetric TSP, while the latter gives rise to an almost symmetric TSP [Boese et al. 1994]. The fundamental assumption in all current work on layout-driven scan chain ordering is that the wirelength overhead due to scan insertion is equal to the Manhattan distance between the scan-in and scan-out pins of the flip-flops. However, this assumption is incorrect: the scan connection need only reach the output net, not the output pin. In this work, we propose a (trial) routing-based flow for scan chain ordering that uses the incremental routing cost (connecting to existing or anticipated routing, rather than to the output pin) as the cost measure for a scan connection. This is in contrast to existing placement-based methods which use simply the Manhattan distance from the flip-flop output pin to the scan-in pin of the other flip-flop as the cost measure. Under our formulation, the resulting Asymmetric Traveling Salesman Problem (ATSP) may be highly nonmetric. We give an efficient method to calculate the costs of the ATSP instance based on a trial routing of nonscan nets. Our work considers the possibility of using both Q and Q¯ pins of the flip-flop to make any given scan connection, and it also extends to timing- and noise-driven scan chain ordering (in a more detailed routing- driven context).
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 413 RESULT: CONCLUSION:- Crypto may be seen as a continuous struggle between cryptographers & cryptanalysts. Attacks on cryptography have an equally long history. The security of cryptographic modules for providing a practical degree of protection against white-box
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 414 (total access) attacks should be examined in a totally un-trusted execution environment. So many developers design so many devices to protect the data very powerful when it is done right, but it is not a panacea. But by using this crypto devices technique we are providing secure scan architecture can easily be integrated into the scan-based DFT design flow as the synthesis register can be specified to the corresponding bit of the secret key. The secure control circuit & multiplexers between the MKR & secret key can be inserted In this project a solution is presented that consists in using an AES-based cryptographic core commonly embedded in secure system. Three addition modes are added to the current mission of the AES crypto core. One for pseudo- random test pattern generation & one for signature analysis. Efficiency of these three modes has been demonstrated. Extra cost in terms of area is very low compared to other techniques. Because only one AES core will be originally embedded in the system. This reduces the reduction of test cost will lead to the reduction of overall production cost & 100% security of data. REFERENCES 1. S. Reddy, “Easily testable realizations for logic functions,” IEEE Transactions on Computers, vol. 21, no. 11, pp. 1183– 1188, 1972. 2. S. Golomb, Shift Register Sequences. Aegean Park Press, 1982. 3. R. K. Brayton, C. McMullen, G. Hatchel, and A. Sangiovanni-Vincentelli, Logic Minimization Algorithms For VLSI Synthesis. Kluwer Academic Publishers, 1984. 4. E. McCluskey, “Built-in self-test techniques,” IEEE Design and Test of Computers, v Vol. 2, pp. 21–28, 1985. 5. D. H. Green, “Families of Reed-Muller canonical forms,” International Journal of Electronics, vol. 70, pp. 259–280, 1991. 6. M. Abramovici, M. A. Breuer, and A. D. Friedman, Digital Systems Testing and Testable Design. Jon Willey and Sons, New Jersey, 1994 7. H.-J. Wunderlich, “BIST for systems-on-a-chip,” Integration, the VLSI Journal, vol. 26, no. 1-2, pp. 55 – 78, 1998. 8. M.G. Kuhn, R.J. Anderson. Soft tempest: hidden data transmission using electromagnetic emanations. Information Hiding 1998, LNCS 1525, pp.124-142,1998.