SlideShare a Scribd company logo
2
Most read
3
Most read
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 952 
FPGA IMPLEMENTATION OF ENCRYPTION AND DECRYPTION ALGORITHM BASED ON AES Shivaraj.G.Nandeni1, Sharanagouda.N2 1PG Student, E&C, AIET, Gulbarga, Karnataka, India 2Asst. Proff, E&C, AIET, Gulbarga, Karnataka, India Abstract This paper presents FPGA based implementation scheme of advance encryption standard AES-128 (with 128 bit Key) encryption and decryption algorithm. The advance encryption standard is a symmetric block cipher that is intended to replace DES as the approved standard for a wide range of application. The 128-bit plain text and 128-bit initial key, as well as the 128-bit output of cipher text, are all divided into four 32-bit consecutive units respectively controlled by the clock. The algorithm is designed and synthesized using Xilinx ISE 13.4 simulated by ISim 0.87xd then implemented on Xilinx FPGA devise XC3S500E the result is verified using standard test vectors. Keywords: AES, FPGA, Verilog HDL, cryptography, synthesis 
-----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Advance encryption standard find its rout in cryptography and network security, Because of cryptography, doing business electronically is possible without worries of deceit and deception. Cryptography technology has changed the world today by being able to carry data found in the physical world to the electronic world with confidence. Nowadays, hundreds of thousands of people interact electronically every day, whether it is through email, E-commerce, E-bank or cellular phones. As the network transmission speed upgrades to the gigabits per second (Gbps), the software-based implementations of cryptographic algorithms cannot meet its needs. The hardware-based implementations can greatly improve throughput and reduce the key generation time. Besides, the processes of cryptographic algorithms and the key generation packaged in chip, which cannot easily be read or changed by external attacker, so hardware-based implementations can get the higher physical security. In recent years, many hardware based Implementations use the field programmable gate arrays (FPGA) and the application specific integrated circuit (ASIC) ASIC lacks of flexibility and has high development costs and long development cycle. Reconfigurable devices such as FPGA, with hardware of security and high speed and software of flexibility and easy maintenance, have become hardware-based implementations research hotspots for block cipher algorithm. 2. BACKGROUND 
As we know, the security strength of Data Encryption Standard (DES) [1] has been difficult to adapt to new needs. In October of 2000, the National Institute of Standards and Technology (NIST) selected the Rijndael algorithm as the advanced encryption standard (AES), which was developed by Joan Daemen and Vincent Rijmen, in order to replace the DES. At present, Rijndael is the most common and widely used symmetric cryptosystem to support bulk data encryption. It offers a good “combination of flexibility, efficiency and safety” AES is the abbreviation of Advanced Encryption Standard also known as Rijndael algorithm. It is symmetrical block cipher which uses the same key for both encryption and decryption. The minimum length specified can be 128, 192 and 256 bits. 3. VERILOG LANGUAGE AND SYNTHESIS Verilog is a hardware description language which describes the behavior of the said hardware. It is also very similar to C programming in terms of its structures and syntax. Synthesis is the process of converting Verilog codes into gate level design such as AND, OR, XOR and flip flops. Since the process is done automatically by tool the result from this will vary depending on the way the Verilog code is written. By doing synthesis, it gives a good indicator on how good the design is in terms of performance and speed. It also gives some indicators on how big the design area would be when it has been realized into an ASIC/FPGA chip. 
Verilog languages cannot simply support multiple multiplications as this AES algorithms require, even though the simulation will show no sign of error, it just cannot support multiple multiplication, synthesis tool will simply convert the multiplication part into some gates without proper propagation of the multiplication. Gates here are referring to AND, OR, XOR, XNOR gates and so forth. These will result
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 953 
to an error in simulation after synthesis. One way to overcome them are by using proper algorithm which perform the same operation with that of multiple multiplications in which the hardware can easily convert to some gates after synthesis.. Proper algorithm are then converted to hardware architecture which best described the operation of the AES algorithm. Multiplication process in AES algorithm is found in mix column operation as well as the key-scheduling process where a lot of multiplications need to be done. Refer FIPS 197 [1]. The key scheduling process is designed using fix coefficient multiplier. In this paper, AES algorithm was implemented using Verilog hardware description language and verified using ISim. 4. FPGA Field Programmable Gate Array (FPGA) is an integrated circuit that can be bought off the shelf and reconfigured by designers themselves. With each reconfiguration, which takes only a fraction of a second, an integrated circuit can perform a completely different function. FPGA consists of thousands of universal building blocks, known as configurable logic blocks (CLBs), connected using programmable interconnects. Reconfiguration is able to change a function of each CLB and connections among them, leading to a functionally new digital circuit. For implementing cryptography in hardware, FPGAs provide the only major alternative to custom and semicustom Application Specific Integrated Circuits (ASICs). Integrated circuits that must be designed all the way from the behavioral description to the physical layout are sent for an expensive and time-consuming fabrication. The implementation of the AES algorithm based on FPGA devices has the following advantages over the implementation based on ASICs 
 Shorter design cycle leading to fully functioning device prototypes. 
 Lower cost of the computer-aided design tools, verification and testing. 
 Potential for fast, low-cost multiple reprogramming and experimental testing of a large number of various architectures and revised versions of the same architecture. 
 Higher accuracy of comparison: in the absence of the Physical design and fabrication, ASIC designs are compared based on inaccurate pre-layout simulations ; 
FPGA designs are compared based on very accurate post- layout simulations and experimental testing. From several FPGA families available in the market, in this project I have chosen a Spartan family from Xilinx, for implementing AES algorithm. 
5. ALGORITHM DESCRIPTION 
5.1 Byte Substation 
Each byte of the state is substituted with a 8-bit value from the S-box. The S-box contains a permutation of all possible 256 8- bit values. It is a nonlinear operation and the only non-linear transformation in this procedure. The S-box is gained by a multiplicative inverse over GF(28) and an affine transform .The sub bytes operation is required for both encryption and key expansion and its inverse is done for decryption. Its implementation has a direct impact on the overall throughput. 5.2 Shift Row Operation Shift Rows it is relatively simple. State is the intermediate cipher result that can be pictured as a rectangular array of bytes, having four rows. In the direct ShiftRows transformation, the first line of State remains the same, the second line, third line and fourth line respectively ring shift left 1byte, 2 bytes, and 3bytes. 5.3 Mixcolumn MixColumn operation performs on the state column by column, treating each column as a four-term polynomial over GF (28).As a result of this multiplication, the new four bytes in a column is generated as follow: The operation of „‟ is XOR operation modulo 2 and the „ ‟ is a multiplication of polynomials modulo an irreducible polynomial m(x) = x8+x4+x3+x+1. 5.4 Addroundkey The transformation in the cipher and inverse cipher in which a round key is added to the state using an XOR operation. Round keys are values derived from the cipher key using the Key Expansion routine. 5.5 Keyexpansion It is the routine used to generate a series of Round Keys from the cipher key KeyExpansion is carried out for the word, and to this two word processing functions are introduced which are word substitution (Subword) and word rotation (RotWord). Subword takes a four-byte input word and applies an S-box to each of the four bytes to produce an output word. RotWord takes a four-byte word and performs a cyclic permutation.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 954 
6. PROPOSED SYSTEM 
AES cipher is operating on data blocks having the length of 
128 bits with a symmetric key, which may have a length of 
128, 196 or 256 bits. Operations are performed on a matrix of 
size 4 x 4 bytes called the state. The algorithm consists of 
successive steps. First, the data stored in the state array are 
added mod 2 with the master key by the operation 
AddRoundKey. The next steps are rounds repeated Nr 
times.Each round performs 4 successive operations: (1) 
substitution of bytes SubBytes, (2) rows shifting ShiftRows, 
(3) mixing of columns MixColumn, and (4) AddRoundKey. 
The number of rounds Nr depends on the key length; for the 
128-bit key Nr = 10. The last step performs 3 operations: Sub- 
Bytes, ShiftRows and AddRoundKey. At each step another 
key generated as an extension by the procedure KeyExpansion 
is added. 
Fig -1 Block diagram of proposed system 
Whereas the decryption process are relatively executing the 
same process as what encryption is doing except it is 
performing the inverse of the encryption process which are 
Inverse Subbytes, Inverse Shiftrow, Inverse mixcolumn and 
Inverse AddRoundkey[2]. This paper will describes both 
encryption and decryption process the block diagram of 
proposed system is shown in figure 1. 
7. RESULTS 
The verification was done using the test vector and the 
expected output as described in the fips-197, Appendix B 
section [1]. The architecture of this AES works as expected for 
each process as described in Figure A. The cipher is 
progressed using the round key value and the input shown in 
Table 1, when the ready signal is high the data is fully 
encrypted, i.e. the output/data_out as shown in Figure 2.the 
decryption data data_out is shown in Fig 3. 
Table -1: Example test vector 
Key 2b7e151628aed2a6abf7158809cf4f3c 
Plain text 6bc1bee22e409f96e93d7e117393172a 
Cipher text 3ad77bb40d7a3660a89ecaf32466ef97 
Fig -2 Encryption simulation waveforms 
Fig -3 Decryption simulation waveforms
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 955 
RTL diagram of proposed system Fig -4: RTL diagram 8. CONCLUSIONS An implementation of 128 bit AES algorithm in hardware is discussed in the paper. The cipher has been synthesized using Xilinx 13.4, simulated using ISim .87xd and result is verified using standard test vectors .the algorithm is implemented by Verilog HDL. Implementation of AES algorithm in hardware is without a doubt increases efficiency of the throughput, however when it comes to hardware implementation the trade-off between area saving and high speed always needs to be compromised. For reason of both efficiency and security a large key size is desirable, so future work would be concentrate on implementation of AES algorithm using 192,256 key sizes. REFERENCES 
[1] NIST, Advanced Encryption Standard (AES), (FIP PUB 197) http://csrc.nist.gov/publications 
[2] Rozita Borhan, Raja Mohd Fuad Tengku Aziz,”Successful Implementation of AES Algorithm in Hardware” 2012 IEEE International conference on Electronics Design, system and application(ICEDSA) 
[3] William Stallings “Cryptography and network Security” Principles and practise Fourth Edition 
[4] Morris Dworkin, “Recommendation for n BlockCipher Modes of Operation” Methods and Techniques. NIST Special Publication 800-38A 2001 Edition 
[5] S,Lara,Accelerating algorithms in hardware, date visited:(10/06/2008)http://www.embedded.com/show/ Article.jhtml?articleID=175 00157 
[6] N Dave, AES Encryption is Cracked, 2011, date visited(22/11/2012)http://www.theinquirer.net/inquirer/ news/2102435/aesencryption cracked
Ad

Recommended

A04660105
A04660105
IOSR-JEN
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
paperpublications3
 
H04425053
H04425053
IOSR-JEN
 
Introduction to FPGA, VHDL
Introduction to FPGA, VHDL
Amr Rashed
 
M04302093096
M04302093096
ijceronline
 
Summer training vhdl
Summer training vhdl
Arshit Rai
 
generate IP CORES
generate IP CORES
guest296013
 
Ieee 2015 project list_vlsi
Ieee 2015 project list_vlsi
igeeks1234
 
Report on VLSI
Report on VLSI
MAYANK KUMAR
 
Hard IP Core design | Convolution Encoder
Hard IP Core design | Convolution Encoder
Archit Vora
 
Summer training vhdl
Summer training vhdl
Arshit Rai
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
Editor IJCATR
 
VLSI
VLSI
MAYANK KUMAR
 
PyCoRAM: Yet Another Implementation of CoRAM Memory Architecture for Modern F...
PyCoRAM: Yet Another Implementation of CoRAM Memory Architecture for Modern F...
Shinya Takamaeda-Y
 
VerilogHDL_Utkarsh_kulshrestha
VerilogHDL_Utkarsh_kulshrestha
Utkarsh Kulshrestha
 
Performance Optimization of SPH Algorithms for Multi/Many-Core Architectures
Performance Optimization of SPH Algorithms for Multi/Many-Core Architectures
Dr. Fabio Baruffa
 
Resume_new1_may
Resume_new1_may
anuradha m masanan
 
Bs25412419
Bs25412419
IJERA Editor
 
A High Performance Heterogeneous FPGA-based Accelerator with PyCoRAM (Runner ...
A High Performance Heterogeneous FPGA-based Accelerator with PyCoRAM (Runner ...
Shinya Takamaeda-Y
 
Publication
Publication
Pranjal Jain
 
Summer training vhdl
Summer training vhdl
Arshit Rai
 
ASIC Design and Implementation
ASIC Design and Implementation
skerlj
 
Vlsi
Vlsi
Poornima institute of engineering and technology
 
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...
IJERA Editor
 
CV-Nidhin
CV-Nidhin
Nidhin Joe Kuttikkat
 
AES Proposal
AES Proposal
rodrigovmoraes
 
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
AJAL A J
 
Hardware Software Partitioning Of Advanced Encryption Standard To Counter Dif...
Hardware Software Partitioning Of Advanced Encryption Standard To Counter Dif...
mjaganm
 
Aes128 bit project_report
Aes128 bit project_report
Nikhil Gupta
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 

More Related Content

What's hot (17)

Report on VLSI
Report on VLSI
MAYANK KUMAR
 
Hard IP Core design | Convolution Encoder
Hard IP Core design | Convolution Encoder
Archit Vora
 
Summer training vhdl
Summer training vhdl
Arshit Rai
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
Editor IJCATR
 
VLSI
VLSI
MAYANK KUMAR
 
PyCoRAM: Yet Another Implementation of CoRAM Memory Architecture for Modern F...
PyCoRAM: Yet Another Implementation of CoRAM Memory Architecture for Modern F...
Shinya Takamaeda-Y
 
VerilogHDL_Utkarsh_kulshrestha
VerilogHDL_Utkarsh_kulshrestha
Utkarsh Kulshrestha
 
Performance Optimization of SPH Algorithms for Multi/Many-Core Architectures
Performance Optimization of SPH Algorithms for Multi/Many-Core Architectures
Dr. Fabio Baruffa
 
Resume_new1_may
Resume_new1_may
anuradha m masanan
 
Bs25412419
Bs25412419
IJERA Editor
 
A High Performance Heterogeneous FPGA-based Accelerator with PyCoRAM (Runner ...
A High Performance Heterogeneous FPGA-based Accelerator with PyCoRAM (Runner ...
Shinya Takamaeda-Y
 
Publication
Publication
Pranjal Jain
 
Summer training vhdl
Summer training vhdl
Arshit Rai
 
ASIC Design and Implementation
ASIC Design and Implementation
skerlj
 
Vlsi
Vlsi
Poornima institute of engineering and technology
 
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...
IJERA Editor
 
CV-Nidhin
CV-Nidhin
Nidhin Joe Kuttikkat
 
Hard IP Core design | Convolution Encoder
Hard IP Core design | Convolution Encoder
Archit Vora
 
Summer training vhdl
Summer training vhdl
Arshit Rai
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
Editor IJCATR
 
PyCoRAM: Yet Another Implementation of CoRAM Memory Architecture for Modern F...
PyCoRAM: Yet Another Implementation of CoRAM Memory Architecture for Modern F...
Shinya Takamaeda-Y
 
Performance Optimization of SPH Algorithms for Multi/Many-Core Architectures
Performance Optimization of SPH Algorithms for Multi/Many-Core Architectures
Dr. Fabio Baruffa
 
A High Performance Heterogeneous FPGA-based Accelerator with PyCoRAM (Runner ...
A High Performance Heterogeneous FPGA-based Accelerator with PyCoRAM (Runner ...
Shinya Takamaeda-Y
 
Summer training vhdl
Summer training vhdl
Arshit Rai
 
ASIC Design and Implementation
ASIC Design and Implementation
skerlj
 
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...
IJERA Editor
 

Viewers also liked (20)

AES Proposal
AES Proposal
rodrigovmoraes
 
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
AJAL A J
 
Hardware Software Partitioning Of Advanced Encryption Standard To Counter Dif...
Hardware Software Partitioning Of Advanced Encryption Standard To Counter Dif...
mjaganm
 
Aes128 bit project_report
Aes128 bit project_report
Nikhil Gupta
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Mechanical properties of polyester mortar
Mechanical properties of polyester mortar
eSAT Publishing House
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Availability analysis of parallel transit fuel system in petrol engine under ...
Availability analysis of parallel transit fuel system in petrol engine under ...
eSAT Publishing House
 
Automatic collision detection for an autonomous robot using proximity sensing...
Automatic collision detection for an autonomous robot using proximity sensing...
eSAT Publishing House
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
eSAT Publishing House
 
Performance analysis of image filtering algorithms for mri images
Performance analysis of image filtering algorithms for mri images
eSAT Publishing House
 
Identifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learning
eSAT Publishing House
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
eSAT Publishing House
 
A hydration study by xrdrietveld analysis of cement regenerated from complete...
A hydration study by xrdrietveld analysis of cement regenerated from complete...
eSAT Publishing House
 
Real time detecting driver’s drowsiness using computer vision
Real time detecting driver’s drowsiness using computer vision
eSAT Publishing House
 
Isolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantization
eSAT Publishing House
 
Design of 3 d rc frame on sloping ground
Design of 3 d rc frame on sloping ground
eSAT Publishing House
 
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
AJAL A J
 
Hardware Software Partitioning Of Advanced Encryption Standard To Counter Dif...
Hardware Software Partitioning Of Advanced Encryption Standard To Counter Dif...
mjaganm
 
Aes128 bit project_report
Aes128 bit project_report
Nikhil Gupta
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Mechanical properties of polyester mortar
Mechanical properties of polyester mortar
eSAT Publishing House
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Availability analysis of parallel transit fuel system in petrol engine under ...
Availability analysis of parallel transit fuel system in petrol engine under ...
eSAT Publishing House
 
Automatic collision detection for an autonomous robot using proximity sensing...
Automatic collision detection for an autonomous robot using proximity sensing...
eSAT Publishing House
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
eSAT Publishing House
 
Performance analysis of image filtering algorithms for mri images
Performance analysis of image filtering algorithms for mri images
eSAT Publishing House
 
Identifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learning
eSAT Publishing House
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
eSAT Publishing House
 
A hydration study by xrdrietveld analysis of cement regenerated from complete...
A hydration study by xrdrietveld analysis of cement regenerated from complete...
eSAT Publishing House
 
Real time detecting driver’s drowsiness using computer vision
Real time detecting driver’s drowsiness using computer vision
eSAT Publishing House
 
Isolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantization
eSAT Publishing House
 
Design of 3 d rc frame on sloping ground
Design of 3 d rc frame on sloping ground
eSAT Publishing House
 
Ad

Similar to Fpga implementation of encryption and decryption algorithm based on aes (20)

Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
11
11
idescitation
 
Fast
Fast
lodingthepage440
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
ijsrd.com
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
G04701051058
G04701051058
ijceronline
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
TELKOMNIKA JOURNAL
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
A03530107
A03530107
inventionjournals
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
ijsrd.com
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
TELKOMNIKA JOURNAL
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
Ad

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Recently uploaded (20)

IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
How to Un-Obsolete Your Legacy Keypad Design
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Cadastral Maps
Cadastral Maps
Google
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Mechanical Vibration_MIC 202_iit roorkee.pdf
Mechanical Vibration_MIC 202_iit roorkee.pdf
isahiliitr
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Cadastral Maps
Cadastral Maps
Google
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Mechanical Vibration_MIC 202_iit roorkee.pdf
Mechanical Vibration_MIC 202_iit roorkee.pdf
isahiliitr
 

Fpga implementation of encryption and decryption algorithm based on aes

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 952 FPGA IMPLEMENTATION OF ENCRYPTION AND DECRYPTION ALGORITHM BASED ON AES Shivaraj.G.Nandeni1, Sharanagouda.N2 1PG Student, E&C, AIET, Gulbarga, Karnataka, India 2Asst. Proff, E&C, AIET, Gulbarga, Karnataka, India Abstract This paper presents FPGA based implementation scheme of advance encryption standard AES-128 (with 128 bit Key) encryption and decryption algorithm. The advance encryption standard is a symmetric block cipher that is intended to replace DES as the approved standard for a wide range of application. The 128-bit plain text and 128-bit initial key, as well as the 128-bit output of cipher text, are all divided into four 32-bit consecutive units respectively controlled by the clock. The algorithm is designed and synthesized using Xilinx ISE 13.4 simulated by ISim 0.87xd then implemented on Xilinx FPGA devise XC3S500E the result is verified using standard test vectors. Keywords: AES, FPGA, Verilog HDL, cryptography, synthesis -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Advance encryption standard find its rout in cryptography and network security, Because of cryptography, doing business electronically is possible without worries of deceit and deception. Cryptography technology has changed the world today by being able to carry data found in the physical world to the electronic world with confidence. Nowadays, hundreds of thousands of people interact electronically every day, whether it is through email, E-commerce, E-bank or cellular phones. As the network transmission speed upgrades to the gigabits per second (Gbps), the software-based implementations of cryptographic algorithms cannot meet its needs. The hardware-based implementations can greatly improve throughput and reduce the key generation time. Besides, the processes of cryptographic algorithms and the key generation packaged in chip, which cannot easily be read or changed by external attacker, so hardware-based implementations can get the higher physical security. In recent years, many hardware based Implementations use the field programmable gate arrays (FPGA) and the application specific integrated circuit (ASIC) ASIC lacks of flexibility and has high development costs and long development cycle. Reconfigurable devices such as FPGA, with hardware of security and high speed and software of flexibility and easy maintenance, have become hardware-based implementations research hotspots for block cipher algorithm. 2. BACKGROUND As we know, the security strength of Data Encryption Standard (DES) [1] has been difficult to adapt to new needs. In October of 2000, the National Institute of Standards and Technology (NIST) selected the Rijndael algorithm as the advanced encryption standard (AES), which was developed by Joan Daemen and Vincent Rijmen, in order to replace the DES. At present, Rijndael is the most common and widely used symmetric cryptosystem to support bulk data encryption. It offers a good “combination of flexibility, efficiency and safety” AES is the abbreviation of Advanced Encryption Standard also known as Rijndael algorithm. It is symmetrical block cipher which uses the same key for both encryption and decryption. The minimum length specified can be 128, 192 and 256 bits. 3. VERILOG LANGUAGE AND SYNTHESIS Verilog is a hardware description language which describes the behavior of the said hardware. It is also very similar to C programming in terms of its structures and syntax. Synthesis is the process of converting Verilog codes into gate level design such as AND, OR, XOR and flip flops. Since the process is done automatically by tool the result from this will vary depending on the way the Verilog code is written. By doing synthesis, it gives a good indicator on how good the design is in terms of performance and speed. It also gives some indicators on how big the design area would be when it has been realized into an ASIC/FPGA chip. Verilog languages cannot simply support multiple multiplications as this AES algorithms require, even though the simulation will show no sign of error, it just cannot support multiple multiplication, synthesis tool will simply convert the multiplication part into some gates without proper propagation of the multiplication. Gates here are referring to AND, OR, XOR, XNOR gates and so forth. These will result
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 953 to an error in simulation after synthesis. One way to overcome them are by using proper algorithm which perform the same operation with that of multiple multiplications in which the hardware can easily convert to some gates after synthesis.. Proper algorithm are then converted to hardware architecture which best described the operation of the AES algorithm. Multiplication process in AES algorithm is found in mix column operation as well as the key-scheduling process where a lot of multiplications need to be done. Refer FIPS 197 [1]. The key scheduling process is designed using fix coefficient multiplier. In this paper, AES algorithm was implemented using Verilog hardware description language and verified using ISim. 4. FPGA Field Programmable Gate Array (FPGA) is an integrated circuit that can be bought off the shelf and reconfigured by designers themselves. With each reconfiguration, which takes only a fraction of a second, an integrated circuit can perform a completely different function. FPGA consists of thousands of universal building blocks, known as configurable logic blocks (CLBs), connected using programmable interconnects. Reconfiguration is able to change a function of each CLB and connections among them, leading to a functionally new digital circuit. For implementing cryptography in hardware, FPGAs provide the only major alternative to custom and semicustom Application Specific Integrated Circuits (ASICs). Integrated circuits that must be designed all the way from the behavioral description to the physical layout are sent for an expensive and time-consuming fabrication. The implementation of the AES algorithm based on FPGA devices has the following advantages over the implementation based on ASICs  Shorter design cycle leading to fully functioning device prototypes.  Lower cost of the computer-aided design tools, verification and testing.  Potential for fast, low-cost multiple reprogramming and experimental testing of a large number of various architectures and revised versions of the same architecture.  Higher accuracy of comparison: in the absence of the Physical design and fabrication, ASIC designs are compared based on inaccurate pre-layout simulations ; FPGA designs are compared based on very accurate post- layout simulations and experimental testing. From several FPGA families available in the market, in this project I have chosen a Spartan family from Xilinx, for implementing AES algorithm. 5. ALGORITHM DESCRIPTION 5.1 Byte Substation Each byte of the state is substituted with a 8-bit value from the S-box. The S-box contains a permutation of all possible 256 8- bit values. It is a nonlinear operation and the only non-linear transformation in this procedure. The S-box is gained by a multiplicative inverse over GF(28) and an affine transform .The sub bytes operation is required for both encryption and key expansion and its inverse is done for decryption. Its implementation has a direct impact on the overall throughput. 5.2 Shift Row Operation Shift Rows it is relatively simple. State is the intermediate cipher result that can be pictured as a rectangular array of bytes, having four rows. In the direct ShiftRows transformation, the first line of State remains the same, the second line, third line and fourth line respectively ring shift left 1byte, 2 bytes, and 3bytes. 5.3 Mixcolumn MixColumn operation performs on the state column by column, treating each column as a four-term polynomial over GF (28).As a result of this multiplication, the new four bytes in a column is generated as follow: The operation of „‟ is XOR operation modulo 2 and the „ ‟ is a multiplication of polynomials modulo an irreducible polynomial m(x) = x8+x4+x3+x+1. 5.4 Addroundkey The transformation in the cipher and inverse cipher in which a round key is added to the state using an XOR operation. Round keys are values derived from the cipher key using the Key Expansion routine. 5.5 Keyexpansion It is the routine used to generate a series of Round Keys from the cipher key KeyExpansion is carried out for the word, and to this two word processing functions are introduced which are word substitution (Subword) and word rotation (RotWord). Subword takes a four-byte input word and applies an S-box to each of the four bytes to produce an output word. RotWord takes a four-byte word and performs a cyclic permutation.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 954 6. PROPOSED SYSTEM AES cipher is operating on data blocks having the length of 128 bits with a symmetric key, which may have a length of 128, 196 or 256 bits. Operations are performed on a matrix of size 4 x 4 bytes called the state. The algorithm consists of successive steps. First, the data stored in the state array are added mod 2 with the master key by the operation AddRoundKey. The next steps are rounds repeated Nr times.Each round performs 4 successive operations: (1) substitution of bytes SubBytes, (2) rows shifting ShiftRows, (3) mixing of columns MixColumn, and (4) AddRoundKey. The number of rounds Nr depends on the key length; for the 128-bit key Nr = 10. The last step performs 3 operations: Sub- Bytes, ShiftRows and AddRoundKey. At each step another key generated as an extension by the procedure KeyExpansion is added. Fig -1 Block diagram of proposed system Whereas the decryption process are relatively executing the same process as what encryption is doing except it is performing the inverse of the encryption process which are Inverse Subbytes, Inverse Shiftrow, Inverse mixcolumn and Inverse AddRoundkey[2]. This paper will describes both encryption and decryption process the block diagram of proposed system is shown in figure 1. 7. RESULTS The verification was done using the test vector and the expected output as described in the fips-197, Appendix B section [1]. The architecture of this AES works as expected for each process as described in Figure A. The cipher is progressed using the round key value and the input shown in Table 1, when the ready signal is high the data is fully encrypted, i.e. the output/data_out as shown in Figure 2.the decryption data data_out is shown in Fig 3. Table -1: Example test vector Key 2b7e151628aed2a6abf7158809cf4f3c Plain text 6bc1bee22e409f96e93d7e117393172a Cipher text 3ad77bb40d7a3660a89ecaf32466ef97 Fig -2 Encryption simulation waveforms Fig -3 Decryption simulation waveforms
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 955 RTL diagram of proposed system Fig -4: RTL diagram 8. CONCLUSIONS An implementation of 128 bit AES algorithm in hardware is discussed in the paper. The cipher has been synthesized using Xilinx 13.4, simulated using ISim .87xd and result is verified using standard test vectors .the algorithm is implemented by Verilog HDL. Implementation of AES algorithm in hardware is without a doubt increases efficiency of the throughput, however when it comes to hardware implementation the trade-off between area saving and high speed always needs to be compromised. For reason of both efficiency and security a large key size is desirable, so future work would be concentrate on implementation of AES algorithm using 192,256 key sizes. REFERENCES [1] NIST, Advanced Encryption Standard (AES), (FIP PUB 197) http://csrc.nist.gov/publications [2] Rozita Borhan, Raja Mohd Fuad Tengku Aziz,”Successful Implementation of AES Algorithm in Hardware” 2012 IEEE International conference on Electronics Design, system and application(ICEDSA) [3] William Stallings “Cryptography and network Security” Principles and practise Fourth Edition [4] Morris Dworkin, “Recommendation for n BlockCipher Modes of Operation” Methods and Techniques. NIST Special Publication 800-38A 2001 Edition [5] S,Lara,Accelerating algorithms in hardware, date visited:(10/06/2008)http://www.embedded.com/show/ Article.jhtml?articleID=175 00157 [6] N Dave, AES Encryption is Cracked, 2011, date visited(22/11/2012)http://www.theinquirer.net/inquirer/ news/2102435/aesencryption cracked