SlideShare a Scribd company logo
1 of 6
Download to read offline
AN SURVEY OF EFFICIENT FPGA IMPLEMENTATION OF ADVANCED ENCRYPTION
STANDARD ALGORITHM FOR ENCRYPTION USING VERILOG
A.UDAY KUMAR,
M.TECH-VLSI,SRM UNIVERSITY-NCR CAMPUS,
MODINAGAR,GHAZIBAD-201204
EMAIL-ID:-udaykumar1303@gmail.com
ABSTRACT:-
This paper implements the FPGA implementation of
AES algorithm using verilog .All cryptographic
algorithms use FPGA for hardware implementation
.Because,FPGA are programmable devices we need
those cryptographic algorithms to secure the
information .Here in this we use AES algorithm for
encryption and decryption. This proposed design
uses an iterative looping with block and key size of
128 bits look up table implementation of S-box. This
gives less complexity in the architecture. we use
Verilog HDL for the simulation. Here we compose
these results with previous results to slow the
efficiency.
Keywords:-FPGA,AES,VERILOG HDL,ENCRYPTION,DECRYPTION
INTRODUCTION:-
Before AES there was one standard algorithm for the
symmetric key encryption namely DATA
ENCRYPTION STANDARD with the key length of 56
bits so,it can be easily broken ,so people thought
DES is not sufficient to secure data for this reason .
In sep,1997 The National institute of standard and
technology(NIST) has given a call for cryptographic
algorithm. Finally Rijnadel AES has been selected by
the (NIST).Here AES has the size of 128,192 and 256
bits. So, automatically it becomes difficult to break
the key. Here rijnadel specified the block key size in
any multiple of 32 bits.
The AES is a cryptographic algorithm used to secure
the data. AES is symmetric block chipper to encrypt
and decrypt the data in blocks of 128 bits. Encryptor
is used to convert the plaintext into cipher text.
Decryptor is used to convert the block cipher text to
plaintext. Here encryptor and decryptor need the
10,12and14 iteration rounds to complete the
encryption and decryption process. Here number of
rounds required based on the size of block size and
key size. Here, in the data encryption process we
utilize look up table implementation of s-box to get
the complexity less in architecture.
FPGA implementation is the better choice for the
cryptographic algorithms especially for AES than
GPP’S and ASIC’S because FPGA’S are
reprogrammable devices. It can give better response
in wider applications than ASIC’s. It provides faster
hardware solution than GPP’s.
AES ALGORITHM:
It is a cryptographic algorithm used to encrypt or
decrypt the data to keep the data secured.AES is a
symmetric block cipher that process the data in the
size of 128 bit blocks. The 128 bit data block split
into 4*4 matrix of 8 bits called the state and it put
through the rounds of operation designed to encrypt
the data. The no.of.rounds depends on the size of
the key and block data [3] .
Here these rounds consists of 4 transformations
namely Sub-S-Byte, Shift, Add Round key and Mix
column transformation. The last round omits mix
column transformation. This is the process to
encrypt the data as well as decryption is also same
but inverse to encryption process rounds.
AES ENCRYPTION:-
The below figure depicts the AES encryption. Input
to these AES encryption is plain text and output is
block cipher text. We can get this block cipher text
by performing the rounds namely First round
INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
1
ISBN:378-26-138420-027
,Normal round and Last round. As we have stated
these rounds consists of sub byte, shift, mix column
and add round key transformation to encrypt the
data.
Normal round consists of 4 transformations but the
first and last round differ from normal round. In first
round there is presence of additional add round key
at the same time. Last round omits the mix column
transformation. Here encryption works with the 128
bit-[2].
SUB BYTE TRANSFORMATION:-
It is a non-linear byte substitution operating on each
row of the state bytes independently. Here non-
linear substitution means each byte is replaced with
the other according to look up table. This is also
known as s-box. That s-box consists of 256 number
and their corresponding resulting values the
following figure shows the look up table. This is
more efficient method than directly implementing
multiplicative inverse operation followed by affine
transformation. By using this method we can reduce
the complexity of the hardware. As the hardware
complexity decreases latency go decrease
automatically. By this we can complete the S-Box in
single clock cycle.
SHIFT ROW TRANSFORMATION:-
It performs the shifting operation. It is just a routing
process. In this encryption process ,we can explain
this transformation in the way that, the bytes in the
first row of state do not change. The second, third
and fourth rows shift critically to the left one byte,
two byte, three bytes respectively depicted in
thebelowfigure.
MIX COLUMN TRANSFORMATION:-
Mix column transformation performs the mixing
operation on the columns of the state .The main Aim
of the mix column transformation is combining the
four bytes in a column using the linear trans
formation. Here columns of the state are considered
as the polynomial over the gf(2^8) and multiplied by
the modulo(X^4+1) with the fixed polynomial c(x)
given by
C(x)=(03)x^3+(01)x^2+(01)x+(02)
By using this approach we can easily realize the 4-
byte output of mix column transformation
ADD ROUND KEY TRANSFORMATION:-
Here in this Add Round key transformation ,a round
key is added to the state ,which is resulted from the
INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
2
ISBN:378-26-138420-028
mix column transformation by using the X-OR with
state round key.
AES ENCRYPTION CORE:-
In AES Encryption each round completes their
respective process in the single clock cycle .As we
have stated earlier input to and output of the
encryption process is plain text, round key and block
cipher text. It runs the process with the size of 128-
bit wide.
When the input signal is asserted then input data
loaded into the round and new encryption starts to
produce the new encrypted data (block cipher
text).This will produce the cipher text after 11,12,13
iterations . No. Of iteration rounds based on the size
of the data block size and key size. This allow’s the
external synchronous ROM to store the round key
schedule. A new encryption can be started since the
round key index is zero . once it go high the process
will go run to encrypt the data .By the time it reach
next zero it produce the output.
AES DECRYPTION:-
AES Decryption is the process used to convert the
block chipper text into the original data .we can get
the decrypted data after several rounds .This rounds
consists of same transformations what we had in the
encryption but inverse. Here also we do not have
mix column transformation in the last round
.decryption also take 11to14 iteration rounds to
complete the process.
INVERSE ADD-ROUND KEY TRANSFOMATION :-
This Add Round Key transformation is same as we
discussed in the encryption like using the X-OR
function between the state and the round key index.
Here round keys have to be selected in the reverse
order because it is the inverse add round key
transformation .Basically add round key
transformation is the inverse function because the x-
or function using here is having own-inverse
property
INVERSE SHIFT TRANSFORMATION:-
Inverse shift transformation is same but inverse to
the shift transformation in encryption process.
Basically, it performs the shifting operation between
the rows of the state .first row will not shift. Second,
third, fourth row are shifted to right by one, two,
three bytes respectively
INVERSE SUB BYTE TRANSFORMATION:-
This transformation is a non-linear byte substitution.
Non-linear substitution means replacing each byte
with another byte according to the inverse look up
table (inverse s-box).This below figure depicts the
INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
3
ISBN:378-26-138420-029
inverses-box.
INVERSRE MIX COLUMN TRANSFORMATION:-
Inverse Mix column transformation performs the
mixing operation on the columns of the state. The
main aim of this transformation is combining the
four bytes in the state .In inverse mix column trans
formation, the polynomial of degree less than 4over
gf (2^8), which coefficients are the elements of the
state are multiplied by modulo (x^4+1) by fixed
polynomial then it given as
D(x)=(0b)x^3+(0d)x^2+(09)x+(0e)
AES DECRYPTION CORE :-
AES Decryption core is the process used to convert
the block cipher text to original text .when the signal
is asserted, block cipher text enter into the round a
new decryption process starts to produce the
decrypted data. once block cipher text enter into the
decryption after 11 to14 iterations it gives the
decrypted data. This also allows the external
synchronous rom to store the round key index. a
new decryption can be started whenever the round
key index is zero .one clock cycle later the output of
the previous become available .since it go high it run
the process by the time it go low it give the result .
FPGA IMPLEMENTATION OF AES ALGORITHM:-
FPGA is the best choice for the cryptographic
algorithms, for AES also. because it is a re-
programmable one .it gives the better response in
speed than general purpose processors and it
provide greater applicability than ASIC .the below
figure shows the FPGA implementation of AES
algorithm .the table after the diagram shows the
control signals.
Here we should maintain 128-bit length for text-in,
text-out and key. Here control signals
clk,reset,enable are used to make the process
working correctly means proper operation of the
core .proper round keys can be generated by
combining the block key ,load key with key round
block to perform the key expansion. This process
works under the control of control signals coming
from the controller block. This controller block takes
the clock, enable, reset, direction, write signals from
the outside and generate the control signals. When
the write signal make a low-high-low transition plain
text (text_in) will go loaded .we can find the process
is completed when the done signal is pulsed after
the some clock cycles from the write signal goes low
.Done signal occur in one cycle .While doing the
process with 128-bit wide block the process can be
completed within 25 cycles for both encryption and
decryption process
INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
4
ISBN:378-26-138420-0210
SIMULATION RESULTS:-
Here use VERILOG HDL to write the code for this
design. All the result are synthesized and simulated
on the quatos 9.0, the model sim-altera 6.49 and
ep20k400cb652c7 device. The below figure shows
the results of the encrypted and decrypted algorithm
from the model-sim simulator.
In the above design simulation results that latency is
very low. Based on the above simulation results we
can say that both theoretical results and simulated
results are equal. How means the output of the
encryption was found after 13 cycles from the
starting of the encryption process. so, latency of the
encryption process is 13 cycles. Automatically
decryption need 12 cycles.
COMPARISION:-
To show that our design is best we should compare
our design results with the other results. If the result
of our design is better than other design, then only
we can say that our design is best. The below table
shows the comparision between our design and
other design.
When we compare our design with other FPGA
vendors like Xilinx and other altera mixed versions
.Our design has given better results in the respective
INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
5
ISBN:378-26-138420-0211
fields of area, throughput, latency, memory. At the
same time our design can keep the data in high
secure. The below figure shows the comparison
table which consists of compared results between
our design and other designs
CONCLUSION:-
Now-a-days information security is the major
concern for the user. For that, In this paper we have
proposed the FPGA implementation of AES
algorithm with data block of 128-bits and key length
of 128-bits using verilog. We used altera apex20kc
FPGA which is a high performance device to
implement our design based on the iterative
approach. We will simulate the results by using the
model sim and we compared the results with other
designs .Finally, we found that our design got the
better results than the other results in the respective
fields of area, throughput and latency.
REFERENCES:-
1. Sheunn-shyang wang and wan-sheng ni,”an efficient FPGA
Implementation of Advanced Encryption standard algorithm”.
circuit and systems-IEEE, 2004 may (23-23) Iscas’04,page(597-
600).
2. Hoang trang and nguyen van loi ,”an efficient FPGA
Implementation of Advance Encryption Standard Algorithm”.
computing and communication technologies-IEEE,2012 (feb27-
mar1).
3. Chetna sangwan, chetna bharadwaj , nisha and taruna
sikka,”vlsi implementation of Advanced Encryption standard
algorithm”. Computing and communication technologies-IEEE,
2012,page(412-418).
4. Anderson cattenlan zigiotto and Roberto d’amore , “Low-cost
FPGA Implementation of Advanced Encryption Standard
algorithm”.Integrated circuits andsystem design-
IEEE,2012,page(191-196).
5. cristian chip, david chein, Charles chein, Ingrid
verbauwhede,frank chang.”Hard ware implementation in FPGA of
Rijnadael algorithm”.cicuit and systems-IEEE-2012aug(4-
7),page(507-10).
INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
6
ISBN:378-26-138420-0212

More Related Content

What's hot

Advanced Encryption Standard Report
Advanced Encryption Standard ReportAdvanced Encryption Standard Report
Advanced Encryption Standard Report
brakanjero
 
Tele4653 l11
Tele4653 l11Tele4653 l11
Tele4653 l11
Vin Voro
 

What's hot (20)

Aes
AesAes
Aes
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
Design and minimization of reversible programmable logic arrays and its reali...
Design and minimization of reversible programmable logic arrays and its reali...Design and minimization of reversible programmable logic arrays and its reali...
Design and minimization of reversible programmable logic arrays and its reali...
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
Lec9 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Com...
Lec9 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Com...Lec9 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Com...
Lec9 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Com...
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
PL/SQL and radix tree structure
PL/SQL and radix tree structurePL/SQL and radix tree structure
PL/SQL and radix tree structure
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
 
11 × 11 Playfair Cipher based on a Cascade of LFSRs
11 × 11 Playfair Cipher based on a Cascade of LFSRs11 × 11 Playfair Cipher based on a Cascade of LFSRs
11 × 11 Playfair Cipher based on a Cascade of LFSRs
 
Advanced Encryption Standard Report
Advanced Encryption Standard ReportAdvanced Encryption Standard Report
Advanced Encryption Standard Report
 
Boolean algebra
Boolean algebraBoolean algebra
Boolean algebra
 
C046051216
C046051216C046051216
C046051216
 
Tele4653 l11
Tele4653 l11Tele4653 l11
Tele4653 l11
 
Aes
AesAes
Aes
 
Error-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video StreamingError-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video Streaming
 
Ch05
Ch05Ch05
Ch05
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipher
 

Similar to Iaetsd an survey of efficient fpga implementation of advanced encryption

An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
ijceronline
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
TELKOMNIKA JOURNAL
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 

Similar to Iaetsd an survey of efficient fpga implementation of advanced encryption (20)

An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
 
A03530107
A03530107A03530107
A03530107
 
A04660105
A04660105A04660105
A04660105
 
Aes
AesAes
Aes
 
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
F017364451
F017364451F017364451
F017364451
 
Final report
Final reportFinal report
Final report
 
11
1111
11
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
 
CNS2 unit 2.pdf
CNS2 unit 2.pdfCNS2 unit 2.pdf
CNS2 unit 2.pdf
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Iaetsd an survey of efficient fpga implementation of advanced encryption

  • 1. AN SURVEY OF EFFICIENT FPGA IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD ALGORITHM FOR ENCRYPTION USING VERILOG A.UDAY KUMAR, M.TECH-VLSI,SRM UNIVERSITY-NCR CAMPUS, MODINAGAR,GHAZIBAD-201204 EMAIL-ID:-udaykumar1303@gmail.com ABSTRACT:- This paper implements the FPGA implementation of AES algorithm using verilog .All cryptographic algorithms use FPGA for hardware implementation .Because,FPGA are programmable devices we need those cryptographic algorithms to secure the information .Here in this we use AES algorithm for encryption and decryption. This proposed design uses an iterative looping with block and key size of 128 bits look up table implementation of S-box. This gives less complexity in the architecture. we use Verilog HDL for the simulation. Here we compose these results with previous results to slow the efficiency. Keywords:-FPGA,AES,VERILOG HDL,ENCRYPTION,DECRYPTION INTRODUCTION:- Before AES there was one standard algorithm for the symmetric key encryption namely DATA ENCRYPTION STANDARD with the key length of 56 bits so,it can be easily broken ,so people thought DES is not sufficient to secure data for this reason . In sep,1997 The National institute of standard and technology(NIST) has given a call for cryptographic algorithm. Finally Rijnadel AES has been selected by the (NIST).Here AES has the size of 128,192 and 256 bits. So, automatically it becomes difficult to break the key. Here rijnadel specified the block key size in any multiple of 32 bits. The AES is a cryptographic algorithm used to secure the data. AES is symmetric block chipper to encrypt and decrypt the data in blocks of 128 bits. Encryptor is used to convert the plaintext into cipher text. Decryptor is used to convert the block cipher text to plaintext. Here encryptor and decryptor need the 10,12and14 iteration rounds to complete the encryption and decryption process. Here number of rounds required based on the size of block size and key size. Here, in the data encryption process we utilize look up table implementation of s-box to get the complexity less in architecture. FPGA implementation is the better choice for the cryptographic algorithms especially for AES than GPP’S and ASIC’S because FPGA’S are reprogrammable devices. It can give better response in wider applications than ASIC’s. It provides faster hardware solution than GPP’s. AES ALGORITHM: It is a cryptographic algorithm used to encrypt or decrypt the data to keep the data secured.AES is a symmetric block cipher that process the data in the size of 128 bit blocks. The 128 bit data block split into 4*4 matrix of 8 bits called the state and it put through the rounds of operation designed to encrypt the data. The no.of.rounds depends on the size of the key and block data [3] . Here these rounds consists of 4 transformations namely Sub-S-Byte, Shift, Add Round key and Mix column transformation. The last round omits mix column transformation. This is the process to encrypt the data as well as decryption is also same but inverse to encryption process rounds. AES ENCRYPTION:- The below figure depicts the AES encryption. Input to these AES encryption is plain text and output is block cipher text. We can get this block cipher text by performing the rounds namely First round INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 1 ISBN:378-26-138420-027
  • 2. ,Normal round and Last round. As we have stated these rounds consists of sub byte, shift, mix column and add round key transformation to encrypt the data. Normal round consists of 4 transformations but the first and last round differ from normal round. In first round there is presence of additional add round key at the same time. Last round omits the mix column transformation. Here encryption works with the 128 bit-[2]. SUB BYTE TRANSFORMATION:- It is a non-linear byte substitution operating on each row of the state bytes independently. Here non- linear substitution means each byte is replaced with the other according to look up table. This is also known as s-box. That s-box consists of 256 number and their corresponding resulting values the following figure shows the look up table. This is more efficient method than directly implementing multiplicative inverse operation followed by affine transformation. By using this method we can reduce the complexity of the hardware. As the hardware complexity decreases latency go decrease automatically. By this we can complete the S-Box in single clock cycle. SHIFT ROW TRANSFORMATION:- It performs the shifting operation. It is just a routing process. In this encryption process ,we can explain this transformation in the way that, the bytes in the first row of state do not change. The second, third and fourth rows shift critically to the left one byte, two byte, three bytes respectively depicted in thebelowfigure. MIX COLUMN TRANSFORMATION:- Mix column transformation performs the mixing operation on the columns of the state .The main Aim of the mix column transformation is combining the four bytes in a column using the linear trans formation. Here columns of the state are considered as the polynomial over the gf(2^8) and multiplied by the modulo(X^4+1) with the fixed polynomial c(x) given by C(x)=(03)x^3+(01)x^2+(01)x+(02) By using this approach we can easily realize the 4- byte output of mix column transformation ADD ROUND KEY TRANSFORMATION:- Here in this Add Round key transformation ,a round key is added to the state ,which is resulted from the INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 2 ISBN:378-26-138420-028
  • 3. mix column transformation by using the X-OR with state round key. AES ENCRYPTION CORE:- In AES Encryption each round completes their respective process in the single clock cycle .As we have stated earlier input to and output of the encryption process is plain text, round key and block cipher text. It runs the process with the size of 128- bit wide. When the input signal is asserted then input data loaded into the round and new encryption starts to produce the new encrypted data (block cipher text).This will produce the cipher text after 11,12,13 iterations . No. Of iteration rounds based on the size of the data block size and key size. This allow’s the external synchronous ROM to store the round key schedule. A new encryption can be started since the round key index is zero . once it go high the process will go run to encrypt the data .By the time it reach next zero it produce the output. AES DECRYPTION:- AES Decryption is the process used to convert the block chipper text into the original data .we can get the decrypted data after several rounds .This rounds consists of same transformations what we had in the encryption but inverse. Here also we do not have mix column transformation in the last round .decryption also take 11to14 iteration rounds to complete the process. INVERSE ADD-ROUND KEY TRANSFOMATION :- This Add Round Key transformation is same as we discussed in the encryption like using the X-OR function between the state and the round key index. Here round keys have to be selected in the reverse order because it is the inverse add round key transformation .Basically add round key transformation is the inverse function because the x- or function using here is having own-inverse property INVERSE SHIFT TRANSFORMATION:- Inverse shift transformation is same but inverse to the shift transformation in encryption process. Basically, it performs the shifting operation between the rows of the state .first row will not shift. Second, third, fourth row are shifted to right by one, two, three bytes respectively INVERSE SUB BYTE TRANSFORMATION:- This transformation is a non-linear byte substitution. Non-linear substitution means replacing each byte with another byte according to the inverse look up table (inverse s-box).This below figure depicts the INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 3 ISBN:378-26-138420-029
  • 4. inverses-box. INVERSRE MIX COLUMN TRANSFORMATION:- Inverse Mix column transformation performs the mixing operation on the columns of the state. The main aim of this transformation is combining the four bytes in the state .In inverse mix column trans formation, the polynomial of degree less than 4over gf (2^8), which coefficients are the elements of the state are multiplied by modulo (x^4+1) by fixed polynomial then it given as D(x)=(0b)x^3+(0d)x^2+(09)x+(0e) AES DECRYPTION CORE :- AES Decryption core is the process used to convert the block cipher text to original text .when the signal is asserted, block cipher text enter into the round a new decryption process starts to produce the decrypted data. once block cipher text enter into the decryption after 11 to14 iterations it gives the decrypted data. This also allows the external synchronous rom to store the round key index. a new decryption can be started whenever the round key index is zero .one clock cycle later the output of the previous become available .since it go high it run the process by the time it go low it give the result . FPGA IMPLEMENTATION OF AES ALGORITHM:- FPGA is the best choice for the cryptographic algorithms, for AES also. because it is a re- programmable one .it gives the better response in speed than general purpose processors and it provide greater applicability than ASIC .the below figure shows the FPGA implementation of AES algorithm .the table after the diagram shows the control signals. Here we should maintain 128-bit length for text-in, text-out and key. Here control signals clk,reset,enable are used to make the process working correctly means proper operation of the core .proper round keys can be generated by combining the block key ,load key with key round block to perform the key expansion. This process works under the control of control signals coming from the controller block. This controller block takes the clock, enable, reset, direction, write signals from the outside and generate the control signals. When the write signal make a low-high-low transition plain text (text_in) will go loaded .we can find the process is completed when the done signal is pulsed after the some clock cycles from the write signal goes low .Done signal occur in one cycle .While doing the process with 128-bit wide block the process can be completed within 25 cycles for both encryption and decryption process INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 4 ISBN:378-26-138420-0210
  • 5. SIMULATION RESULTS:- Here use VERILOG HDL to write the code for this design. All the result are synthesized and simulated on the quatos 9.0, the model sim-altera 6.49 and ep20k400cb652c7 device. The below figure shows the results of the encrypted and decrypted algorithm from the model-sim simulator. In the above design simulation results that latency is very low. Based on the above simulation results we can say that both theoretical results and simulated results are equal. How means the output of the encryption was found after 13 cycles from the starting of the encryption process. so, latency of the encryption process is 13 cycles. Automatically decryption need 12 cycles. COMPARISION:- To show that our design is best we should compare our design results with the other results. If the result of our design is better than other design, then only we can say that our design is best. The below table shows the comparision between our design and other design. When we compare our design with other FPGA vendors like Xilinx and other altera mixed versions .Our design has given better results in the respective INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 5 ISBN:378-26-138420-0211
  • 6. fields of area, throughput, latency, memory. At the same time our design can keep the data in high secure. The below figure shows the comparison table which consists of compared results between our design and other designs CONCLUSION:- Now-a-days information security is the major concern for the user. For that, In this paper we have proposed the FPGA implementation of AES algorithm with data block of 128-bits and key length of 128-bits using verilog. We used altera apex20kc FPGA which is a high performance device to implement our design based on the iterative approach. We will simulate the results by using the model sim and we compared the results with other designs .Finally, we found that our design got the better results than the other results in the respective fields of area, throughput and latency. REFERENCES:- 1. Sheunn-shyang wang and wan-sheng ni,”an efficient FPGA Implementation of Advanced Encryption standard algorithm”. circuit and systems-IEEE, 2004 may (23-23) Iscas’04,page(597- 600). 2. Hoang trang and nguyen van loi ,”an efficient FPGA Implementation of Advance Encryption Standard Algorithm”. computing and communication technologies-IEEE,2012 (feb27- mar1). 3. Chetna sangwan, chetna bharadwaj , nisha and taruna sikka,”vlsi implementation of Advanced Encryption standard algorithm”. Computing and communication technologies-IEEE, 2012,page(412-418). 4. Anderson cattenlan zigiotto and Roberto d’amore , “Low-cost FPGA Implementation of Advanced Encryption Standard algorithm”.Integrated circuits andsystem design- IEEE,2012,page(191-196). 5. cristian chip, david chein, Charles chein, Ingrid verbauwhede,frank chang.”Hard ware implementation in FPGA of Rijnadael algorithm”.cicuit and systems-IEEE-2012aug(4- 7),page(507-10). INTERNATIONAL CONFERENCE ON CIVIL AND MECHANICAL ENGINEERING, ICCME-2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 6 ISBN:378-26-138420-0212