A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD

Size: px
Start display at page:

Download "A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD"

Transcription

1 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD Ghada F.Elkaany, Hea K.Aslan and Mohamed N.Rasslan Informatis Department, Eletronis Researh Institute, Cairo, Egypt ABSTRACT The Advaned Enryption Standard (AES) algorithm is a symmetri lok ipher whih operates on a sequene of loks eah onsists of 128, 192 or 256 its. Moreover, the ipher key for the AES algorithm is a sequene of 128, 192 or 256 its. AES algorithm has many soures of parallelism. In this paper, a design of parallel AES on the multiproessor platform is presented. While most of the previous designs either use pipelined parallelization or take advantage of the Mix_Column parallelization, our design is ased on omining pipelining of rounds and parallelization of Mix_Column and Add_Round_Key transformations. This model is divided into two levels: the first is pipelining different rounds, while the seond is through parallelization of oth the Add_Round_Key and the Mix_Column transformations. Previous work proposed for pipelining AES algorithm was ased on using nine stages, while, we propose the use of eleven stages in order to exploit the soures of parallelism in oth initial and final round. This enhanes the system performane ompared to previous designs. Using two-levels of parallelization enefits from the highly independeny of Add_Round_Key and Mix_Column/ Inv_Mix_Colum transformations. The analysis shows that the parallel implementation of the AES ahieves a etter performane. The analysis shows that using pipeline inreases signifiantly the degree of improvement for oth enryption and deryption y approximately 95%. Moreover, parallelizing Add_Round_Key and Mix_Column/ Inv_Mix_Column transformations inreases the degree of improvement y approximately 98%. This leads to the onlusion that the proposed design is salale and is suitale for real-time appliations. KEYWORDS Advaned Enryption Standard AES, Parallel proessing, Pipelining 1. INTRODUCTION On June 2, 1997, the Amerian National Institute for Standardization and Tehnology (NIST) proposed a ompetition to propose a new enryption algorithm to replae the aging and inreasingly vulnerale Data Enryption Standard (DES). The new Advaned Enryption Standard (AES) hosen from the ompetitors was Rijndael [1 and 2]. Sine eoming the AES, Rijndael has een the fous of ountless analyses and has een implemented oth in hardware and software for many different platforms. To aelerate the AES omputation time, parallel omputing is inorporated [3-19]. DOI: /ijsit

2 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 In this paper, a design of parallel AES on the multiproessor platform is presented. While most of the previous designs either use pipelined parallelization or take advantage of the Mix_Column parallelization, our design is ased on omining pipelining of rounds and parallelization of Mix_Column and Add_Round_Key transformations. This model is divided into two levels: the first one is pipelining different rounds, while the seond one is through parallelization of oth the Add_Round_Key and the Mix_Column transformations. Previous work proposed for pipelining AES algorithm was ased on using nine stages, while, we propose the use of eleven stages in order to exploit the soures of parallelism in oth initial and final round. The paper is organized as follows: in Setion 2, a desription of AES algorithm and a survey of different designs for its implementation in parallel are detailed. Then, the proposed design is illustrated in Setion 3. In Setion 4, a performane evaluation of the proposed design is given. Finally, the paper onludes in Setion RELATED WORK 2.1. Advaned Enryption Standard (AES) The Advaned Enryption Standard (AES) algorithm is a symmetri lok ipher whih an onvert data to an unintelligile form (enryption) and onvert the data ak into its original form (deryption). Both enryption and deryption onsist of sequenes of loks eah onsists of 128- its. Moreover, the ipher key for the AES algorithm is a sequene of 128, 192 or 256 its. Internally, the AES algorithm s operations are performed on a two-dimensional (2-D) array of ytes alled the State array. The State array onsists of four rows of ytes, eah ontaining "N " ytes, where "N " is the lok length divided y 32 (the word size). Desription of the AES Algorithm The AES algorithm onsists of three distint phases as shown in Figure 1 [3]: In the first phase, an initial addition (XORing) is performed etween the input data (plaintext) and the given key (ipher key). Then, in the seond phase, a numer of standard rounds (Nr-1) are performed, whih represents the kernel of the algorithm and onsumes most of the exeution time. The numer of these standard rounds depends on the key size; nine for 128-its, eleven for 192-its, or thirteen for 256-its. Eah standard round inludes four fundamental algerai funtion transformations on arrays of ytes namely: (1) Byte sustitution using a sustitution tale (Sox) (2) Shifting rows of the State array y different offsets (ShiftRow) (3) Mixing the data within eah olumn of the State array (Mix_Column), and (4) Adding a round key to the State array (Key-Addition). Finally, the third phase of the AES algorithm represents the final round of the algorithm, whih is similar to the standard round, exept that it does not have Mix_Column operation. For detailed information of the aovementioned transformations, the reader ould refer to [1]. 40

3 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 Figure 1. The AES algorithm (Nr: 10, 12, or 14 depending on key length) [4] 2.2. The Parallel Advaned Enryption Standard (AES) Advaned Enryption Standard (AES) an e deployed in fully hardware [3-11], hyrid softwarehardware [12-16], and fully software implementations [17-19]. This fat allows parallelization of AES in different ways. In literature, parallelizing Rijndael has een visited many times for hardware implementation. In [4], Yoo et al. presented a hardware-effiient design that inreases AES throughput y making use of a high-speed parallel pipelined arhiteture. Yoo et al. used an effiient inter-round and intra-round pipeline design in order to ahieve a high throughput in enryption. In eah round, there are three pipeline stages, the first stage follows the yte-su operation, the seond one is loated after the shift-row operation, and the last stage is efore data output. Moreover, this design has one pipeline stage in key generation loks. On the other hand, Hodjad el at. [5] introdue a design that has four or seven pipeline stages, one after a yte-su operation and three or six in a yte-su operation. In [7], Ananth et al. present a fully pipelined AES enryption/deryption system that is fully unrolled in order to implement a very deep level of pipelining (i.e. all ten ipher rounds were unrolled.) For more designs for hardware implementation of AES, the reader ould refer to [8-11]. On the other hand, AES in software-hardware o-design is performed y using extended speial instrutions and the other transforms are performed y general instrutions [12-16]. S. Mahmoud 41

4 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 [12] presented a parallel implementation for AES algorithm y using the MPI (Message Passing Interfae) ased luster approah. MPI is one of the most estalished methods used in parallel programming mainly. This is due to the fat that the relative simpliity of deploying the method y writing a set of lirary funtions or an API (Appliation Program Interfae) allale from C, C++ or Fortran Programs. In [13], So-In shows that the 16-ytes AES lok an e individually enrypted. As an essential tehnique of AES parallelism is to exeute parallel AES y applying eah thread or eah node into eah AES lok to estalish a omplete enrypted parallel lok. This tehnique exludes the key expansion step required efore entering the parallel state. So-In applies AES enryption in ECB mode for the sake of performane evaluation. Similarly, CTR mode an e enrypted without the dependeny of the previous loks, ut not other modes. Other designs that use instrution set to inrease the effiieny of 32-it proessors for AES enryption algorithm ould e find in [14-16]. In [17], Brisk et al. introdue an example of fully software implementation of AES. In their work, they derived the asymptoti sequential runtime for the algorithm and desrie two parallel implementations. The first one is optimal in terms of time onsuming and the other one is optimal in terms of ost. In the ost-optimal implementation, they sarifie aeleration in order to redue the numer of proessors required for enryption. Other examples of fully software implementations are presented in [18 and 19]. In this paper, a design of parallel AES on the multiproessor platform is presented. While most of the previous designs either use pipelined parallelization or take advantage of the Mix_Column parallelization, in our work, we design a parallel model for the AES algorithm. This model is divided into two levels. The first one is pipelining different rounds, while the seond one is through parallelization oth Add_Round_Key and Mix_Column transformations. In the next setion, the proposed parallel AES design is presented. 3. THE PROPOSED PARALLEL ADVANCED ENCRYPTION STANDARD (AES) DESIGN Advaned Enryption Standard (AES) algorithm has many soures of parallelization as mentioned in Setion 2. In this work, we design a parallel model for the AES algorithm, this model is divided into two levels. The first one is pipelining different rounds, while the seond one is through parallelization oth the Add_Round_Key and the Mix-Column. In this setion, the parallel design of the AES algorithm is explained, while in the next setion its analysis is detailed The Parallel Enryption Model Based on the AES desription in Setion 2.1, AES algorithm is divided into three distint phases. The first phase ontains the initial round. The Seond phase ontains "Nr-1" standard rounds, in whih eah round inludes four transformations namely: Byte_Su, Shift_Row, Mix_Column, and Add_Round_Key. Finally, the third phase ontains the final round. That is similar to any standard round, exept that it does not have Mix_Column transformation. Both Byte_Su, and Shift_Row transformations are exeuted sequentially eause they operate on single ytes, independently of their position in the State matrix. On the other hand, Mix_Column and Add_Round_Key operations an e exeuted in parallel. While the Add_Round_Key operation is used to perform an arithmeti XOR operation, the Mix_Column transformation, whih represents 42

5 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 the kernel of the AES algorithm and onsumes most of the exeution time, is used to perform 64 XOR operations and 32 shift operations. In this work, we design a parallel model for the AES algorithm, this model is divided into two levels. The first one is pipelining different rounds (from round zero to round 10), while the seond one is through parallelization of oth Add_Round_Key and Mix-Column transformations Pipelined Enryption Rounds As shown in Figure 1, round numer zero (initial round) through round numer "N r, N r =10" represent the individual rounds in the AES-128 enryption. The pipelining etween these rounds will ahieve a high performane implementation. The data generated in eah individual round is used as the input to the next round. This is one of the easiest methods where high performane an e ahieved in a very minimal amount of time, thus, reduing the overall design implementation yle. We assume that our system ontains eleven stages {S 0,S 1,S 2,.., S 9, and, S 10 }, and the total numer of proessors equals "M". Moreover, eah proessor has its loal memory, and the proessor and its memory are alled proessing element. The "M" proessing elements onneted to eah other via multiport Shared Memory (SM). The ontent of a multi-port memory an e aessed through different ports simultaneously. In our work, eah stage an e performed y M r proessing elements PEs, where M r = M/11. Eah group of "M r " PEs has a diret independent aess to a ertain memory module, and eah PE has a dediated path to eah module in order to ahieve a etter performane. On the other hand, different stages are onneted through pipelined stream. That is to say, the pipelined stream ontains eleven funtions eah funtion is exeuted y a single stage. There is a pipeline stage etween eah round and the parallelization inside eah round whih will e desried in Setion Our pipeline design is different from [4] y adding two stages S 0 and S 10 to the pipeline stream. Eah of these stages are used to exeute the Add_Round_Key transformation (this transformation onsists of sixteen XOR operations), i.e. the design is fully pipelined. This tehnique of pipelining will inrease the onurreny and redue the total exeution time Parallelization inside Individual Round Eah individual round onsists of four transformations. As mentioned earlier, Mix_Column and Add_Round_key transformations an e exeuted in parallel. Add_Round_key onsists of 16 independent XOR operations, therefore, it ould e exeuted in parallel. In addition, Mix_Column transformation onsists of 64 XOR operations and 32 shift operations. Mix_Column represents the kernel of the AES algorithm and onsumes most of the exeution time. This neessitates its implementation in parallel to redue its exeution time. In this setion, the mathematial derivation of Mix_Column is disussed in details. In our design, "E" represents the matrix used for enryption, while "D" represents the matrix used for deryption. On the other hand, we assume that "B i " and "C i " are the input and output of the Mix_Column operation in ase of enryption, and are inversed at the deryption proess. In order to enrypt "L" numer of data loks ( 1 i L ), E, B i, and C i, for eah lok an e represented as follows: 43

6 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 B i = i i i i,1,5,9,13 i,2 i,6 i,10 i,14 i,3 i,7 i,11 i,15 i,4 i,8 i,12 i,16 02 and E = C i = E * B i (1) i i i i,1,5,9,13 i,2 i,6 i,10 i,14 i,3 i,7 i,11 i,15 i,4 i,8 i,12 i,16 02 = i 01 * i 03 i 02 i,1,5,9, i,2 i,6 i,10 i,14 i,3 i,7 i,11 i,15 i,4 i,8 i,12 i,16 (2) Mix_Column transformation is then represented y the following set of equations and is illustrated in Figure 2: i,1 = (2 i,1 ) (3 i,5 ) i,9 i,1 (3) i,5 = i,1 (2 i,5 ) (3 i,9 ) i,13 (4) i,9 = i,1 i,5 (2 i,9 ) (3 i,13 ) (5) i,13 = (3 i,1 ) i,5 i,9 (2 i,13 ) (6) This is repeated for the other three olumns of the matrix. The aove desription shows that the elements of Mix_Column matrix an e omputed independently. The Mix_Column transformation an e exeuted y more than one proessor. The maximum numer of proessors is thirty-two proessors in eah stage. Figure 3 represents the proposed parallel design for the AES enryption operation, while Figure 4 desries the details of omputing eah matrix element in parallel. As shown in this figure, two proessors an ooperate to ompute one or more element i,j. 44

7 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 Figure 2: Dataflow graphs for AES algorithm (Enryption Mode): Mix-Column operation 45

8 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 Figure 3: Parallelization of AES enryption operation 46

9 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer The Deryption Model Figure 4: Exeute the Mix_Column operation As the enryption operation, the parallelization of deryption an e done in two levels. In the first level of parallelism (pipelining different rounds), the deryption operation is done in the same way as the enryption operation (Setion 3.1.1). In order to derypt "L" numer of data loks ( 1 i L ), D, C i, and B i, for eah lok an e represented as follows: i C i = i i i,1,5,9,13 i,2 i,6 i,10 i,14 i,3 i,7 i,11 i,15 i,4 i,8 i,12 i,16 0E and D = 09 0D 0B 0B 0D 0E 0B 09 0E 0D D 0B 0E B i = D * C i (7) 47

10 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 i i i i,1,5,9,13 i,2 i,6 i,10 i,14 i,3 i,7 i,11 i,15 i,4 i,8 i,12 i,16 = 0E 09 0D 0B 0B 0E 09 0D 0D 0B 0E D * 0B 0E i i i i,1,5,9,13 i,2 i,6 i,10 i,14 i,3 i,7 i,11 i,15 i,4 i,8 i,12 i,16 (8) Inv_Mix_Column is then represented y the following set of equations and illustrated in Figure 5: i,1 = (0E i,1 ) (0B i,5 ) (0D i,9 ) (09 i,13 ) (9) i,5 = (09 i,1 ) (0E i,5 ) (0B i,9 ) (0D i,13 ) (10) i,9 = (0D i,1 ) (09 i,5 ) (0E i,9 ) (0B i,13 ) (11) i,13 = (0B i,1 ) (0D i,5 ) (09 i,9 ) (0E i,13 ) (12) This is repeated for the other three olumns of the matrix. As mentioned earlier, oth Inv_Mix_Column and Add_Round_key transforms an e exeuted in parallel. Inv_Mix_Column transformation onsists of 160 XOR operations and 192 shift operations. Similar to Mix_Columnu matrix, the elements of Inv_Mix_Column matrix an e omputed independently. The Inv_Mix_Column transformation an e exeuted y at most 64 proessors in eah stage. Figure 6 desries the details of omputing eah matrix element in parallel when using 16 proessors. As shown in this figure, four proessors an ooperate to ompute one or more element i,j. In the next setion, analysis of the proposed design is detailed. 4. ANALYSIS OF THE PROPOSED PARALLEL AES DESIGN In this setion, for oth enryption and deryption operations, we disuss the mathematial derivation of the proposed parallel AES design on a pipeline arhiteture of eleven stages. In our design, "M r " proessing elements ooperate to exeute eah stage (as disussed in Setion 3). For simpliity, we assume a lok and key sizes of 128 its. 48

11 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 Figure 5: Dataflow graphs for AES algorithm (deryption mode) Inv_Mix_Column operation 49

12 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer

13 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer Enryption Operation Figure 6: Exeute the Inv_Mix_Column operation The total sequential time "T ES " needed to exeute the enryption operation is given y: T ES = T Add_Round_Key + {(N r -1) * T Nr-1 } + T Nr (13) Where T Nr-1 = T Byte_Su + T Shift_Row + T Mix_Column + T Add_Round_Key (14) T Nr = T Byte_Su + T Shift_Row + T Add_Round_Key (15) T Add_Round_Key = 16 * T XOR (16) (T XOR : the time needed to exeute one XOR operation) T Shift_Row = 48 * T shift (17) 51

14 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 (T shift : the time needed to exeute one shift operation) T Mix_Column = 16 * (2*T shift + 4*T XOR ) (18) T XOR = 6 * T shift (19) From equations (13, 14, 15, 16, 17, 18, and 19), we dedue: T ES = 880*T XOR + 10 T Byte_Su (20) T Byte_Su is very small and an e negleted. For "L" loks, the total sequential time is given y: T LES = L* T ES = 880*L*T XOR (21) Pipelining the AES enryption rounds Assuming that the total numer of proessing elements M =11* M r, and "M r " proessing elements are used to exeute eah stage, the pipeline time "T pipeline " is given y: T pipeline = L*t 1 + 9*t 2 + t 3 (22) 9 1 T pipeline = L* t 1 * t2 * t3 (23) L L Where t 1 : is the time needed to exeute the initial round t 2 :is the time needed to exeute any round N j (1 j 9) t 3 : is the time needed to exeute the final round t 1 = T Add_Round_Key = 16* T XOR (24) t 2 = T Byte_Su + T Shift_Row + T Mix_Column + T Add_Round_Key = T Byte_Su + 48* T Shift + 16 * (2*T shift + 4*T XOR ) +16* T XOR (25) t 3 = T Byte_Su +T Shift_Row + T Add_Round_Key = T Byte_Su + 48* T Shift + 16* T XOR (26) T Byte_Su is very small and an e negleted. From Eqs. (22 to 26), the pipelined time "T pipeline " is given y: 10 16* TXOR 48*Tshift + 16*TXOR T pipeline = L L * (27) 9 * 32*T shift + 64*TXOR L Parallelization of Add_Round_Key and Mix_Column transformations We assume that the total numer of PEs that ompute eah round equals to "M r ", where 2 M r 32. Therefore, the time needed to exeute Add_Round_key transformation is given y: 52

15 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 T Add_Round_Key = 16 * T XOR (28) M r While, the time needed for exeute Mix_Column transformation is given y: T Mix_Column = 32 * Max T,T T ) (29) Where M r PEk PEk 1 ov T PEk = (T shift + 3*T XOR ) (30) T PEk 1 = (T shift + T XOR ) (31) T = the overhead Time ov 4.2. Deryption Operation The total sequential time "T DS " needed to exeute the deryption operation is given y: T DS = T Add_Round_Key + (N r -1) * T Nr-1 + T Nr (32) Where T Nr-1 = T Inv_Byte_Su + T Inv_Shift_Row + T Inv_Mix_Column + T Add_Round_Key (33) T Nr = T Inv_Byte_Su + T Inv_Shift_Row+ T Add_Round_Key (34) T Inv_Mix_Column = 16 * (12*T shift + 10*T XOR ) (35) By using the same assumptions at Eqs. (16-19), and from Eqs. (32-35), we dedue: T DS = 1984*T XOR + 10 T Inv_Byte_Su (36) T Inv_Byte_Su is very small and an e negleted. For "L" loks, the total sequential time is given y: T LDS = L*T DS =1984*L*T XOR (37) Pipelining the AES deryption rounds As disussed in the previous susetion (enryption ase), the pipeline time is given y: T pipeline = L*t 4 + 9*t 5 + t 6 (38) 9 1 T pipeline = L* t 4 * t5 * t6 (39) L L Where t 4 : is the time needed to exeute the initial round t 5 : is the time needed to exeute any round N j (1 j 9) t 6 : is the time needed to exeute the final round t 4 = T Add_Round_Key = 16*T XOR (40) 53

16 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 t 5 = T Inv_Byte_Su +T Inv_Shift_Row + T Inv_Mix_Column + T Add_Round_Key = T Inv_Byte_Su + 48* T Shift + (192*T shift + 160*T XOR ) +16 * T XOR (41) t 6 = T Inv-Byte_Su +T Inv_Shift_Row + T Add_Round_Key = T Inv_Byte_Su + 48* T Shift + 16* T XOR (42) From Eqs. (37-42) and with the assumption that T Inv_Byte_Su is very small and an e negleted, the pipelined time "T pipeline " is given y: 10 16* TXOR T pipeline = L L* 9 * 192* T L 48* T + 16 * T 160* T shift shift XOR XOR Parallelization of Add_Round_Key and Inv_Mix_Column transformations Assuming that the total numer of PEs that ompute eah round equals "M r ", where 4 M r 64, therefore, the total time for Add_Round_Key transformation is given y: T Add_Round_Key = M r (43) 16 * T XOR (44) While, the time needed to exeute the Inv_Mix_Column transformation is given y: 64 M r T Inv_Mix_Column = * MaxT,T,T,T Where PEk PEk1 PEk2 PEk3 Tov T PEk = (3*T shift + 4*T XOR ) (46) T PEk 1 = (3*T shift + 2*T XOR ) (47) T PEk 2 = (3*T shift + 3*T XOR ) (48) T PEk 3 = (3*T shift + T XOR ) (49) T ov = the overhead time 4.3. Disussion of Results In literature, there are some metris [20] used to evaluate the system performane suh as: Exeution time (parallel time) T par is referred to the total running time of the program. Speedup S p, whih relates the time taken to solve the prolem on a single proessor mahine to the time taken to solve the same prolem using parallel implementation. Effiieny, Ep, is defined as the ratio S p /M. Degree of improvement is the perentage of improvement in system performane with respet to sequential exeution and an e determined y (T s -T par )/T s. Tales 1 and 3 illustrate the improvement of the proposed design with respet to the sequential model for oth enryption and deryption operations. On the other hand, Tales 2, and 4 show the (45) 54

17 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 effet of parallelization of oth Add_Round_Key and Mix_Column/ Inv_Mix_Column transformations for the ases of enryption and deryption respetively for different numer of loks (L = 10, 25, and 40). Tale (1): Degree of improvement with respet to sequential time (T LES = L*880*T XOR ) (a) Pipelined enryption without parallelization of Add_Round_Key and Mix_Column Numer of loks Sequential time Pipelining time Degree of improvement L= *T XOR 1024*T XOR 88% L= *T XOR *T XOR 94.2% L= *T XOR 1556*T XOR 95.5% () Pipelined enryption with parallelization of Add_Round_Key and Mix_Column M r L=10 L=25 L= % 96% 97% 4 95% 97% 98.5% % 98.8% 98.9% Tale (2): The effet of parallelization of Add_Round_Key and Mix_Column (a) L=10 Mr Exeution time Speedup Effiieny Degree of improvement *T XOR *T XOR % 4 388*T XOR % 8 234*T XOR % () L=25 M r Exeution time Speed up Effiieny Degree of improvement *T XOR *T XOR % *T XOR % 8 264*T XOR % () L=40 M r Exeution time Speed up Effiieny Degree of improvement *T XOR *T XOR % 4 508*T XOR % 8 292*T XOR % Tale (3): Degree of improvement with respet to sequential time (T LDS = L*1984*T XOR ) (a) Pipelined deryption without parallelization of Add_Round_Key and Inv_Mix_Column Numer of loks Sequential time Pipelining time Degree of improvement L= *T XOR 1984*T XOR 90% L= *T XOR 2224*T XOR 95.5% L= *T XOR 2464*T XOR 96.8% 55

18 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 () Pipelined enryption with parallelization of Add_Round_Key and Mix_Column M r L=10 L=25 L= % 97.2% 98% % 98.2% 98.8% % 98.9% 99% Tale (4): The effet of parallelization of Add_Round_Key and Inv_Mix_Column (a) L=10 M r Exeution time Speedup Effiieny Degree of improvement *T XOR T XOR % T XOR % 8 444* T XOR % T XOR % () L=25 M r Exeution time Speedup Effiieny Degree of improvement *T XOR T XOR % 4 864T XOR % T XOR % T XOR % () L=40 M r Exeution time Speedup Effiieny Degree of improvement *T XOR T XOR % T XOR % T XOR % T XOR % From the aove tales, the following fats ould e dedued: - Tales 1(a) and 3(a) show that using pipeline inreases signifiantly the system performane for the ases of enryption and deryption. In addition, as the numer of loks inreases, for ases of enryption and deryption, the degree of improvement inreases. - - As shown in Tale 1() and 3(), as the numer of proessors used to exeute eah stage (2 to 16) inreases, the improvement degree inreases irrespetive of the lok size. To otain a reasonale effiieny, we will e satisfied with an improvement degree equals to 98%. Whih an e satisfied when M r =8 for the enryption ase and M r =16 for the deryption ase. - Tales 2 and 4 show the effet of parallelizing Add_Round_Key and Mix_Column/ Inv_Mix_Column transformations on the system performane inside eah stage. The omparison with the ase of using only one proessor is illustrated. As the numer of proessors inreases, the total exeution time dereases. In addition, the speedup inreases for oth enryption and deryption operations. Moreover, the improvement degree inreases 56

19 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 irrespetive of the lok size. This is true for L =10, 25, and 40. This leads to the onlusion that the proposed design is salale and is suitale for real-time appliations. Previous work proposed for pipelining AES algorithm was ased on using nine stages. In our work, we propose the use of eleven stages in order to exploit the soures of parallelism in oth initial and final round. This enhanes the system performane ompared to previous designs. In addition, we use two-levels of parallelism: the first level is pipelining different rounds (from round zero to round 10), while the seond one is through parallelization oth the Add_Round_Key and the Mix-Column transformations. Using two-levels of parallelization enefits from the highly independeny of Mix_Column/Inv_Mix_Colum transformation whih leads to a etter performane. 5. CONCLUSIONS The Advaned Enryption Standard (AES) algorithm is a symmetri lok ipher whih operates on a sequene of loks eah onsists of 128, 192 or 256 its. Moreover, the ipher key for the AES algorithm is a sequene of 128, 192 or 256 its. AES algorithm has many soures of parallelism. In this work we proposed an optimized version of AES algorithm. Both the enryption and the deryption algorithms have een optimized. In the present paper, we detailed a design for implementation of AES algorithm on a multiproessor platform. While most of the previous designs either use pipelined parallelization or take advantage of the Mix_Column parallelization, our design is ased on omining pipelining of rounds and parallelization of Mix_Column and Add_Round_Key transformations. This model is divided into two levels: the first one is pipelining different rounds, while the seond one is through parallelization of oth the Add_Round_Key and the Mix_Column transformations. Previous work proposed for pipelining AES algorithm was ased on using nine stages, while, we propose the use of eleven stages in order to exploit the soures of parallelism in oth initial and final round. This enhanes the system performane ompared to previous designs. Using two-levels of parallelization enefits from the highly independeny of Add_Round_Key and Mix_Column/ Inv_Mix_Colum transformations. The analysis shows that using pipeline inreases signifiantly the degree of improvement for oth enryption and deryption y approximately 95%. Moreover, parallelizing Add_Round_Key and Mix_Column/ Inv_Mix_Column transformations inreases the degree of improvement y approximately 98%. To otain a reasonale effiieny, we will e satisfied with an improvement degree equals to 98%. This ould e ahieved using eight proessors for eah stage in ase of enryption and sixteen proessors for the deryption ase. Sine, the inrease of numer of proessors will derease the effiieny. The analysis shows that the improvement degree inreases irrespetive of the lok size. This is true for L =10, 25, and 40. This leads to the onlusion that the proposed design is salale and is suitale for real-time appliations. REFRENCES [1] Joan Daemen and Vinent Rijmen, (1998) "AES Proposal: Rijndael" [2] W.Stallings (2010), Cryptography and Network Seurity: Priniples and Pratie, Prentie Hall. [3] Mostafa I. Soliman and Ghada Y. Aozaid, (2010) "FastCrypto: Parallel AES Pipelines Extension for General-Purpose Proessors", Neural, Parallel, and Sientifi Computations, No. 18, pp [4] S.-M. Yoo, D. Kotturi, D.W. Pan, and J. Blizzard, (2005) "An AES rypto hip using a high-speed parallel pipelined arhiteture", Miroproessors and Mirosystems, No.29, pp

20 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 [5] A.Hodjat, and I. Verauwhede (2004), "A Gits/s fully pipelined AES proessor on FPGA", in Pro. of 12th Annual IEEE Symposium on Field-Programmale Custom Computing Mahines (FCCM'04), pp [6] Bin Liu, and Bevan M. Baas (2013) "Parallel AES Enryption Engines for Many-Core Proessor Arrays", IEEE Transations on Computers, Vol. 62, no. 3, pp [7] C.Ananth and K. Ramu (2008) "Fully pipelined implementations of AES with speeds exeeding 20 Gits/s with S-oxes implemented using logi only", Tehnial report Department of ECE, George Mason University. [8] Y.Mitsuyama, M. Kimura, T. Onoye, and I. Shirakawa, (2005) "Arhiteture of IEEE802.11i Cipher Algorithms for Emedded Systems", IEICE Transations on Fundamentals of Eletronis, Communiations and Computer Sienes, Vol. E88-A, no.4, pp [9] S.Arrag, A. Hamdoun, A. Tragha and S. Khamlih, (2012) "Design and Implementation A different Arhitetures of Mix_Column in FPGA", International Journal of VLSI Design and Communiation Systems, Vol. 3, Issue 4, p.11. [10 ]M.Anitha and S. Priya, (2014) "Design of Low Power Mixolumn in Advaned Enryption Standard Algorithm", International Journal of Sientifi and Engineering Researh (IJSER), Vol. 5, Issue 4, pp [11] P.Noo-intara, S. Chantarawong, and S. Choomhuay, (2004) "Arhitetures for MixColumn Transform for the AES", in Pro. of ICEP 2004, Phuket, Thailand, pp [12] Sair Mahmud, (2004) "A Study on Parallel Implementation of Advaned Enryption Standard (AES)", M.S. thesis, Computer Siene, Independent University, Bangladesh, May, [13] C.So-In, S. Poolsanguan, C. Poonrioon, K. Rujirakul, and C. Phudphut, (2013) "Performane Evaluation of Parallel AES Implementations over CUDAGPU Framework", International Journal of Digital Content Tehnology and its Appliations (JDCTA), Vol.7, no.5, pp [14] S.Tillih, and J. Großshädl, (2006) "Instrution Set Extensions for Effiient AES Implementation on 32-it Proessors, Cryptographi Hardware and Emedded Systems (CHES)", Leture Notes in Computer Siene, Vol.4249, pp [15] A.Elirt, (2007) "Fast and Effiient Implementation of AES Via Instrution Set Extensions", in Pro. of the 21st International Conferene on Advaned Information Networking and Appliations Workshops (AINAW'07), Niagara Falls, Ont., May, Vol.1, pp [16] S.Gueron, (2012) "Intel Advaned Enryption Standard (AES) Instrutions Set. Intel", White Paper, " [17] Brisk, A. Kaplan, and M. Sarrafzadeh (2003), "Parallel Analysis of the Rijndael Blok Cipher", in Pro. of the IASTED International Conferene of Parallel and Distriuted Computing and Systems, Marina del Rey, USA, 3-5 Nov. [18] Jung Ho Yoo, (2011) "Fast Software Implementation of AES-CCM on Multiproessors", Algorithms and Arhitetures for Parallel Proessing, Leture Notes in Computer Siene, Vol. 7017, pp [19] M.S. Arun, and V. Saminathan, (2014) "Parallel AES Enryption with Modified Mix-olumns For Many Core Proessor Arrays", International Journal of Engineering Siene and Innovative Tehnology (IJESIT), Vol. 3, Issue 3, pp [20] J.Hennessy and D. Patterson, (2003), Computer Arhiteture: a Quantitative Approah, Morgan Kaufmann Pulishers. AUTHORS Ghada F. ElKaany is an Assistant Professor at Eletronis Researh Institute, Cairo-Egypt. She reeived her B. S. degree, M. S. degree and Ph. D. degree in Eletronis and Communiations Engineering from Faulty of Engineering, Cairo University, Egypt in 1990, 1994 and 2007 respetively. Her researh interests inlude: High Performane Computing (HPC), omputer network seurity, rootis, and image proessing. 58

21 International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 Hea K. Aslan is a Professor at Eletronis Researh Institute, Cairo-Egypt. She reeived her B.S. degree, M.S. degree and Ph.D. degree in Eletronis and Communiations Engineering from the Faulty of Engineering, Cairo University, Egypt in 1990, 1994 and 1998 respetively. Aslan has supervised several masters and Ph.D. students in the field of omputer networks seurity. Her researh interests inlude: Key Distriution Protools, Authentiation Protools, Logial Analysis of Protools and Intrusion Detetion Systems. Mohamed N. Rasslan is an Assistant Professor at Eletronis Researh Institute, Cairo, Egypt. He reeived the B.S., M.S., degrees from Cairo University and Ain Shams University, Cairo, Egypt, in 1999 and 2006 respetively, and his Ph.D. from Conordia University, Canada His researh interests inlude: Cryptology, Digital Forensis, and Networks Seurity. 59

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Integrating Parallel File I/O and Database Support for High-Performance Scientific Data Management

Integrating Parallel File I/O and Database Support for High-Performance Scientific Data Management In Pro of SC: High Performane Networking and Computing, Novemer Integrating Parallel File I/O and Dataase Support for High-Performane Sientifi Data Management Jaehun No Rajeev Thakur Alok Choudhary Math

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -

More information

SOFTWARE ENGINEERING I

SOFTWARE ENGINEERING I SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Abstract AES is an encryption algorithm which can be easily implemented on fine grain many core systems.

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypassing Spae Explosion in Regular Expression Mathing for Network Intrusion Detetion and Prevention Systems Jignesh Patel Alex X. Liu Eri Torng Department of Computer Siene and Engineering Mihigan State

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

The Price of Uncertainty in Security Games

The Price of Uncertainty in Security Games The Prie of Unertainty in Seurity Games Tehnial Report Jens Grossklags a Benjamin Johnson iolas Christin a Shool of Information University of California, Berkeley Berkeley, CA 947 jensg@ishool.erkeley.edu

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Modelling and Simulation of Closed Loop Controlled Buck Converter Fed Pmbldc Drive System

Modelling and Simulation of Closed Loop Controlled Buck Converter Fed Pmbldc Drive System Researh Journal of Applied Sienes, Engineering and Tehnology 3(4): 284-289, 2011 ISSN: 2040-7467 Maxwell Sientifi Organization, 2011 Reeived: Feruary 14, 2011 Aepted: Marh 15, 2011 Pulished: April 20,

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

SeChat: An AES Encrypted Chat

SeChat: An AES Encrypted Chat Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Efficient Software Implementation of AES on 32-bit Platforms

Efficient Software Implementation of AES on 32-bit Platforms Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

Traitor Tracing Schemes for Protected Software Implementations

Traitor Tracing Schemes for Protected Software Implementations Published in S. Katzenbeisser and A.-R. Sadeghi, Eds, 11th ACM Workshop on Digital Rights Management (ACM DRM 2011), pp. 15-21, ACM Press, 2011. Traitor Traing Shemes for Proteted Software Implementations

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Strategic Plan. Achieving our 2020 vision. Faculty of Health Sciences

Strategic Plan. Achieving our 2020 vision. Faculty of Health Sciences Strategi Plan Ahieving our 00 vision Faulty of Health Sienes Our Values guide our ations Health and Understanding, promoting, and influening the holisti well-eing of self and others Our Vision To e a national

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

computer science Program Educational Objectives

computer science Program Educational Objectives omputer siene bahelor of siene minor ertifiates: managing information on the world wide web master of siene in omputer siene master of siene in software engineering advaned ertifiate programs: bioinformatis

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2

More information

A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm. Rajender Manteena

A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm. Rajender Manteena A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm y Rajender Manteena A thesis sumitted in partial fulfillment of the requirements for the degree of Master of Science in Electrical

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

CIS570 Lecture 4 Introduction to Data-flow Analysis 3 Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to

More information

Professional Certificate Training in Business Writing

Professional Certificate Training in Business Writing Professional Certifiate Training in Business Writing About Training in Business Writing ZeebraCross Centre for Management Exellene (ZCME) is an initiative of ZeebraCross (Unit of InfousRx Marketing and

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

FPGA IMPLEMENTATION OF AN AES PROCESSOR

FPGA IMPLEMENTATION OF AN AES PROCESSOR FPGA IMPLEMENTATION OF AN AES PROCESSOR Kazi Shabbir Ahmed, Md. Liakot Ali, Mohammad Bozlul Karim and S.M. Tofayel Ahmad Institute of Information and Communication Technology Bangladesh University of Engineering

More information

Paid Placement Strategies for Internet Search Engines

Paid Placement Strategies for Internet Search Engines Paid Plaement Strategies for Internet Searh Engines Hemant K. Bhargava Smeal College of Business Penn State University 342 Beam Building University Park, PA 16802 bhargava@omputer.org Juan Feng Smeal College

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

Microcontroller Based PWM Controlled Four Switch Three Phase Inverter Fed Induction Motor Drive

Microcontroller Based PWM Controlled Four Switch Three Phase Inverter Fed Induction Motor Drive SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 7, No., November 00, 95-04 UDK: 004.466 Miroontroller Based PWM Controlled Four Swith Three Phase Inverter Fed Indution Motor Drive Nalin Kant Mohanty, Ranganath

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

The Basics of International Trade: A Classroom Experiment

The Basics of International Trade: A Classroom Experiment The Basis of International Trade: A Classroom Experiment Alberto Isgut, Ganesan Ravishanker, and Tanya Rosenblat * Wesleyan University Abstrat We introdue a simple web-based lassroom experiment in whih

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

Certificate of Foreign Intermediary, Foreign Flow-Through Entity, or Certain U.S. Branches for United States Tax Withholding and Reporting

Certificate of Foreign Intermediary, Foreign Flow-Through Entity, or Certain U.S. Branches for United States Tax Withholding and Reporting Form W-8MY (Rev. April 2014) Department of the Treasury nternal Revenue Servie Do not use this form for: A A A Certifiate of Foreign ntermediary, Foreign Flow-Through Entity, or Certain U.S. Branhes for

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks 1 A Game Theoretial Approah to Gateway Seletions in Multi-domain Wireless Networks Yang Song, Starsky H.Y. Wong and Kang-Won Lee IBM Researh, Hawthorne, NY Email: {yangsong, hwong, kangwon}@us.ibm.om Abstrat

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros

More information

AT 6 OF 2012 GAMBLING DUTY ACT 2012

AT 6 OF 2012 GAMBLING DUTY ACT 2012 i e AT 6 OF 2012 GAMBLING DUTY ACT 2012 Gambling Duty At 2012 Index i e GAMBLING DUTY ACT 2012 Index Setion Page PART 1 INTRODUCTORY 5 1 Short title... 5 2 Commenement... 5 3 General interpretation...

More information

The analysis of brushing tool characteristics

The analysis of brushing tool characteristics ARCHIVES OF CIVIL AND MECHANICAL ENGINEERING Vol. IV 004 No. 4 The analysis of rushing tool harateristis Kiele University of Tehnology, al. Tysiąleia P. P. 7, 5-34 Kiele In this paper, an analytial proedure

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Implementation and Design of AES S-Box on FPGA

Implementation and Design of AES S-Box on FPGA International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

5.2 The Master Theorem

5.2 The Master Theorem 170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

The Advanced Encryption Standard: Four Years On

The Advanced Encryption Standard: Four Years On The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow

More information

The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES

More information

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T 9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

Optimal Online Buffer Scheduling for Block Devices *

Optimal Online Buffer Scheduling for Block Devices * Optimal Online Buffer Sheduling for Blok Devies * ABSTRACT Anna Adamaszek Department of Computer Siene and Centre for Disrete Mathematis and its Appliations (DIMAP) University of Warwik, Coventry, UK A.M.Adamaszek@warwik.a.uk

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

Nodal domains on graphs - How to count them and why?

Nodal domains on graphs - How to count them and why? Proeedings of Symposia in Pure Mathematis Nodal domains on graphs - How to ount them and why? Ram Band, Idan Oren and Uzy Smilansky, Abstrat. The purpose of the present manusript is to ollet known results

More information

VOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR. A Thesis by. Hong-Tuan Nguyen Vu

VOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR. A Thesis by. Hong-Tuan Nguyen Vu VOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR A Thesis by Hong-Tuan Nguyen Vu Eletrial Engineer, Polytehni University of HCMC, 1993 Submitted to the College of

More information

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia A PROGRAM FOR SOLUtiON OF LARGE SCALE VEHICLE ROUTING PROBLEMS By JEFFREY ALLAN ROBBINS Bahelor of Siene Virginia Polytehni Institute and State University Blaksburg, Virginia 1974 II Submitted to the Faulty

More information

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University

More information