Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays



Similar documents
Implementation of Full -Parallelism AES Encryption and Decryption

Implementation and Design of AES S-Box on FPGA

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

IJESRT. [Padama, 2(5): May, 2013] ISSN:

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

FPGA IMPLEMENTATION OF AES ALGORITHM

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

The implementation and performance/cost/power analysis of the network security accelerator on SoC applications

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Floating Point Fused Add-Subtract and Fused Dot-Product Units

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Automata Designs for Data Encryption with AES using the Micron Automata Processor

synthesizer called C Compatible Architecture Prototyper(CCAP).

Split Based Encryption in Secure File Transfer

FPGA IMPLEMENTATION OF AN AES PROCESSOR

Secure Privacy Preserving Public Auditing for Cloud storage

SeChat: An AES Encrypted Chat

Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay

CSCE 465 Computer & Network Security

(C) Global Journal of Engineering Science and Research Management

Data Integrity by Aes Algorithm ISSN

Keywords Web Service, security, DES, cryptography.

A Study of New Trends in Blowfish Algorithm

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7

Rijndael Encryption implementation on different platforms, with emphasis on performance

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V

The Advanced Encryption Standard (AES)

Area Optimized and Pipelined FPGA Implementation of AES Encryption and Decryption

Area optimized in storage area network using Novel Mix column Transformation in Masked AES

Polymorphic AES Encryption Implementation

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

FPGA Design of Reconfigurable Binary Processor Using VLSI

Cryptography and Network Security

Multi-Layered Cryptographic Processor for Network Security

How To Encrypt With A 64 Bit Block Cipher

A PPENDIX G S IMPLIFIED DES

CONSTRAINT RANDOM VERIFICATION OF NETWORK ROUTER FOR SYSTEM ON CHIP APPLICATION

Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore. A) Examples Of model:

Efficient Software Implementation of AES on 32-bit Platforms

ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT

Design of a High-speed and large-capacity NAND Flash storage system based on Fiber Acquisition

Performance Evaluation of AES using Hardware and Software Codesign

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Cyber Security Workshop Encryption Reference Manual

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

A comprehensive survey on various ETC techniques for secure Data transmission

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Fast Implementations of AES on Various Platforms

AES Power Attack Based on Induced Cache Miss and Countermeasure

Multipliers. Introduction

Hardware Implementations of RSA Using Fast Montgomery Multiplications. ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner

How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)

Secure Network Communication Based on Text-to-Image Encryption

Automated Model Based Testing for an Web Applications

AES Cipher Modes with EFM32

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

A Novel Cryptographic Key Generation Method Using Image Features

Enhancing the Mobile Cloud Server security by MAC Address

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

The Encryption Technology of Automatic Teller Machine Networks

Switching between the AES-128 and AES-256 Using Ks * & Two Keys

Hardware Implementation of the Stone Metamorphic Cipher

1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

A New Cloud Paradigm: Data Protection as a Service (DPASS)

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA

FPGA Implementation of RSA Encryption Engine with Flexible Key Size

An Energy Efficient ATM System Using AES Processor

A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm. Rajender Manteena

A Secure Data Transmission By Integrating Cryptography And Video Steganography

IMPLEMENTATION OF BACKEND SYNTHESIS AND STATIC TIMING ANALYSIS OF PROCESSOR LOCAL BUS(PLB) PERFORMANCE MONITOR

A Compact FPGA Implementation of Triple-DES Encryption System with IP Core Generation and On-Chip Verification

Design and analysis of flip flops for low power clocking system

Enhance data security of private cloud using encryption scheme with RBAC

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

The Load Balancing System Design of Service Based on IXP2400 Yi Shijun 1, a, Jing Xiaoping 1,b

Digital Systems Design! Lecture 1 - Introduction!!

Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.

Transcription:

IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays A.Anusha, N.Samba Murthy 2 PG Student, ECE Department, Gudlavalleru Engineering College, Gudlavalleru, India 2 Assistant Professor, ECE Department, Gudlavalleru Engineering College, Gudlavalleru, India anuece.anu@gmail.com, 2 sambanaga009@gmail.com Abstract: This paper presents information on AES Encryption and Decryption for multi processors. In this paper AES algorithm is used. The AES algorithm is a round based algorithm. The round based algorithm is used to provide security to the information. In AES algorithm there are different types of keys, they are 28,92 and 256 bits. These bits are used to encrypt and decrypt the information. In this paper 28bits are used. In this paper the main functional blocks are key generation, encryption and decryption. In order produce a new key sub byte, rotate word, round constant and add round key operations are used. In order to convert plain text to cipher message the sub bytes, shift rows, mix column and add round key operations are used. By doing these operations the cipher information is obtained. This cipher will be given to the decryption and it is the total reverse process of encryption. After completion of reverse process the outcome is original information. Index terms- Advanced Encryption Standards, cipher, multi processor. I. Introduction Encryption is the process of converting original message into cipher information by using key. In this process the information must be in the form of hexadecimal or integer format only. Decryption is the process of converting cipher information to original information by using same key. In decryption the format of message must be in Hexadecimal or integer. In this paper the advanced encryption standard algorithm technique uses the symmetric key that means private key. The main advantage of symmetric key is provide security to the data and reduces the area also. This types of private keys mainly used in ATM machines and software s also. This paper mainly concentrates on developing suitable method for rapid and efficient way to perform hardware implementation for some applications to provide security to the information. To accomplish high security for a system the AES technique is used. Most of the users now a day s using wireless communication for fast sending and receiving the mails in less time and less cost. When this way of communication is going on, the unauthorized people who have the intension to know about the conversation will hack the information. The AES algorithm is used to provide security and hackers cannot hack the data even if they know the key and algorithm also. In this paper the sub bytes and inv sub bytes operation will be done word wise. By doing these operations reduce the area and increase the speed of the operation. DOI: 0.9790/4200-0530 www.iosrjournals.org Page

Fig. Block Diagram Of AES There are mainly 3 types of operations in advanced encryption standard algorithm. They are key generation; encryption and decryption. II. Key Generation The key generation processes the data block of fixed size i.e. 28 bits using cipher key length of 28,92 and 256 bits. The number of operations will be depending on number of bits. By using different type of bits it has some constant rounds of operation. For 28 bits it has 0 rounds of operations. By rounds of operations, it provides security because by doing this types operation they cannot hack the data. The below table [] shows the number of keys and number of rounds for particular bits. Table : key generation No. of bits 28 bits 92 bits 256 bits No. of keys 0 keys 2 keys 4 keys No. of rounds 0 rounds 2 rounds 4 rounds For 28 bits (which we r using here) there are fixed 0 rounds. For getting 0 keys we have to done some operations. They are sub bytes, rotate word, round constant and add round key operations. DOI: 0.9790/4200-0530 www.iosrjournals.org 2 Page

Fig2. Block diagram of key generation 2. Sub bytes operation The sub bytes operations will be done word wise. This is non-linear substitution technique. It works on every byte of the state independently. By using S-box table, it will operate. The S-box table is developed on 2 transformation techniques. They are 2.. Take the replica of Rijndael s conditions. 2..2 Apply a non-regular technique that is already implemented on Rijndael technique. The predefined values of substitution table is used here. Every bytes of the state is compared with the value in the equal positioned value in S-box. B [, ] = S box [b (, )] Fig 2. Sub bytes operation 2.2 Rotate word operatio Rotate word performs a one byte circular rotate left. DOI: 0.9790/4200-0530 www.iosrjournals.org 3 Page

Rot word [A8 A7 A6 A5] = [A5 A8 A7 A6] 2.3 Round constant operation The round constant operation is different for each step. In the example take either one column or row 07 cf 3f 4c Then rotate the equation Cf 3f 4c 07 Now put these values through the AES s-box (component wise) 8a 75 29 c5 This is the operation for round.now we need the round constant operation. Add round one to the s-box output 8a 0 = 8b 75 00 = 75 29 00 = 29 C5 00 = c5 This is the operation for round constant. These are the operations for key generation. 2.4 Add round key operation Every byte of the value is directly added with the key. The below figure shows the operation of add round key W 0 W 3 W 3 W 2 W 2 W W DOI: 0.9790/4200-0530 www.iosrjournals.org 4 Page

W 0 W 0 Key W 3 W 2 W W 0 Fig 2.2 Add round key operation This is the operation for key.repeat the above steps up to 0 rounds for every round will get one key total 0 keys because this technique using 28bits. For 28 bits it has 0 rounds of operation for each round it will get one new key. III. Encryption It is defined as converting original message to cipher message. Fig3. Block diagram of Encryption There are mainly 4 types of operations in encryption. They are 3. Sub bytes operation The sub bytes operations will be done word wise. This is non-linear substitution technique. It works on every byte of the state independently. By using substitution table it will operate. The substitution table is developed on 2 transformation techniques. They are 3.. Take the replica of Rijndael s conditions. 3..2 Apply a non-regular technique that is already implemented on Rijndael technique. DOI: 0.9790/4200-0530 www.iosrjournals.org 5 Page

The predefined values of substitution table is used here. Every bytes of the state is compared with the value in the equal positioned value in s-box. B [, ] = S box [b (, )] Fig 3. sub bytes operation 3.2 Shift rows The shift rows operations were done with the shifting rows cyclically either right or left. 3.2. In first row there is no change. 3.2.2 In second row shift cyclically by one position either left side or right side 3.2.3 In third row shift cyclically by two positions. 3.2.4 In fourth row shift cyclically by three positions. No change D0 D D2 D3 D0 D D2 D3 st shift D4 D5 D6 D7 D5 D6 D7 D4 2 nd shift D8 D9 D0 D D0 D D8 D9 3 rd shift D2 D3 D4 D5 D5 D2 D3 D4 3.3 Mix column operation In mix column operation each column of the state array is considered as a multiplicative term. In mix column operation the 4*4 matrix is multiplied with the constant matrix. In mix column operation, there are only 9 rounds ( to 9). There is no 0th round for mix column operation. For 0 th round, the shift rows operation is directly given to the add round key operation because there is no 0 th round for mix column. 3.4 Add round key operation Every byte of the value is directly added with the key. The operation between mix column output with key to 9 rounds only. DOI: 0.9790/4200-0530 www.iosrjournals.org 6 Page

IV. Decryption It is defined as the converting cipher message to original message. The decryption is the total reverse operation of the encryption. Fig4. Block diagram of Decryption There are mainly 4 types of operations in decryption. They are 4. Inv sub bytes operation The inv sub bytes operations will be done word wise. This is non-linear substitution technique. It works on every byte of the state independently. It operates by using inverse substitution table. The inverse substitution table is develops on 2 transformation techniques. They are 4.. Take the replica of Rijndael s finite field. 4..2 Apply a non-regular technique that is already implemented on Rijndael technique. B [, ] = S box [b (, )] The predefined values of substitution table is used here. Every bytes of the state is compared with the value in the equal positioned value in the inverse s-box. DOI: 0.9790/4200-0530 www.iosrjournals.org 7 Page

Fig. 4. sub bytes operation 4.2 Inv shift rows operation The inv shift rows operations were done with the shifting rows cyclically right. The inv shift rows operation is same as the shift rows operation. 4.2. In first row there is no change. 4.2.2 In second row shift cyclically by one position either left side or right. 4.2.3 In third row shift cyclically by two positions. 4.2.4 In fourth row shift cyclically by three positions. No change D0 D D2 D3 D0 D D2 D3 st shift D4 D5 D6 D7 D5 D6 D7 D4 2 nd shift D8 D9 D0 D D0 D D8 D9 3 rd shift D2 D3 D4 D5 D5 D2 D3 D4 4.3 Inv mix column operation In inv mix column operation each column of the state array is considered as a multiplicative term. In inv mix column operation the 4*4 matrix is multiplied with the constant matrix and we get same dimensional matrix. In first round there is no inv mix column operation. 4.4 Inv add round key Every byte of the value is directly added with the key. The key must be in reverse order i.e. 0 to for decryption Applications:. It is used in online banking. 2. ATM machines and social networking also. 3. It is also used in business purpose also. DOI: 0.9790/4200-0530 www.iosrjournals.org 8 Page

Fig 2.3 Timing diagram for key generation After key generation is enabled and reset is high and key load is loaded, then the keys are produced. Fig 3.2 RTL schematic for Encryption Fig 3.2 Timing diagram for Encryption After reset and key generation enabled encryptions starts. As encryption ends, encryption over signal is high indicating that message is converted into encrypted information DOI: 0.9790/4200-0530 www.iosrjournals.org 9 Page

Fig 4.2 RTL schematic for Decryption Fig 4.3 Timing diagram for Decryption After reset and key generation enabled decryptions starts. As decryption ends, decryption over signal is high indicating that message is converted into original information V. Analysis report: Encryption Decryption No.of Slices 77 77 No. of flip-flops 682 682 No. of 4 I/p LUT s 076 075 No. of IOB s 263 263 No. of CLK s Total Delay 5.04ns 5.04ns Table2. Analysis report for encryption and decryption DOI: 0.9790/4200-0530 www.iosrjournals.org 0 Page

VI. Conclusion Xilinx is very helpful tool for software and hardware. By using this technique we can provide security to information. By using AES we can reduce the area and reduction of cost will lead to the reduction of overall production cost and 00% security of data. The future scope of this project is further to extend up to 256 bits efficiently and successfully by using the same techniques. Acknowledgement I am glad to express my deep sense of gratitude to, Mr. N.Samba Murthy, Assistant Professor of Electronics and Communication Engineering, for his guidance and cooperation in completing this project. Through this, I want to convey my sincere thanks to him for his inspiring assistance during my project. I express my heartfelt gratitude and deep indebtedness to the beloved Head of the Department, Dr. M.KAMARAJU, for his great help and encouragement in completion of my project. I also express my gratitude to our principal Dr. P.NAGESWARA REDDY, for his encouragement and facilities provided for my project. I thank one and all who have rendered help to us directly or indirectly in the completion of this work. References []. Bin Liu and Bevan M. Baas Parallel AES Encryption Engines for Many-Core Processor Arrays IEEE Transactions on computer, VOL. 62, NO. 3, MARCH 203. [2]. A. Still maker, Exploration of Technology Scaling of CMOS Circuits from 80 nm to 22 nm Using PTM Models in HSPICE, Technical report, UC Davis, June 20. [3]. J. Granado-Criado, M. Vega-Rodriguez, J. Sanchez-Perez, and J. Gomez-Pulido, A New Methodology to Implement the AES Algorithm Using Partial and Dynamic Reconfiguration, Integration, the VLSI J., vol. 43, no., pp. 72-80, 200. [4]. S. Gueron, Intel Advanced Encryption Standard (AES) Instructions Set, Jan. 200. [5]. Z. Yu and B.M. Baas, A Low-Area Multi-Link Interconnect Architecture for GALS Chip Multiprocessors, IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 8, no. 5, pp. 750-762, May 200. [6]. M. Butler, AMD Bulldozer Core A New Approach to Multithreaded Compute Performance for Maximum Efficiency and Throughput, Proc. IEEE Hot Chips Symp High-Performance Chips (Hot Chips 0), Aug. 200. DOI: 0.9790/4200-0530 www.iosrjournals.org Page