Professional Documents
Culture Documents
Guided By: Mr. B Srinivas Sr. Asst Professor, E&C Dept, Aditya Engineering College
CONTENTS
ABSTRACT INTRODUCTION PROBLEM STATEMENT LITERATURE SURVEY EXISTING SYSTEM
TOOLS USED
RESULTS REFERENCES
COMPACT AES CORE 2
ABSTRACT
This project presents an Advanced Encryption Standard
What is Encryption?
Transform information such that its true meaning is
hidden
Requires special knowledge to retrieve the information
INTRODUCTION
AES is a symmetric block cipher algorithm and can process data blocks of 128
bits, using cipher keys with lengths of 128,192, and 256 bits. AES algorithm has four basic transformations: SubBytes, ShiftRows, MixColumns, and AddRoundKey. Initial Round: Key is XORed with plane text.
Where:
Nb Number of columns in the State Nk Number of 32-bit words in the Key Nr Number of rounds (function of Nb and Nk)
COMPACT AES CORE 6
PROBLEM STATEMENT
The main objective is to reduce the power consumption,
hardware complexity and area. The large area of AES with sixteen S-box architectures may not be suitable for practical low-end embedded applications, such as smart cards, PDAs, cell phones, and other mobile devices. These small embedded applications do not require high speed or throughput, but are area critical
LITERATURE SURVEY
1.Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang, Sakshi Sethi, MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks, EURASIP Journal on Wireless Communications and Networking, May 2006.
Highlights
Goals of cryptography Confidentiality
Authenticity Integrity Security attacks Passive attacks Passive attacks 2. Cheng Wang and Howard M. Heys Using a Pipelined S-Box in Compact AES Hardware Implementations This AES core implementation is called as FOLDED AES.
This AES core consists of 128-bit data block is divided into four 32-bit data blocks and each block is processed independently.
3. An Efficient Design of Security Accelerator for Wireless Senor Networks .Ohyoung Song and Jiho Kim School of Electrical and Electronic Engineering, Chung-Ang University,221, HukSuk-Dong, DongJak-Gu, Seoul, KoreaI.EEE CCNC 2010 proceedings Block-wide AES core Compact AES core 4. FIPS 197, Advanced Encryption Standard (AES), November 26, 2001 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf Block-wide AES structure and the steps involved in AES algorithm.
AES Structure
10
EXISTING SYSTEM
11
12
Substitute Bytes
Uses one table of 16x16 bytes containing a permutation of all 256
8-bit values Each byte of state is replaced by byte indexed by row (left 4-bits) & column (right 4-bits) Eg: byte {95} is replaced by byte in row 9 column 5 which has value {2A}
13
Substitute Bytes(cont)
14
15
Shift Rows
1st row is unchanged 2nd row does 1 byte circular shift to left 3rd row does 2 byte circular shift to left 4th row does 3 byte circular shift to left
16
Shift Rows(cont)
17
Mix Columns
Each byte is replaced by a value dependent on all 4 bytes in the column Multiplication by 2 in GF(28) takes some work:
18
Mix Columns
19
20
21
22
23
24
Rcon Constants
25
26
Example(cont)
27
AES encryption:example
28
Example(cont)
29
AES Decryption
30
31
InvShiftRows() Transformation
32
InvSubBytes() Transformation
33
InvMixColumns() Transformation
b1 = (b1 * E) XOR (b2*B) XOR (b3*D) XOR (b4*9) b2 = (b1 * 9) XOR (b2*E) XOR (b3*B) XOR (b4*D) b3 = (b1 * D) XOR (b2*9) XOR (b3*E) XOR (b4*B) b4 = (b1 * B) XOR (b2*D) XOR (b3*9) XOR (b4*E)
34
35
REQUIREMENTS
Five 4:1 MUX ONE S-box
36
AES DECRYPTION
37
ADVANTAGES
LOW COST SMALLER AREA
DISADVANTAGE
LOW SPEED
38
TOOLS USED
Software: Step by step simulation: Matlab Simulation & Synthesis results Xilinx ISE Hardware: Spartan 3E
39
40
ENCRYPTION OUTPUT
41
42
43
44
DECRYPTION OUTPUT
45
46
47
CONCLUSION
By using proposed compact low cost AES design we can
reduce the logic usage by reducing the AES S-Boxes which occupies much area. Although the new circuit has a small size, but the speed of this implementation is also reduced.
48
REFERENCE
1. An Efficient Design of Security Accelerator for Wireless Senor Networks .Ohyoung Song and Jiho Kim School of Electrical and Electronic Engineering, Chung-Ang University,221, HukSuk-Dong, DongJak-Gu, Seoul, KoreaI.EEE CCNC 2010 proceedings 2. H. Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang, Sakshi Sethi, MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks, EURASIP Journal on Wireless Communications and Networking, May 2006. 3. Song J. Park, Analysis of AES hardware Implementations, available at http://islab.oregonstate.edu/koc/ece679/project/2003/park.pdf 4. Satoh A., Morioka S., Takano K., Munetoh S., A Compact Rijndael Hardware Architecture with S-Box Optimization, Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), Gold Coast, Australia, 2001 5. Standaert F.X., Rouvroy G., Quisquater J.J., Legat J.D., A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL, International Symposium on Field-Programmable Gate Arrays (FPGA) 6. W. Stallings, The Advanced Encryption Standard,CRYPTOLOGIA, Volume XXVI No. 3, July 2002, pp. 165-186.
COMPACT AES CORE
49
THANK YOU
50