AES512-Bit Advanced Encryption Standard Algorithm Design and Evaluation
AES512-Bit Advanced Encryption Standard Algorithm Design and Evaluation
Abstract²This paper presents an FPGA architecture for a new As more security wanted for a certain system as more chip
version of the Advanced Encryption Standard (AES) algorithm. area needed, and this is due to complex algorithm flow or by
The efficient hardware that implements the algorithm is also increasing the algorithm parameters that include key size, and
proposed. The new algorithm (AES-512) uses input block size plaintext size. This paper presents a new variation of the AES
and key size of 512-bits which makes it more resistant to
algorithm (called AES-512 bits). The hardware architecture
cryptanalysis with tolerated area increase. AES-512 will be
suitable for applications with high security and throughput for the AES-512 algorithm is also presented. The goal of this
requirements and with less chip area constrains such as research is to present the AES-512 to be used when higher
multimedia and satellite communication systems. An FPGA levels of security and throughput are required without
architectural for AES-512 was developed using VHDL, and increasing the overall design area when compared with the
synthesized using Virtix-6 and Virtex-7 chips. AES-512 show original AES-128 bits. The new algorithm has similar
tremendous throughput increase of 230% when compared with structure to the original AES with larger plaintext size and key
the implementation of the original AES-128. size (512-bit instead of 128-bit). Using inputs of 512-bit
instead of 128 has impact on the whole algorithm structure, as
Keywords; Advanced Encryption Standard; FPGA; Enhanced it will be discussed in details later on. The procedure to
Security; Cryptography.
generate the new 512-bit key will be presented as well.
The AES is a symmetric cipher algorithm with block size
I. INTRODUCTION of 128-bit supports key sizes of 128, 192, and 256 bits with
Involving information security techniques to get secure 10, 12, or 14 iteration rounds, respectively. Four major
communication systems is becoming very essential in today's operations are performed during each round: byte substitution,
applications. Almost we need security in our daily transactions shifting rows, mixing columns, and finally adding the round
especially the ones that involves very private date. The key. AES 128-bit key is considered secure compared to the
information security can be achieved via using cryptographic other existing symmetric cipher algorithms. It is widely used
algorithms such as DES, Two fish and many others. The AES in many applications where the security is a very important.
[9] is the Advanced Encryption Standard algorithm FIPS-197 The new AES algorithm provides even more security and
[1] that been in use since 2001 since it provides high level of double the throughput. More security comes from using larger
security and can be implemented easily. key size, and more throughput comes from using four times
larger block size than the block size used in the original AES.
Many hardware implementations for AES algorithm were The only disadvantage of AES-512 is the need for more design
previously proposed and evaluated for the basic standard key area.
size i.e. 128, 192, and 256-bit, as in [7] [9] [17] [18] and [19]. The proposed AES-512 algorithm has four main different
On the other hand, a compact AES implementations were byte-based transformations. The first transformation is the
presented in [5] [6] and [12]. These various implementations Byte Substitution which substitutes the values of 512 bits and
for AES support the fact that different applications required this is achieved via using parallel S-boxes. The second
different implementation for the same algorithm. Some transformation is Shifting Rows, that shifts the rows of the
applications has strict area requirements and a compact AES output from the previous step by an offset equals to the row
implementation will be very useful to provide security as in number. The third transformation is Mixing Columns, where
the some embedded systems cases. On the other side, some each column of the output from the previous step is multiplied
applications highly need the most level of security that can be by different value. The final transformation in the round is
obtained without caring about the area/time limitations [21]. Adding the Round Key to the final result of this round.
The rest of the paper is organized as follows, related work
is presented in section II. The overall architecture of the AES-
978-1-4577-2155-7/11/$26.00 2011
c IEEE 292
512, and the detailed transformations are provided in Section
III. The key expansion operation of the proposed algorithm is
explained in Section IV. Section V shows the experimental
synthesis results of the AES-512 algorithm and comparisons.
The conclusion is presented in Section VI.
2011 7th International Conference on Information Assurance and Security (IAS) 293
B. Shift Row -1 7 6 5 4 3 2 1 0
a (x) [0E]x [01]x [09]x [01]x [0D]x [01]x [0B]x [01]x
After the original 512-bit data is substituted with values
from the S-boxes, the rows of the resulting matrix are shifted D. AddRound Key
in a process called ShiftRow transformation. What happened To make the relationship between the key and the ciphertext
in this part is that the bytes in each row in the input data more complicated and to satisfy the confusion principle, the
matrix will be rotated left. The number of left rotations is not AddRoundKey operation is performed.
the same in each row, and it can be determined by the row
number. For example, row number zero is not shifted, the first This addition step takes the resulting data matrix from the
row is shifted by one byte, and so on. previous step and performs on it a bitwise XOR operation with
the sub key of that specific round (addition operation in
C. Mix Colomn GF(2n)). We must mention that the round key is 512 bits that
is arranged in a square matrix of eight columns where each
Now, and after the rows of the input data are rotated left by
column has 8 bytes.
different offsets, an operation must be applied to the columns
of the data matrix. The MixColumn transformation multiplies
the columns of the data matrix by a pre-defined matrix. IV. KEY EXPANSION AND ROUNDS
The AES-512 and original AES process the data in bytes The 512-bit input key of the new AES-512 algorithm is
basis. Each byte is considered as polynomials over GF (28) used to generate ten sub-keys for each of the ten AES rounds.
with 8 terms. To explain how the MixColomn works, we have The round ±keys expansion process involves arranging the
to explain the concept of polynomials over GF(2n) in general original 512-bits input key into eight words of eight bytes
and for GF (28) as example when n=8. each. After that, the round keys expansion is performed
A binary extension field element Y (x) is a polynomial of according to the following equations:
degree less than n and greater than -1, (i.e. Y (x) 0), and has
coefficients in GF(2). W(i) W (i 8) W (i 1) i LVQ¶W a multiple of 8
The polynomial basis is one representation for the elements
of GF(2n). The addition in GF(2n) corresponds to a polynomial
addition, which is done as a bitwise logic exclusive OR
W(i) W (i 8) T (W (i 1)) i is a multiple of 8
The multiplication result is taken (modulo p(x)= x8 + 1) to Table 1 shows the round constants for all rounds in AES-512.
keep the resulting polynomial with degree less than 8.
Table I: Round Constant for AES-512 rounds
294 2011 7th International Conference on Information Assurance and Security (IAS)
The round structure of the AES-512 algorithm (shown in energy consumptions do not have large significance. Virtex-7
Figure 4) uses the transformation defined in the previous shows a promising results compared with older FPGA families
section. First, byte substitution is performed on 512 bits data, from Xilinx like Virtex-5 and Virtex-6 .
followed by row rotation according to the row number, where
Table III shows a comparison of the proposed AES-512
0-7 left rotations are performed in this step. Then, the
algorithm with previous implementation for the AES 128 bits.
columns are multiplied by the new defined matrix column by
The AES-512 provides a significant Throughput/Area increase
column in the Mix Column transformation (except in the 10th
of about 210% compared with the results presented in
round). The last operation will be the bitwise XORing with the
[17][18][19]. The usage of Virtex-7 family will help in
round key expanded using the key expansion process. The
reducing the power requirements for the AES-512. A basic
output at of the 10th round will be the 512-bit encrypted
power evaluation using Xilinx XPower Analyzer (XPA) for
message.
AES-512 with Virtex-7 shows static power saving over older
Virtex families of about 60%.
VI. CONCLUSION
Due to the increasing needs for secure communications, a
more safe and secure cryptographic algorithms has to be
proposed and implemented. The Advanced Encryption
Standard (AES-128bit) is widely used nowadays in many
applications. In this paper, we proposed a new variation of
AES (AES-512) with 512-bit input block and 512-bit key size
compared with 128-bit in the original AES-128 algorithm. A
complete hardware implementation for the new AES-512 was
also presented in this paper.
After comparing the hardware implementation results, we
found that our new design has about 230% throughput
compared with the original AES-128 design. The larger key
size make the algorithm more secure, and the larger input
block increases the throughput. The extra increase in area can
be tolerated and makes the proposed algorithm ideal
Figure 4. Single round of AES-512 algorithm
applications in which high level of security and high
throughput are required such as in multimedia
V. RESULTS AND EVALUATION communications.
The proposed AES-512 bits designs and the original AES
algorithm design were coded in VHDL. The codes were ACKNOWLEDGMENT
verified and simulated for functional correctness. Figures 5, The authors wish to thanks Jordan University of Science and
and 6 shows an encryption/decryption example on ModelSim. Technology, Cryptographic Hardware and information
Security lab (CHiS lab), and the Scientific Research Support
Xilinx ISE 13.1 was used to synthesize the VHDL codes
Fund in MOHE in Jordan for their support to this research.
of both designs using the Virtex-6 and Vertix-7 FPGA family
devices. Virtex-7 is a new FPGA family based on 28nm
architecture designed for high performance, high throughput, Table II: AES-512 Implementation results
and low power consumption. Virtex-7 power efficiency helps
in mitigating the power requirements of the increased design
area. FREQ. AREA THROUGHPUT
DESIGN DEVICE
(MHZ) (CLBS) (MBPS)
The synthesis results are shown in Table II. The results
include the operating frequency, throughput, and the number AES-512 VIRTEX-7 318.7 6701 1163
of control logic blocks (CLBs). Table II shows also the results
for Virtex-6. The proposed Algorithm has about 230% higher AES-512 VIRTEX-6 261.1 6701 954
throughput compared to the original AES-128 design. On the AES-128 VIRTEX-7 378.4 3243 495
other hand the area increase is about 206% compared to the
AES-128. Using larger key size makes the algorithm more AES-128 VIRTEX-6 250.4 2243 320
immune against brute-force attack which results in more
security. The new algorithm is ideal for secure system with
high throughput requirements where the hardware area and
2011 7th International Conference on Information Assurance and Security (IAS) 295
Table III: AES-512 Comparison with other Designs
296 2011 7th International Conference on Information Assurance and Security (IAS)
REFERENCES [12]. Alma'aitah, A., Abid, Z.-E., "Area efficient-high throughput sub-
pipelined design of the AES in CMOS 180nm", Design and Test
[1]. )HGHUDO,QIRUPDWLRQ3URFHVVLQJ6WDQGDUGV),36³Announcing the
$GYDQFHG (QFU\SWLRQ 6WDQGDUG $(6´ 1DWLRQDO ,QVWLWXWH RI [13]. Workshop (IDT), 2010 5th International, On page(s): 31 - 36, V,
Standards and Technology (NIST), November 2001. 14-15 Dec. 2010
[2]. -RDQ 'DHPHQ DQG 9LQFHQW 5LMPHQ ³7KH 'HVLJQ RI 5LMQGDHO´ [14]. Mourad,O.-c., Lotfy, S.-M., Noureddine, M., Ahmed, B., Camel,
Springer 2002. T., "AES Embedded Hardware Implementation", Adaptive
[3]. -(OELUW:<LS%&KHWZ\QG&3DDU³$Q)3*$-based performance Hardware and Systems, 2007. AHS 2007. Second NASA/ESA
evaluation oIWKH$(6EORFNFLSKHUFDQGLGDWHDOJRULWKPILQDOLVWV´,((( Conference on, On page(s): 103 - 109, V:5-8 Aug. 2007.
Transactions on VLSI Systems, Vol. 9, No. 4, pp. 545±557, August [15]. Gang Zhou, Michalik, H., Hinsenkamp, L., "Efficient and High-
2001. Throughput Implementations of AES-GCM on FPGAs", Field-
[4]. 9LNWRU )LVFKHU 0LORV 'UXWDURYVN\ ³7ZR 0HWKRGV RI 5LMQGDHO Programmable Technology, 2007. ICFPT 2007. International
,PSOHPHQWDWLRQ LQ 5HFRQILJXUDEOH +DUGZDUH´ &+(6 Conference on, On page(s): 185 - 192, Volume: Issue: , 12-14 Dec.
Proceedings, LNCS Vol. 2162, pp. 77-92. 2007.
[5]. Akashi Satoh and Sumio Morioka and Kohji Takano and Seiji [16]. Qingfu Cao, Shuguo Li, "A high-throughput cost-effective ASIC
0XQHWRK ³$ &RPSDFW5LMQGDHO +DUGZDUH $UFKLWHFWXUH ZLWK 6-Box implementation of the AES Algorithm", ASIC, 2009. ASICON '09.
2SWLPL]DWLRQ´ $6,$&5<37 3URFHHGLQJV /1&6 9RO IEEE 8th International Conference on, On page(s): 805 -
pp. 239-254. 808, Volume: Issue: , 20-23 Oct. 2009.
[6]. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, [17]. J. Wolkerstofer,An ASIC implementation of the AES Mixcolumn
Jean-'LGLHU /HJDW ³&RPSDFW DQG (IILFLHQW (QFU\SWLRQ'HFU\SWLRQ Operation, in Proc. Austrochip 2001,Vienna, Austria, Oct,pp.129-
Module for FPGA Implementation of AES Rijndael Very Well 132, 2001.
6XLWHG IRU 6PDOO (PEHGGHG $SSOLFDWLRQV´ ,7&& ,((( [18]. Elbirt A.J. <LS : &KHWZ\QG % 3DDU & ³An FPGA-based
Computer Society. performance evaluation of the AES block cipher candidate
[7]. K. Gaj and P. Chodowiec, "Comparison of the Hardware algorithm finalists´, IEEE Transactions onVery Large Scale
Performance of the AES Candidates Using Reconfigurable Integration (VLSI) Systems, Volume: 9 Issue: 4, August 2001.
Hardware," Proc. 3rd Advanced Encryption Standard Conference,
New York, April 2000, pp. 40-54. [19]. Dandalis $ 3UDVDQQD 9. 5ROLP -' ³A Comparative Study of
[8]. 0 %HDQ HW DO ³+DUGZDUH 3HUIRUPDQFH 6LPXODWLRQV RI 5RXQG Performance of AES Final Candidates Using FPGAs´,
Advanced Encryption 6WDQGDUG$OJRULWKPV´1RY Cryptographic Hardware and Embedded Systems Workshop (CHES
[9]. - 'DHPHQ DQG 9 5LMPHQ ³7KH 5LMQGDHO %ORFN &LSKHU $(6 2000), Worcester, Massachusetts, 2000.
3URSRVDO´3URFVW$(6&DQGLGDWH&RQI [20]. Elbirt A.J., Yip W., Chetwynd B., Paar C. ³An FPGA
[10]. +.XRDQG,9HUEDXZKHGH³$UFKLWHFWXUDO2SWLPL]DWLRQIRUD- Implementation and Performance Evaluation of the AES Block
Gbits/sec VLSI Implementation of the AES RijnGDHO $OJRULWKP´ Cipher Candidate Algorithm Finalists´, Third Advanced Encryption
Cryptographic Hardware and Embedded Systems (CHES 2001), Standard (AES3) Candidate Conference, New York, 2000
Lecture Notes in Computer Science 2162, Springer-Verlag, [21]. L. A. Tawalbeh and Q. Abu Al-+DLMD ³(QKDQFHG )3*$
Heidelberg, Germany, 2001, pp. 53-67. Implementations for Doubling Oriented and Jacobi- Quartics
[11]. F. Standaert, G. Rouvroy, J. Quisquater, and J. Legat, "Efficient (OOLSWLF &XUYHV &U\SWRJUDSK\´ Journal of Information Assurance
implementation of Rijndael encryption in reconfigurable hardware: and Security, Dynamic Publishers, Inc., USA. March 2011
Improvements and design tradeoffs", Proc. CHES 2003, , 2003.
2011 7th International Conference on Information Assurance and Security (IAS) 297