Image Cryptography Design Based On Nano AES Security Algorithm
Image Cryptography Design Based On Nano AES Security Algorithm
https://doi.org/10.22214/ijraset.2022.46613
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
Abstract: Advanced Encryption Standard (AES) is a specification for electronic data encryption. This standard has become one
of the most widely used encryption methodand has been implemented in both software and hardware. A high-secure symmetric
cryptography algorithm, implementation on field-programmable gate array (FPGA). The proposed architecture includes 8-bit
data path and five main blocks. We design two specified register banks, Key-Register and State-Register, for storing the plain
text, keys, and intermediate data. To reduce the area, Shift-Rows is embedded inside the State- Register. To optimize Sub-Bytes,
we merge and simplify some parts of the Sub-Bytes. To reduce power consumption, we apply the clock gating technique to the
design. This paper presents an Image Cryptography based 128-bit AES design. This Design is implemented in FPGA XC3S 200
TQ-144 using Verilog HDL and simulated by Modelsim 6.4 c and Synthesized by Xilinx tool.
I. NTRODUCTION
Cryptography, often called encryption, is the practice of creating and using a cryptosystem or cipher to prevent all but the intended
recipient(s) from reading or using the information or application encrypted. A cryptosystem is a technique used to encode a
message. The recipient can view the encrypted message only by decoding it with the correct algorithm and keys. Cryptography is
used primarily for communicating sensitive material across computer networks. The process of encryption takes a clear-text
document and applies a key and a mathematical algorithm to it, converting it into crypto-text. In crypto-text, the document is
unreadable unless the reader possesses the key that can undo the encryption. In 1997 the National Institute of Standards and
TECHNOLOGY (NIST), a branch of the US government, started a process to identify a replacement for the Data Encryption
Standard (DES). The NIST invited cryptography and data security specialists from around the world to participate in the discussion
and selection process. Five encryption algorithms were adopted for study. Through a process of consensus the encryption algorithm
proposed by the Belgium cryptographers Joan Daeman and Vincent Rijmen was selected. Prior to selection Daeman and Rijnmen
used the name Pipelined (derived from their names) for the algorithm. After adoption the encryption algorithm was given the name
Advanced Encryption Standard (AES) which is in common use today. In 2000 the NIST formally adopted the AES encryption
algorithm and published it as a federal standard under the designation FIPS-197. The full FIPS-197 standard is available on the
NIST web site (see the Resources section below). As expected, many providers of encryption software and hardware have
incorporated AES encryption into their products.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 590
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
V. ENCRYPTIONPROCESS
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 591
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
B. Clock Gating
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 592
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IX Sep 2022- Available at www.ijraset.com
F. Application Output
VII. CONCLUSION
Nano AES is a secure symmetric cryptography algorithm with a high level of security, which is widely used in many applications
and networks. Thus, AES is a suitable algorithm for tiny IoT devices. In this article, we designed a lightweight AES architecture for
resource-constrained IoT devices. The design had 8-bit datapath and included two specified register banks for storing plain text,
keys, and intermediate results.
REFERENCES
[1] K. Fu and J. Blum, “Controlling for cybersecurity risks of medical device software,” Commun. ACM, vol. 56, no. 10, pp. 35–37, Oct. 2013.
[2] D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, and W. H. Maisel, “Security and privacy for implantable medical devices,” IEEE Pervasive Comput., vol.
7, no. 1, pp. 30–39, Jan./Mar. 2008.
[3] M. Rostami, W. Burleson, A. Jules, and F. Koushanfar, “Balancing security and utility in medical devices?” in Proc. 50th ACM/EDAC/IEEE Int. Conf. Design
Autom., May/Jun. 2013, pp. 1–6.
[4] M. Zhang, A. Raghunathan, and N. K. Jha, “Trustworthiness of medical devices and body area networks,” Proc. IEEE, vol. 102, no. 8, pp. 1174–1188, Aug.
2014.
[5] H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, “Smart-grid security issues,” IEEE Security Privacy, vol. 8, no. 1, pp. 81–85, Jan./Feb. 2010.
[6] M. Mozaffari-Kermani, M. Zhang, A. Raghunathan, and N. K. Jha, “Emerging frontiers in embedded security,” in Proc. 26th Int. Conf. VLSI Design, Jan.
2013, pp. 203–208.
[7] R. Roman, P. Najera, and J. Lopez, “Securing the Internet of things,” Computer, vol. 44, no. 9, pp. 51–58, Sep. 2011.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 593