Aes 128
Aes 128
B. Basic of Algorithm
I. Introduction The Rijndael algorithm is a symmetric block cipher
Nowadays cryptography has a main role in that can process data blocks of 128 bits through the
embedded systems design. As the number of devices use of cipher keys with lengths of 128, 192, and 256
and applications which send and receive data are bits..The AES algorithm as Rijndael is also a
increasing rapidly, the data transfer rates are symmetric block cipher that can encrypt (encipher)
becoming higher. In many applications, this data and decrypt (decipher) information [1]. Encryption
requires a secured connection which is usually converts data to an unintelligible form called cipher-
achieved by cryptography. Cryptography is divided text. Decryption of the cipher-text converts the data
in two categories first is symmetric key back into its original form, which is called plaintext.
cryptography (sender and receiver shares the same The number of rounds is depends upon the key
key) and the second one is asymmetric key length as described in TableI [3].
cryptography (sender and receiver shares different
keys). Here we are concerned about symmetric key
cryptography due to its use in military application,
C. Encryption and Decryption in
embedded system design, financial and legal files, AES
medical reports, and bank services via Internet, The Basic AES Encryption and Decryption
telephone conversations, and e-commerce structure with various steps is Shown in FIGURE
transactions etc. Many symmetric key cryptographic I.This block diagram is generic for AES
algorithms were proposed, such as the Data specifications. It consists of a number of different
Encryption Standard (DES), the Elliptic Curve transformations applied consecutively over the data
Cryptography (ECC), the Advanced Encryption block bits, in a fixed number of iterations, called
Standard (AES) and other algorithms[1]. Here the rounds [2]. The number of rounds depends on the
hardware implementation of AES algorithm is length of the key used for the encryption process.
presented to increase the data transfer speed. The Advanced Encryption Standard can be
programmed in software or built with pure
hardware[5].
Richa Sharma, Purnima Gehlot (M.Tech VLSI Design) TABLEI. KEY BLOCK ROUND COMBINATION
MITS University, Lakshmangarh
INDIA
e-mail: [email protected]
Block Size (Nb words) = 4
173
Proc. of the Intl. Conf. on Recent Trends In Computing and Communication Engineering -- RTCCE 2013
Copyright © Institute of Research Engineers and Doctors. All rights reserved.
ISBN: 978-981-07-6184-4 doi:10.3850/ 978-981-07-6184-4_37
The hardware implementation of the Rijndael two approaches for S-box design. Design a
algorithm can provide either high performance or multiplicative inversion and affine transformation
low cost for specific applications. At backbone separately or Construct a logic circuit defining the
communication channels or heavily loaded servers it input and output of the S-box function [8].
is not possible to lose processing speed, which drops
the efficiency of the overall system while running S0,0 S0,1 S0,2 S0,3 S’0,0 S’0,1 S’0,2 S’0,3
cryptography algorithms in software [5]. On the
S1,0 S1,1 S1,2 S1,3 S’1,0 S’1,1 S’1,2 S’1,3
other hand, in the performance comparison between
software and hardware implementation the priority S2,0 S2,1 S2,2 S2,3 S’2,0 S’2,1 S’2,2 S’2,3
is to evaluate which system provides higher
S’3,0 S’3,1 S’3,2 S’3,3
security. Hardware’s inflexibility eliminates S3,0 S3,1 S3,2 S3,3
possibility for the external changes to the system,
and this result in a high quality physical security
when compared with software implementations. . A FIGURE II: Application of S-box to the Each Byte
low cost and small design can be used in smart card of the State.
applications, which allows a wide range of
equipment to operate securely.
Cipher Text(128 Bits)
Plain Text(128 Bits)
RoundKey(Nr)
RoundKey(0)
Inv Shift Row
Sub Bytes
Inv Sub byte For i= nr-1 to 1
Shift Rows For i=1 to nr-1
AddRoundKey
Mix Column
Inv Mix Column
RoundKey(i)
RoundKey(i)
Sub Bytes
Inv Shift Rows Final Round
Final Round
Shift Rows
Inv Sub Byte
RoundKey(Nr)
RoundKey(0)
Cipher Text(128 Bits)
Plain Text(128 Bits)
(a)
FIGURE I: AES Algorithm (b)
S'0,0
176