Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA

Amrutha T V, KALPATARU INSTITUTE OF TECHNOLOGY , TIPTUR; N R Prashanth ,Associate professor,KALPATARU INSTITUTE OF TECHNOLOGY , TIPTUR

FPGA;Sub word; Rotword;Rconst

Abstract: The main aim of this paper is encrypt the data using Advanced Encryption Standard (AES) algorithm. In AES algorithm cryptography technique is used. Security is most important in data communication so to increase the security key expansion algorithm is used .In this paper we considering different sizes of S-box to reduce the area and the LUTs. To reduce LUTs here considering the affine transformation method is used. The round key expansion is proposed to improve security against attacks. Encrypted data is decrypted using inverse AES algorithm method .In AES algorithm numbers of round performed during execution will be depended upon the Key length. Here AES -128 bit key are used, so number of round performed during execution will be 10. This algorithm is simulated using Xilinx software and implemented on FPGA.
    [1] AI-Wen Luo, Qing-Ming Yi, Min Shi. “Design and Implementation of Area-optimized AES on FPGA”, IEEE Inter. conf. chal sci comengin.,978-1-61284- 109-0/2011. [2] H.Mestiri, N.Benhadjyoussef, M.Machh out and R.Tourki, “A Comparative Study of Power Consumption Models for CPA Attack,” [3] International Journal of Computer Network and Information Security, Vol. 5, No. 3, pp.25-31, 2013. [4] A. Moh'd, Y.Jararweh and L. Tawalbeh, “AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation,” 7th International Conference on Information Assurance and Security (IAS 2011), pp. 292-297, 2011. [5] M. Mozaffari-Kermani, and A. Reyhani-Masoleh, “Concurrent structure independent fault detection schemes for the advanced encryption standard,” IEEE Transactions on Computers, Vol. 59, pp.608-622, 2010. [6] H. Mestiri, N. Benhadjyoussef, M. Machhout and R. Tourki, “A Comparative Study of Power Consumption Models for CPA Attack,” International Journal of Computer Network and Information Security,Vol. 5, No. 3, pp. 25-31, 2013.
Paper ID: GRDJEV01I050108
Published in: Volume : 1, Issue : 5
Publication Date: 2016-05-01
Page(s): 112 - 117