International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1912
A REVIEW ON VARIOUS SECURED DATA ENCRYPTION MODELS BASED
ON AES STANDARD
Ashish Dwivedi1
1Department of Electronics Engineering, Institute of Engineering and Technology, Lucknow
Dr APJ Abdul Kalam Technical University Lucknow India [226021]
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today’s era there is a thing which is most
important for transferring data that is encrypting the data
for secure transmission. The main aim is to achieve a
secured data with achievable optimized power, delay,
throughput and latency. In order to achieve this thing AES
standard is redesigned using a proper optimising over
architecture using the help of Pipelining and over various
rounds of encryption as discussed in AES standard FIPS 197
[6]. This paper shows the review of various models and their
proper performance comparison over various parameters
on Xilinx ISE. Various models are also given according to
respected FPGA board with their maximum frequency.
Key Words: Rijndael, AES, FIPS, FPGA, cipher text, DES,
Encryption, Throughput
1. INTRODUCTION
Encryption represents the conversion of data into secrets
code. This is the most effective way to achieve data
security. In order to achieve your data file you have to
access the key which is your password known as cipher
key. Unprocessed data is called plain text, encrypted data
is known as cipher text. There are various attacks to hack
these cipher texts such as Brute force attack, Known
plaintext attack, Chosen cipher text attack, Cipher text
attack. The Brute force attack when done AES-128 bit up
to 5th round further analysis get terminated and data is
secured. There are various algorithms available in
cryptography like MARS, RSA, TWOFISH, SERPENT and
RIJNDAEL. Advanced Encryption Standard selected a
Rijndael Cryptography algorithm for its encryption. AES is
more secured from its previous version that is DES[6]
which is AS short key algorithm and hence less secured
than that if AES algorithm. The AES algorithm achieved its
standardization by National Institute of Standards and
Technology (NIST) [6]of the United States of America and
ready to displace DES as encryption standard.
Cryptographic AES is currently being used in a various
scenarios. The common examples are e-commerce and
financial transactions, having strong security
requirements. The Advance Encryption Standard (AES) is
a standard acts as encryption of data. It consists of 128 bit
plain test which is converted into cipher text using a key of
128bit, 192bit and 256 bit sizes having 10, 12 and 14
rounds respectively. The pipelining technology is used in
various round for reducing the overall throughput of core.
The size of key defines the overall performance parameter
as they varies according to given key size also depends on
the maximum frequency of used FPGA kit.
2. Related Work
AES implementations area unit classified into software
system and hardware implementations[1]. Hardware
implementation offers quicker speed, additional security
Associate in Nursing and consumes less power and
therefore is an attractive alternative as compared to
software system implementation[12] (Karthigai Kumar
and Baskaran, 2010). Implementation of algorithms on
hardware may be achieved exploitation either Application
Specific microcircuit (ASIC) or Field Programmable Gate
Array (FPGA) devices[13] (Gaj and Chodowiec, 2009). The
authors conferred ASIC implementation of the science
formula (Chih-Pin et al., 2003; Liu and Luke, 2003). ASIC is
Associate in nursing microcircuit designed for specific
application and lacks flexibility. Moreover, increased Non
continual Engineering price makes tiny volume production
unaffordable. As compared to ASIC, Associate in Nursing
FPGA device is reconfigurable, efficient, offers additional
flexibility and needs less time to plug and thus FPGA[14]
could be a in style alternative for hardware
implementation (Alexandru and Fratila, 2011; Elbirt et al.,
2001). FPGAs conjointly succeed far better performance
than multi-core CPUs for mathematical computations. In
loop unrolled structures[5], all the cipher rounds square
measure unrolled and information is coiled through the
cipher rounds consecutive till the complete
encryption/decryption is completed (Ali et al., 2011;
Standaert et al., 2003; Zhang and Parhi, 2004). The loop
unrolled structure implementation, results in increased
speed and accrued space utilization. The AES rule can be
enforced exploitation non-pipelined and pipelined or sub
pipelined techniques. The non-pipelined implementations
result in optimisation of space at the value of speed
(Hussain and Jamal, 2012; Rais and Qasim, 2009a, 2009b).
Whereas pipelined or sub pipelined implementations end
in increased outturn with increased space utilization as
pipelining permits process of multiple blocks at the same
time (Hammad et al., 2010; Tibeto-Burman language et
al.,2015; Qu et al., 2009; Wang and HA, 2013).
3. Overview of Algorithm
The AES process block diagram is shown in figure 1
which gives us the proper understanding of the
algorithm. The process is divided into these parts:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1913
 Sub Bytes
 Shift Rows
 Mixed Column
 Add Round key
Figure 1. AES Algorithm for Encryption
Now we will discuss about the each sub steps taken in
order to complete the given rounds.
3.1 Sub Bytes
This is the process in which a S-Box matrix is created
using VHDL/Verilog codes. This is predefined matrix
generated by Galios Field conversion[x]. SubBytes gives
step by step byte substitution using Rijndael’s S.Box
lookup table[x]. The table has 16x16 dimension containing
hexadecimal format. The hexadecimal is replaced by look
up table of S-box matrix. Where XY is used to give the
location of that code on S-box for substitution. Substituted
matrix is given by X’Y’(figure 2).
Figure 2: Sbo'x (16 x 16 byte)
Figure 3: Sub-Byte process
3.2 Shift Rows
This process consists of circular transformation of matrix
from row(0) to row(3).The shift length is different for
each row. For first row no shifting is done. For second row
shifting is done once, for next row twice and for last thrice.
The process is shown for shift rows (figure3).
Figure 4:Shift Row transformation
3.3 Mix Column
This transformation is done over each 4 byte column
separately while omitted in 10th round. Columns are
considered as polynomials over Galios Field ( ) and are
multiplied by a fixed polynomial c( ) modulo ( +1)
.(figure 4)
C[x] = ...1
The matrix form of mixed column is given by:
Figure 5: Mixed Column transformation
3.4 Add Round Key
It is the process the converted plain text matrix is XOR-ed
with the key matrix and final output obtained is cipher
text. Different round key is added to each round as key
transformation operation is also done at each round. Each
byte of key is XOR-ed with each byte of text (figure5).
XY=0A X’Y’=67
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1914
Figure 6: Add Round Key process for final output.
4. COMPARISON
Various modules are created and categorised in given
table 1.Models are based on optimizing the area speed
throughput latency power etc. All the models are designed
on reconfigurable FPGA models and software simulation
was done on XILINX ISE 14.7, I-SIM.
Further we can also provide the various FPGA models on
the basis of given data of clock frequency of each devices
based on previous researches. A comparison table is given
on next page for that factors comparisons.
Table 1: Comparison table for performance parameter
5. CONCLUSION
Encryption using reconfigurable FPGA equipment
platforms is widely used to secure data and improve
throughput. The Rijndael cipher[6] style is well
matched for hardware use. This implementation is meted
out through different trade-offs between space and speed.
The trade-offs is that AES needs extra power and
should not be supported by
hardware, conjointly there's wide selection of equipment
used for coding that is required for authentication and
security. AES is programmed in software
or engineered with pure hardware. The AES is the latest
standard for cryptography and has been taken wide
support to secure digital information.
References
1. Zodpe, H., Sapkal, A. An efficient AES
implementation using FPGA with enhanced
security features. Journal of King Saud University
– Engineering Sciences (2018).
2. Pritamkumar N. Khose, Prof. Vrushali G. Raut,
"Implementation of AES Algorithm on FPGA for
Low Area Consumption",2015 International
Conference on Pervasive Computing (JCPC).
3. Qiang, L., Zhenyu, X., Yuan, Y., 2015. High
throughput and secure advanced encryption
standard on field programmable gate array with
finepipelining and enhanced key expansion. IET
Comput. Digit. Tech. 9, 175–184.
4. Wenfeng Zhao, Yajun HaandMassimoAiioto,"Novel
Self-BodyBiasing and Statistical Design for Near-
Threshold Circuits With Ultra Energy-Efficient
AES as Case Study",IEEE transactions on very
large scale integration (VLSI) systems, vol. 23, no.
8, august 2015.
5. Mohammed, A., Mousa, F., Radwan, T., Odeh, M.,
2011. Survey paper: cryptography is the science
of information security. Int. J. Comput. Sci. Secur.
5, 298–309.
6. Fips-197, 2001. Advanced encryption standard
(AES). Natl. Inst. Stand. Technol. 8–12.
7. Hussain, U., Jamal, H., 2012. An efficient high
throughput FPGA implementation of AES for
multi-gigabit protocols. Proc. 10th Int Conf. Front.
Inf. Technol. FIT 2012, 215–218
8. Reddy, R.S.S.K., Praneeth, P., 2011. VLSI
implementation of AES crypto processor for high
throughput. Int. J. Adv. Eng. Sci. Technol. 6, 22–26.
9. Wang, Y., Ha, Y., 2013. FPGA-based 40.9-gbits/s
masked AES with area optimization for storage
Designs Throu
ghput
(Gbps
)
Area(Slic
es)
Mbp
s/Sli
ce
Fma
x
(Mh
z)
Bitwi
dth(
bits)
Pipel
ined
stage
s
Harshali
Zodpe(20
18)[1]
5.93 4095 1.4
4
463.
4
128 0
Qiang et
al.
(2015)[2
]
3.45 335 10.
29
323.
7
128 0
Wang
and
Ha(2013)
[9]
40.8 5927 6.9
0
319.
2
128 6
Henezen
and
Fichter
119.3
0
1499 8.0
6
233.
0
128 2
Reddy
and
Parneeth
(2011)[8]
25.89 8896 2.9
1
202.
2
128 3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1915
area network. IEEE Trans. Circuits Syst. II Express
Briefs 60, 36–40.
10. Zhang, X., Parhi, K.K., 2004. High-speed VLSI
architectures for the AES algorithm. IEEE Trans.
Very Large Scale Integr. Syst. 12, 957–967.
11. Zhang, Y., Wang, X., 2010. Pipelined
implementation of AES encryption based on
FPGA. IEEE Int. Conf. Inf. Theory Inf. Secur, 170–
173.
12. Karthigai Kumar, P., Baskaran, K., 2010. An ASIC
implementation of low power and high
throughput blowfish crypto algorithm.
Microelectron. J. 41, 347–355.
13. Gaj, K., Chodowiec, P., 2009. FPGA and ASIC
implementations of AES. Cryptogr. Eng. 235–294.
14. Alexandru, C., Fratila, R., 2011. Cryptographic
Applications using FPGA Technology. J. Mobile
Embedded Distrib. Syst. 3, 10–16.
BIOGRAPHIES
ASHISH DWIVEDI received the
B.Tech degree in Electronics and
Communication Engineering from
Shri Ramswaroop Memorial
College of Engineering and
Management, Abdul Kalam
Technical University Lucknow, India and is
currently working towards his M.Tech degree in
Microelectronics with the research interest in
Digital VLSI and the enhancing the performance of
Cryptographic Circuit from Institute of
Engineering and Technology, Lucknow, Uttar
Pradesh.

More Related Content

PDF
Arm recognition encryption by using aes algorithm
PDF
Design of A New Lightweight Encryption for Embedded Security
PDF
Designing of cordic processor in verilog using xilinx ise simulator
PDF
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
PPTX
Floating point ALU using VHDL implemented on FPGA
PDF
IRJET - A Speculative Approximate Adder for Error Recovery Unit
PDF
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...
PDF
Ir3415981603
Arm recognition encryption by using aes algorithm
Design of A New Lightweight Encryption for Embedded Security
Designing of cordic processor in verilog using xilinx ise simulator
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
Floating point ALU using VHDL implemented on FPGA
IRJET - A Speculative Approximate Adder for Error Recovery Unit
IRJET- Design and HW/SW Implementation of a Nonlinear Interpolator for Border...
Ir3415981603

What's hot (18)

PDF
IRJET- Accuracy Configurable Adder
PDF
HARDWARE EFFICIENT SCALING FREE VECTORING AND ROTATIONAL CORDIC FOR DSP APPLI...
PDF
Comparative analysis of multi stage cordic using micro rotation technique
PDF
IRJET- A Review of Approximate Adders for Energy-Efficient Digital Signal Pro...
PPT
Fpga 11-sequence-detector-fir-iir-filter
PDF
IRJET - High Speed Approximation Error Tolerance Adders for Image Processing ...
PDF
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
PDF
Scaling algebraic multigrid to over 287K processors
PDF
FPGA Implementation of Mixed Radix CORDIC FFT
PDF
Mixed Scanning and DFT Techniques for Arithmetic Core
PDF
Comparative analysis of multi stage cordic using micro rotation techniq
PDF
Design and Implementation of Multiplier Using Kcm and Vedic Mathematics by Us...
PDF
P0440499104
PDF
IRJET- A Review on Single Precision Floating Point Arithmetic Unit of 32 Bit ...
PPT
DESIGN AND IMPLEMENTATION OF 64-BIT ARITHMETIC LOGIC UNIT ON FPGA USING VHDL
PDF
VLSI Final Design Project
PDF
Clustbigfim frequent itemset mining of
IRJET- Accuracy Configurable Adder
HARDWARE EFFICIENT SCALING FREE VECTORING AND ROTATIONAL CORDIC FOR DSP APPLI...
Comparative analysis of multi stage cordic using micro rotation technique
IRJET- A Review of Approximate Adders for Energy-Efficient Digital Signal Pro...
Fpga 11-sequence-detector-fir-iir-filter
IRJET - High Speed Approximation Error Tolerance Adders for Image Processing ...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
Scaling algebraic multigrid to over 287K processors
FPGA Implementation of Mixed Radix CORDIC FFT
Mixed Scanning and DFT Techniques for Arithmetic Core
Comparative analysis of multi stage cordic using micro rotation techniq
Design and Implementation of Multiplier Using Kcm and Vedic Mathematics by Us...
P0440499104
IRJET- A Review on Single Precision Floating Point Arithmetic Unit of 32 Bit ...
DESIGN AND IMPLEMENTATION OF 64-BIT ARITHMETIC LOGIC UNIT ON FPGA USING VHDL
VLSI Final Design Project
Clustbigfim frequent itemset mining of
Ad

Similar to IRJET- A Review on Various Secured Data Encryption Models based on AES Standard (20)

PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
PDF
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
PDF
Fpga implementation of encryption and decryption algorithm based on aes
PDF
G04701051058
PDF
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
PDF
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
PDF
High Speed Optimized AES using Parallel Processing Implementation
PDF
publication
PDF
PDF
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
PDF
A04660105
PDF
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
PDF
IRJET - A Review on Crypto-Algorithm using Different Hardware
PDF
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
PDF
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
PDF
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
PDF
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Fpga implementation of encryption and decryption algorithm based on aes
G04701051058
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
High Speed Optimized AES using Parallel Processing Implementation
publication
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
A04660105
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET - A Review on Crypto-Algorithm using Different Hardware
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Thesis of the Fruit Harvesting Robot .pdf
PDF
Application of smart robotics in the supply chain
PDF
Disaster Management_Lecture_ PPT_Dr. Kunjari Mog, NITH.pdf
PPTX
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
PDF
IMDb_Product_Teardown_product_management
PPTX
Cloud Security and Privacy-Module-1.pptx
PPTX
Soumya Das post quantum crypot algorithm
PPTX
Retail.pptx internet of things mtech 2 nd sem
PDF
Human CELLS and structure in Anatomy and human physiology
PDF
ITEC 1010 - Information and Organizations Database System and Big data
PDF
PhD defense presentation in field of Computer Science
PDF
1.-fincantieri-investor-presentation2.pdf
PPTX
Cloud Security and Privacy-Module-2a.pptx
PDF
Computer Networks and Internet Protocol Week-1
PPTX
unit 1 computer graphics introduction types
PPTX
Unit I - Mechatronics.pptx presentation
PPTX
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
PPTX
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
PDF
Snapchat product teardown product management
PDF
Recent Trends in Network Security - 2025
Thesis of the Fruit Harvesting Robot .pdf
Application of smart robotics in the supply chain
Disaster Management_Lecture_ PPT_Dr. Kunjari Mog, NITH.pdf
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
IMDb_Product_Teardown_product_management
Cloud Security and Privacy-Module-1.pptx
Soumya Das post quantum crypot algorithm
Retail.pptx internet of things mtech 2 nd sem
Human CELLS and structure in Anatomy and human physiology
ITEC 1010 - Information and Organizations Database System and Big data
PhD defense presentation in field of Computer Science
1.-fincantieri-investor-presentation2.pdf
Cloud Security and Privacy-Module-2a.pptx
Computer Networks and Internet Protocol Week-1
unit 1 computer graphics introduction types
Unit I - Mechatronics.pptx presentation
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
Snapchat product teardown product management
Recent Trends in Network Security - 2025

IRJET- A Review on Various Secured Data Encryption Models based on AES Standard

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1912 A REVIEW ON VARIOUS SECURED DATA ENCRYPTION MODELS BASED ON AES STANDARD Ashish Dwivedi1 1Department of Electronics Engineering, Institute of Engineering and Technology, Lucknow Dr APJ Abdul Kalam Technical University Lucknow India [226021] ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s era there is a thing which is most important for transferring data that is encrypting the data for secure transmission. The main aim is to achieve a secured data with achievable optimized power, delay, throughput and latency. In order to achieve this thing AES standard is redesigned using a proper optimising over architecture using the help of Pipelining and over various rounds of encryption as discussed in AES standard FIPS 197 [6]. This paper shows the review of various models and their proper performance comparison over various parameters on Xilinx ISE. Various models are also given according to respected FPGA board with their maximum frequency. Key Words: Rijndael, AES, FIPS, FPGA, cipher text, DES, Encryption, Throughput 1. INTRODUCTION Encryption represents the conversion of data into secrets code. This is the most effective way to achieve data security. In order to achieve your data file you have to access the key which is your password known as cipher key. Unprocessed data is called plain text, encrypted data is known as cipher text. There are various attacks to hack these cipher texts such as Brute force attack, Known plaintext attack, Chosen cipher text attack, Cipher text attack. The Brute force attack when done AES-128 bit up to 5th round further analysis get terminated and data is secured. There are various algorithms available in cryptography like MARS, RSA, TWOFISH, SERPENT and RIJNDAEL. Advanced Encryption Standard selected a Rijndael Cryptography algorithm for its encryption. AES is more secured from its previous version that is DES[6] which is AS short key algorithm and hence less secured than that if AES algorithm. The AES algorithm achieved its standardization by National Institute of Standards and Technology (NIST) [6]of the United States of America and ready to displace DES as encryption standard. Cryptographic AES is currently being used in a various scenarios. The common examples are e-commerce and financial transactions, having strong security requirements. The Advance Encryption Standard (AES) is a standard acts as encryption of data. It consists of 128 bit plain test which is converted into cipher text using a key of 128bit, 192bit and 256 bit sizes having 10, 12 and 14 rounds respectively. The pipelining technology is used in various round for reducing the overall throughput of core. The size of key defines the overall performance parameter as they varies according to given key size also depends on the maximum frequency of used FPGA kit. 2. Related Work AES implementations area unit classified into software system and hardware implementations[1]. Hardware implementation offers quicker speed, additional security Associate in Nursing and consumes less power and therefore is an attractive alternative as compared to software system implementation[12] (Karthigai Kumar and Baskaran, 2010). Implementation of algorithms on hardware may be achieved exploitation either Application Specific microcircuit (ASIC) or Field Programmable Gate Array (FPGA) devices[13] (Gaj and Chodowiec, 2009). The authors conferred ASIC implementation of the science formula (Chih-Pin et al., 2003; Liu and Luke, 2003). ASIC is Associate in nursing microcircuit designed for specific application and lacks flexibility. Moreover, increased Non continual Engineering price makes tiny volume production unaffordable. As compared to ASIC, Associate in Nursing FPGA device is reconfigurable, efficient, offers additional flexibility and needs less time to plug and thus FPGA[14] could be a in style alternative for hardware implementation (Alexandru and Fratila, 2011; Elbirt et al., 2001). FPGAs conjointly succeed far better performance than multi-core CPUs for mathematical computations. In loop unrolled structures[5], all the cipher rounds square measure unrolled and information is coiled through the cipher rounds consecutive till the complete encryption/decryption is completed (Ali et al., 2011; Standaert et al., 2003; Zhang and Parhi, 2004). The loop unrolled structure implementation, results in increased speed and accrued space utilization. The AES rule can be enforced exploitation non-pipelined and pipelined or sub pipelined techniques. The non-pipelined implementations result in optimisation of space at the value of speed (Hussain and Jamal, 2012; Rais and Qasim, 2009a, 2009b). Whereas pipelined or sub pipelined implementations end in increased outturn with increased space utilization as pipelining permits process of multiple blocks at the same time (Hammad et al., 2010; Tibeto-Burman language et al.,2015; Qu et al., 2009; Wang and HA, 2013). 3. Overview of Algorithm The AES process block diagram is shown in figure 1 which gives us the proper understanding of the algorithm. The process is divided into these parts:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1913  Sub Bytes  Shift Rows  Mixed Column  Add Round key Figure 1. AES Algorithm for Encryption Now we will discuss about the each sub steps taken in order to complete the given rounds. 3.1 Sub Bytes This is the process in which a S-Box matrix is created using VHDL/Verilog codes. This is predefined matrix generated by Galios Field conversion[x]. SubBytes gives step by step byte substitution using Rijndael’s S.Box lookup table[x]. The table has 16x16 dimension containing hexadecimal format. The hexadecimal is replaced by look up table of S-box matrix. Where XY is used to give the location of that code on S-box for substitution. Substituted matrix is given by X’Y’(figure 2). Figure 2: Sbo'x (16 x 16 byte) Figure 3: Sub-Byte process 3.2 Shift Rows This process consists of circular transformation of matrix from row(0) to row(3).The shift length is different for each row. For first row no shifting is done. For second row shifting is done once, for next row twice and for last thrice. The process is shown for shift rows (figure3). Figure 4:Shift Row transformation 3.3 Mix Column This transformation is done over each 4 byte column separately while omitted in 10th round. Columns are considered as polynomials over Galios Field ( ) and are multiplied by a fixed polynomial c( ) modulo ( +1) .(figure 4) C[x] = ...1 The matrix form of mixed column is given by: Figure 5: Mixed Column transformation 3.4 Add Round Key It is the process the converted plain text matrix is XOR-ed with the key matrix and final output obtained is cipher text. Different round key is added to each round as key transformation operation is also done at each round. Each byte of key is XOR-ed with each byte of text (figure5). XY=0A X’Y’=67
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1914 Figure 6: Add Round Key process for final output. 4. COMPARISON Various modules are created and categorised in given table 1.Models are based on optimizing the area speed throughput latency power etc. All the models are designed on reconfigurable FPGA models and software simulation was done on XILINX ISE 14.7, I-SIM. Further we can also provide the various FPGA models on the basis of given data of clock frequency of each devices based on previous researches. A comparison table is given on next page for that factors comparisons. Table 1: Comparison table for performance parameter 5. CONCLUSION Encryption using reconfigurable FPGA equipment platforms is widely used to secure data and improve throughput. The Rijndael cipher[6] style is well matched for hardware use. This implementation is meted out through different trade-offs between space and speed. The trade-offs is that AES needs extra power and should not be supported by hardware, conjointly there's wide selection of equipment used for coding that is required for authentication and security. AES is programmed in software or engineered with pure hardware. The AES is the latest standard for cryptography and has been taken wide support to secure digital information. References 1. Zodpe, H., Sapkal, A. An efficient AES implementation using FPGA with enhanced security features. Journal of King Saud University – Engineering Sciences (2018). 2. Pritamkumar N. Khose, Prof. Vrushali G. Raut, "Implementation of AES Algorithm on FPGA for Low Area Consumption",2015 International Conference on Pervasive Computing (JCPC). 3. Qiang, L., Zhenyu, X., Yuan, Y., 2015. High throughput and secure advanced encryption standard on field programmable gate array with finepipelining and enhanced key expansion. IET Comput. Digit. Tech. 9, 175–184. 4. Wenfeng Zhao, Yajun HaandMassimoAiioto,"Novel Self-BodyBiasing and Statistical Design for Near- Threshold Circuits With Ultra Energy-Efficient AES as Case Study",IEEE transactions on very large scale integration (VLSI) systems, vol. 23, no. 8, august 2015. 5. Mohammed, A., Mousa, F., Radwan, T., Odeh, M., 2011. Survey paper: cryptography is the science of information security. Int. J. Comput. Sci. Secur. 5, 298–309. 6. Fips-197, 2001. Advanced encryption standard (AES). Natl. Inst. Stand. Technol. 8–12. 7. Hussain, U., Jamal, H., 2012. An efficient high throughput FPGA implementation of AES for multi-gigabit protocols. Proc. 10th Int Conf. Front. Inf. Technol. FIT 2012, 215–218 8. Reddy, R.S.S.K., Praneeth, P., 2011. VLSI implementation of AES crypto processor for high throughput. Int. J. Adv. Eng. Sci. Technol. 6, 22–26. 9. Wang, Y., Ha, Y., 2013. FPGA-based 40.9-gbits/s masked AES with area optimization for storage Designs Throu ghput (Gbps ) Area(Slic es) Mbp s/Sli ce Fma x (Mh z) Bitwi dth( bits) Pipel ined stage s Harshali Zodpe(20 18)[1] 5.93 4095 1.4 4 463. 4 128 0 Qiang et al. (2015)[2 ] 3.45 335 10. 29 323. 7 128 0 Wang and Ha(2013) [9] 40.8 5927 6.9 0 319. 2 128 6 Henezen and Fichter 119.3 0 1499 8.0 6 233. 0 128 2 Reddy and Parneeth (2011)[8] 25.89 8896 2.9 1 202. 2 128 3
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1915 area network. IEEE Trans. Circuits Syst. II Express Briefs 60, 36–40. 10. Zhang, X., Parhi, K.K., 2004. High-speed VLSI architectures for the AES algorithm. IEEE Trans. Very Large Scale Integr. Syst. 12, 957–967. 11. Zhang, Y., Wang, X., 2010. Pipelined implementation of AES encryption based on FPGA. IEEE Int. Conf. Inf. Theory Inf. Secur, 170– 173. 12. Karthigai Kumar, P., Baskaran, K., 2010. An ASIC implementation of low power and high throughput blowfish crypto algorithm. Microelectron. J. 41, 347–355. 13. Gaj, K., Chodowiec, P., 2009. FPGA and ASIC implementations of AES. Cryptogr. Eng. 235–294. 14. Alexandru, C., Fratila, R., 2011. Cryptographic Applications using FPGA Technology. J. Mobile Embedded Distrib. Syst. 3, 10–16. BIOGRAPHIES ASHISH DWIVEDI received the B.Tech degree in Electronics and Communication Engineering from Shri Ramswaroop Memorial College of Engineering and Management, Abdul Kalam Technical University Lucknow, India and is currently working towards his M.Tech degree in Microelectronics with the research interest in Digital VLSI and the enhancing the performance of Cryptographic Circuit from Institute of Engineering and Technology, Lucknow, Uttar Pradesh.