Professional Documents
Culture Documents
My Paper PDF
My Paper PDF
I.
Reconfigurable
INTRODUCTION
processor with three key lengths i.e. 128, 192 and 256
bits.
Preamble
Start
of
Frame
Destination
MAC
Address
Source
MAC
Address
1-Byte
6-Byte
6-Byte
7-Byte
2-Byte
16 bytes
16 bytes
Data
Length
46<data<1500
Byte
14 bytes
Cyclic
Redundancy
Check
4-Byte
2 bytes
(Zeros)
PROPOSED METHADOLOGY
AES
128
192
256
NO. of Rounds
10
12
14
Key Select
0
1
2
C. Mode Selector
AES Mode
OFB
CFB
CTR
Mode Select
0
1
2
Table 2: Mode Selector
Figure 3: AES Encryption Algorithm (for 128 bit length key and
data)
CFB-128
CFB-192
CFB-256
CTR-128
CTR-192
CTR-256
1,0
1,1
1,2
2,0
2,1
2,2
RTL
The Register Transfer Level diagram for our system is shown
in figure4. MUX is used for the selection of key length
(i.e.128,192 and 256 bits) and encryption modes( i.e.
CTR,OFB,CFB).As we have nine operating combinations with
three key lengths and three modes, so we have shown only one
operating mode in RTL i.e. CTR mode with 128 bit length
key.
In figure4 PT_1 , PT_2 and PT_3 stands for three chunks of
plaintext each of 128 bits length. Ld_key is one bit signal that
is used to load the key for any certain mode. Initial vector(IV)
is required for encryption mode that is also fed as input to the
system.wo,w1,w2 and w3 represents 128 bit length key
where each word wo,w1,w2 and w3 contains 32 bits In
AES-192 and AES-256 case it will be configured to six
words of 32 bits i.e. ( w0,w1,w2,w3,w4,w5) and eight words
each of 32 bits i.e.( w0,w1,w2,w3,w4,w5,w6 and w7)
respectively.Cipher_1,2,3 are corresponding Cipher Text of
three plaintext chunks while rst signal is used to Reset the
system and clk is used for system clock that synchronizes
the system.
PERFORMANCE RESULTS
CONCLUSION
V. REFERENCES
[1] Banraplang Jyrwa and Roy Paily, An Area-Throughput
Efficient FPGA implementation of Block Cipher AES
algorithm, Advances in Computing, Control, and
Telecommunication Technologies ACT 2009, Trivandrum,
Kerala, 28 and 29 Dec 2009.
[2] Jun Shu, YIwen Wang, Wenchang Li and Zhiyong Gan
Realization of a resource sharing fast encryption and decryption
AES algorithm Intelligent Signal Processing and Communication
Systems (ISPACS), 2010 International Symposium on 6-8 Dec. 2010.
[3]Ai-Wen Luo, Qing Ming Yi, Min Shi Design and Implementation
of Area Optimized AES based on FPGA Business Management
and Electronic Information (BMEI), 2011 International Conference
on 13-15 May 2011.
[4] Yingjie Ji, Liji Wu,Xiangmin Zhang and Xiangyu Li Power
Analysis Resistant AES
Crypto Engine Design and FPGA
Implementation for a Network Security Co-processor. ASIC, 2009.
ASICON '09. IEEE 8th International Conference on 20-23 Oct. 2009
[5]Selma Laabidi, Bruno Robisson and Michael Agoyan An
evaluation methodology for the security of crypto systems
September 18, 2008.
[6] Namin Yu, Howard M.heys Investigation of Compact hardware
implementation of the Advanced Encryption standard Canadian
Conference on Electrical and Computer Engineering (CCECE)
2005.
[7] Refik Sever, A. Neslin Ismailoglu, Yusuf C.Tekmen, Murat Askar
and Burak OksanA high speed FPGA implementation of the
Rinjdael Algorithm Digital System Design, 2004. DSD 2004.
Euromicro Symposium on 31 Aug.-3 Sept. 2004.
[8]Advance
Encryption
Standard.
http://searchsecurity.techtarget.com/definition/AdvancedEncryption-Standard