Design and Implementation of Galios Field Based AES-256 Algorithm for Optimized Cryptosystem
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Veerendra Babu Dara; P. Sankara Rao;
Page : 2600-2606
Keywords : Advanced Encryption Standard AES 4; Composite Field Arithmetic 3; Cryptography; Galios Field 1; 13; Memory; Xilinx ISE 121 Design suite and Verilog;
Abstract
All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. As a result of technology scaling and higher integration densities there may be variations in parameters and noise levels which will lead to larger error rates at various levels of the computations. As far as memory applications are concerned the soft errors and single event upsets are always a matter of problem. In this paper presents an optimized composite field arithmetic based S-Box implemented in four stage pipeline. In traditional look up table (LUT) approaches, the unbreakable delay is longer than the total delay of the rest of operations in each round. LUT approach consumes a large area. It is more efficient to apply composite field arithmetic in the SubBytes transformation of the AES algorithm. It not only reduces the complexity but also enables deep sub pipelining such that higher speed can be achieved. Isomorphic mapping can be employed to convert GF (28) to GF (22) 2) 2), so that multiplicative inverse can be easily obtained. SubBytes and InvSubBytes transformations are merged using composite field arithmetic. It is most important responsible for the implementation of low cost and high throughput AES architecture. As compared to the typical ROM based lookup table, the presented implementation is both capable of higher speeds since it can be pipelined and small in terms of area occupancy (1609/29504 Slices on a Spartan 3 XC3S1600E-4, fg484).
Other Latest Articles
- Longitudinal Stress Analysis of Buried Pipes under Expansive Soils
- Endoscopic Dacryocystorhinostomy: A Prospective Study
- A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
- Survey of Mobile Cloud Media: A Cloud Centric Media Platform for End-to-End workflow and Layered Service Model
- Developing an Effective System for Keyword Based Query Processing
Last modified: 2021-06-30 21:12:54