An optimised AES algorithm and its FPGA implementation for secure information

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

An optimised AES algorithm and its FPGA implementation for secure information

Similar Papers
  • Research Article
  • Cite Count Icon 4
  • 10.12691/iscf-3-1-1
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
  • Jun 23, 2015
  • Chadi Fouad Riman + 1 more

Nowadays, network security is increasing rapidly and becoming an important and challenging issue. Information and internet security threats and attacks are becoming difficult to be detected. Therefore, encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. In this paper we implemented four encrypt techniques AES, DES, 3DES and E-DES algorithms and compared their performance. A comparative analysis on the above symmetric encryption algorithms has been made. These algorithms consume a significant amount of computing resources such as CPU time, memory and battery power. Experiments results are given to analyses the effectiveness of each algorithm. The comparison is made on the basis of these parameters: speed, block size, and key size etc. Educational-DES has better performance than other DES, 3DES, and AES algorithms.

  • Research Article
  • Cite Count Icon 1
  • 10.31937/ijnmt.v6i1.1070
Review on Realization of AES 256bit Encryption with Raspberry Pi
  • Aug 30, 2019
  • IJNMT (International Journal of New Media Technology)
  • Erick Fernando + 4 more

In this article, it aims to present the AES encryption on the Raspberry Pi mini pc. this application also aims to illustrate that this AES algorithm can be applied with small resources. This research was conducted with an experimental approach, which carried out the implementation process in mini pc hardware and xampp software (php, apache). This AES algorithm is tested by PHP programming with Apache web server with text data. The results of the study, that the AES algorithm can run well with a hard minimum, like raspberry mini pc with a very fast time in the process, speed in the process and a lot of text data. So, AES algorithm can be widely adopted for various applications from raspberry PI mini pc computers with strong practicality in information security and reliability.

  • Conference Article
  • Cite Count Icon 7
  • 10.1109/raeecs50817.2020.9265688
High-Throughput Optimizations of AES Algorithm for Satellites
  • Oct 20, 2020
  • Syed Jahanzeb Hussain Pirzada + 5 more

The increase in the flow of information and high-speed communication has compelled researchers to use satellite networks for different applications. The satellite networks comprise different satellites in different orbits that require the data security algorithms for the providing security and privacy of consumers' information. The data security primarily consists of data confidentiality service, which is provided by data encryption algorithms. The data encryption algorithm for example AES algorithm is utilized in many applications, including the satellites. The challenges for AES algorithm utilization in satellite applications are high-speed computation, lightweight implementation, and catering the radiations in the space environment. In this work, optimizations are proposed for coping with the challenges in a data encryption algorithm for the space environment. Also, the high-throughput optimization for the AES algorithm is realized on FPGA, and it equated with previous work. Moreover, the recent security attacks, for instance the nonce misuse attack is challenging for the security of encryption algorithms. The high-throughput optimized encryption algorithm protects against the recent attacks by the modifications in the AES algorithm. Moreover, the security analysis is provided against the latest attacks for the validation of high-throughput optimizations.

  • Book Chapter
  • Cite Count Icon 2
  • 10.1007/978-981-13-0586-3_34
FPGA Implementation of Parallel Transformative Approach in AES Algorithm
  • Aug 31, 2018
  • Padma Prasada + 3 more

In recent years, network security is the most critical component in information security. In this research, a new simple yet powerful and fast algorithm for AES is proposed. To have a secured data communication on network usage of an iterative symmetric key block, cipher-based AES is proposed widely. AES is implemented by adopting keys of 128, 192, or 256 bits for encryption/decryption of data in block of 128 bits. These include four transformations in AES: substitute bytes, shift rows, mix columns, and add round key. Here in this approach, parallel transformative method in these transformations mainly in mix columns is proposed. This research mainly focused on the designing of AES according to 192-bit key length in the Verilog language and implementation of it in Virtex6 ML605 FPGA evaluation platform using Xilinx ISE 14.4. To enhance the speed of operation of the algorithm, we followed parallel transformative approach, which achieved throughput of 5565.2173 Mbps with maximum frequency 564.972 MHz in latency of about 13 clock cycles.

  • Conference Article
  • Cite Count Icon 4
  • 10.1109/iwcfta.2011.55
ARM Realization of Storage Device Encryption Based on Chaos and AES Algorithm
  • Oct 1, 2011
  • Chunlei Wang + 3 more

In order to improve the security of the private information in memorizer, an encryption algorithm, which inherits the advantages of chaotic encryption, stream cipher and AES algorithm, is proposed in this paper. We design and realize an encryption system based on the algorithm on ARM(S3C6410), which can encrypt and decrypt the information in many kinds of memorizers, such as UDisk, SD card and mobile HDD. The system that uses Human-Computer Interaction and Visualization technology provides several encryption algorithms and key generators. Some analysis results are presented to show its high security at the end of the paper.

  • Research Article
  • Cite Count Icon 1
  • 10.1088/1755-1315/267/4/042070
AES Algorithm Optimization and FPGA Implementation
  • May 1, 2019
  • IOP Conference Series: Earth and Environmental Science
  • Yufeng Liu + 2 more

AES is an existing encryption algorithm with strong anti-attack capability, fast encryption speed and good portability. Implementing AES algorithms on FPGA can process data faster. In order to improve the running speed of the overall system, the re-design uses a full-flow technology to implement the algorithm. And the algorithm is optimized,finally using quartus for synthesis.

  • Research Article
  • 10.55041/ijsrem46208
Optimized AES algorithm for Trojan Detection via Area Reduction
  • Apr 27, 2025
  • INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
  • Shaik Mahammad Maaz

Abstract—The integration of the Advanced Encryption Stan- dard (AES) into hardware platforms introduces significant se- curity challenges, particularly concerning the potential insertion of hardware Trojans designed to compromise system security without detection. These Trojans, often employing area reduction tactics to minimize their physical footprint, evade conventional detection methods that rely on anomalies in chip area utilization or power consumption. To counteract these stealthy threats, a multifaceted approach is essential. Functional verification ensures correct AES implementation by rigorous testing against reference models, while side-channel analysis detects unintended informa- tion leakage through power, electromagnetic, or timing variations. Layout inspection examines the physical chip for irregularities using advanced imaging techniques, and behavioral analysis monitors runtime execution patterns to identify performance anomalies. Formal verification employs mathematical proofs to validate the design against security properties. Combining these methodologies enhances the detection and mitigation of area- reduction Trojans, bolstering the trustworthiness and resilience of AES-based cryptographic systems. Index Terms—Optimized AES,Trojan Detection,Hardware Trojan,Area Reduction,AES Algorithm Optimization, VLSI De- sign,FPGA Implementation, AES Encryption

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 1
  • 10.32628/cseit228416
Advanced Unified Encrypting Methodology to Enhance The Security of Health Information in Cloud Storage Employing Blockchain
  • Jul 10, 2022
  • International Journal of Scientific Research in Computer Science, Engineering and Information Technology
  • Thasni K N + 1 more

Security of health information has been a major issue in the health care industry. Health information exchange have been help doctors, patients, and other healthcare providers to securely access and share the medical information. Cloud computing led to easier and safer access and sharing of medical records. To provide additional security to cloud computing employ encryption techniques and blockchain. In this method develop the mobile application to enhance the security of health information in cloud storage using various encryption techniques and blockchain.Base64 encoding and AES algorithm are used for providing more security to the medical records. Blockchain transactions occur within a peer-to-peer network of patient records. SHA-256 algorithm is used for implementing the blockchain. This system protects the confidentiality of health data stored on cloud storage.

  • Research Article
  • Cite Count Icon 4
  • 10.26483/ijarcs.v8i4.3760
A Review of Information Security using Cryptography Technique
  • Jun 3, 2017
  • International Journal of Advanced Research in Computer Science
  • Neha Sharma + 2 more

Data security has become crucial aspect nowadays in every sectors. So in order to protect it various methods and algorithm have been implemented. It protects its availability, privacy and integrity. More companies stores business and individuals information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. In this paper I have reviewed the cryptography algorithm which is based on block cipher concept. To write this paper I have study about information security using cryptography technique. After the detailed study of network security using cryptography. This paper is dividing in three sections. In section 1, I am presenting just basic introduction about in information security using cryptography. In section 2, I am presenting detailed description about cryptography algorithms like symmetric key algorithm like DES,AES ,blowfish and Asymmetric key algorithm like RSA , Diffie–Hellman key exchange algorithm. In section 3, I am presenting conclusion and references where I have completed my research.

  • Research Article
  • 10.3390/electronics14122464
Dynamic Analysis, FPGA Implementation and Application of Memristive Hopfield Neural Network with Synapse Crosstalk
  • Jun 17, 2025
  • Electronics
  • Minghao Shan + 4 more

In a biological nervous system, neurons are connected to each other via synapses to transmit information. Synaptic crosstalk is the phenomenon of mutual interference or interaction of neighboring synapses between neurons. This phenomenon is prevalent in biological neural networks and has an important impact on the function and information processing of the neural system. In order to simulate and study this phenomenon, this paper proposes a memristor model based on hyperbolic tangent function for simulating the activation function of neurons, and constructs a three-neuron HNN model by coupling two memristors, which brings it close to the real behavior of biological neural networks, and provides a new tool for studying complex neural dynamics. The intricate nonlinear dynamics of the MHNN are examined using techniques like Lyapunov exponent analysis and bifurcation diagrams. The viability of the MHNN is confirmed through both analog circuit simulation and FPGA implementation. Moreover, an image encryption approach based on the chaotic system and a dynamic key generation mechanism are presented, highlighting the potential of the MHNN for real-world applications. The histogram shows that the encryption algorithm is effective in destroying the features of the original image. According to the sensitivity analysis, the bit change rate of the key is close to 50% when small perturbations are applied to each of the three parameters of the system, indicating that the system is highly resistant to differential attacks. The findings indicate that the MHNN displays a wide range of dynamical behaviors and high sensitivity to initial conditions, making it well-suited for applications in neuromorphic computing and information security.

  • Research Article
  • 10.3233/jcm-226694
A generic model for security algorithms in mobile electronic payment systems
  • May 30, 2023
  • Journal of Computational Methods in Sciences and Engineering
  • Quan Yuan + 2 more

At a time when communication network technology is developing rapidly, the security of the Internet has aroused widespread concern in the academic community. In particular, electronic payment, which has been booming in recent years, has great security risks and people are prone to information leakage and property loss in the process of payment. In order to solve these problems, this study adopts the AES to encrypt the information in the payment process, introduces the RSA Public Key System (RSA) and the SM4 packet cipher algorithm for comparison, and analyses their encryption (decryption) speed, decryption (decryption) speed and encryption speed respectively. (decryption) speed, as well as PR curve, Loss function and sensitivity. The results show that the AES algorithm has a faster encryption (decryption) speed compared to the other two algorithms. In the PR curve, the AES algorithm has an AP value of 0.9988, which is significantly higher than the other two algorithms, and has a better balance between accuracy and recall, and better performance. In the sensitivity analysis, the AES algorithm can have the highest sensitivity of 97.88%. This is significantly higher than the 93.47% and 96.59% of the other two algorithms. Moreover, as shown by the Loss function of the AES algorithm, it converges faster and the Liss value varies between 0.1 and 0.9. In summary, the AES algorithm has a faster encryption speed and is better in terms of accuracy, convergence speed and security factor in all aspects. This also demonstrates the feasibility and effectiveness of this algorithm for information security protection in electronic payment processes.

  • Book Chapter
  • 10.1007/978-981-10-8681-6_79
Secure Data Concealing Using Diamond Encoding Method
  • Sep 18, 2018
  • A Christie Aiswarya + 1 more

In recent years, due to the fastest development in digital data exchange, the security of information becomes highly important for storing the data and its transmission process. The data size of text and image are different. So, for providing security to both text and image involves various methods. Choosing the best method to encrypt and decrypt the data also plays a crucial role. Traditional methods may require more time to encrypt and decrypt. Since the compilation time for one method differs from the other. The proposed model provides security for both text and image by means of embedding encrypted text into an encrypted image, and the same can be decrypted to view the original text and image. The algorithms used in the proposed model are chaotic algorithm for text and AES algorithm is used for image encryption and decryption process. Encrypted text is embedded in encrypted image using diamond encoding data hiding strategy and the same is decrypted to get the original text and image.

  • Book Chapter
  • 10.1007/978-981-16-1773-7_32
Image Encryption for Secure Internet Transfer
  • Jan 1, 2021
  • G Dheeraj Chaitanya + 5 more

Information security has always been an important aspect of consideration in daily life communication and with the advent of COVID-19 and communication, including sensitive data like corporate files, personal data, etc., increasingly moving online, it has become more important than ever to provide secure communication methods. One such method is using encryption and steganography. Encryption is the process of converting ordinary plaintext data into an alternative form that is unreadable by perpetrators without authorization. Furthermore, steganography is the practice of hiding a file, message, video, or image within another such file. In this paper, we introduce a web application that will enable the user to encrypt the data in a file of his choice and then hide it within a picture or GIF. This will provide the layman an application that is easy to use to communicate securely, even without extensive technical knowledge. The encryption algorithm used will be the AES-256 algorithm and the steganographic algorithm will be Syndrome-Trellis Codes (STCs) for their high embedding efficiency. The results display that the system designed offers a significant security level.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/icwcsg50807.2020.00008
File Encryption System Based on the Hybrid LPC Coefficient and AES Algorithm
  • Jun 1, 2020
  • Lian Li + 1 more

At present, academic research on information security is getting deeper and wider. In this paper, the LPC coefficient and the speech waveform characteristics are mixed to form the hybrid LPC coefficient. The hybrid LPC is then used as the secret key of the AES algorithm in the file encryption system. The system is designed based on VS2012, all the files can be encrypted and decrypted by the system using the voice hybrid LPC key, and the system performance is relatively stable.

  • Conference Article
  • Cite Count Icon 2
  • 10.1109/startup.2016.7583914
Design of advanced encryption standard on soft-core processor
  • Feb 1, 2016
  • Amruta R Dumane + 2 more

With the rapid progression of data exchange in electronic world, information security is becoming more important in data transmission and storage. Security became an essential thing during the transmission of confidential information. Cryptographic algorithm is used to scramble the text from one form to another form. This Paper represents the design of Advanced Encryption Standard on soft-core processor. AES is a block cipher algorithm that can be used for both encryption and decryption. AES algorithm protects the data from unauthorized access. Design of AES algorithm on Soft-core processor uses both EDK and SDK tool. Simulation results are tested on Field Programmable Gate Array (FPGA).

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.