SlideShare a Scribd company logo
1 of 9
Download to read offline
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
DOI : 10.5121/acij.2012.3410 77
IMPLEMENTATION OF AES AS A CUSTOM
HARDWARE USING NIOS II PROCESSOR
Meghana Hasamnis1
and Priyanka Jambhulkar2
and S. S. Limaye3
1
Associate Professor, Department of Electronics Engineering, Shri Ramdeobaba
College of Engineering and Management, Nagpur, India
meghanahasamnis@rediffmail.com
2
Department of Electronics Engineering, Shri Ramdeobaba College of Engineering and
Management, Nagpur, India
priyaj157@gmail.com
3
Professor, Department of Electronics Engineering, Jhulelal Institute of Technology,
Nagpur, India
shyam_limaye@hotmail.com
ABSTRACT
In this paper Advanced Encryption Standard (AES) algorithm has been designed and implemented as
custom hardware. The algorithm is controlled through C-code written in NIOS II IDE. AES as a custom
hardware is interfaced with the system designed around NIOS II Processor using SOPC builder tool. AES
is written in hardware in VHDL language and the interface is through GPIO (General Purpose Input /
Output Port). AES implemented using data size of 128 bits, while the length of the key used is of 128 bits.
The key size of AES used is of 128 bits, as it is secure from the different attacks in existence. The FPGA
used is CYCLONE II from Altera. AES as a custom hardware increases the speed of encryption and
serves as an accelerator and hence improves the performance of the system.
.Keywords
Advanced Encryption Standard (AES), NIOS II Processor, SOPC Builder, NIOS II IDE.
1. INTRODUCTION
Cryptography plays an important role in the security of data. It enables to store sensitive
information or transmit it across insecure networks so that unauthorized persons cannot read it.
Advanced Encryption Standard (AES) is the most common encryption algorithm widely used in
applications such as wireless communication [1]. The Advanced Encryption Standard (AES) is
well known block-cipher algorithm which is easily portable and reasonable security. For secure
exchange of digital data, resulted in large quantities of different encryption algorithms this can
be classified into two groups: Symmetric encryption algorithm (with private key algorithms)
and Asymmetric encryption algorithm (with public key algorithms). Symmetric key algorithms
are in general much faster to execute electronically than asymmetric key algorithms.
The most commonly used symmetric encryption algorithm is AES. The input plain text and the
cipher key are in state array fashion and hence known as a block cipher. The plaintext input are
of fixed size, blocks of 128 bits and produces a block of ciphertext of equal size for each
plaintext block. The most commonly used symmetric encryption algorithms are the data
encryption standard (DES), triple data encryption algorithm (TDEA) and advanced encryption
standard (AES). TDEA has two features which ensure its widespread use over years. First, with
its 168-bit key length, it overcomes the vulnerability to brute-force attack of DEA which has 56-
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
78
bit key length. Second, the underlying encryption algorithm in TDEA is the same as in DEA.
The main drawback of TDEA is that the algorithm is relatively slow in software. The original
DEA was designed around mid-1970’s suitable for hardware implementation but does not
produce efficient software code. TDEA, which has three times as many as round as DEA, is
correspondingly slower. A secondary drawback is that both DES and TDEA use a 64-bit block
size and hence are prone to attacks [2].
For reasons of both efficiency and security a larger block size is desirable. As a replacement,
NIST in 1997 issued a call for proposals for a new advanced encryption standard (AES),which
should have a security strength equal to or better than TDEA and significantly improved
efficiency. In addition to these general requirements, NIST specified that AES must be a
symmetric block cipher with a block length of 128-bits and support for key lengths of 128,192
and 256 bits.
2. AES ALGORITHM
The AES algorithm is a symmetric-key cipher, in which both the sender and the receiver uses a
single key for encryption and decryption. The length of the plain text is fixed to be 128 bits,
while the key length can be either 128,192, or 256 bits. The key length selected is of 128 bits.
AES algorithm is an iterative algorithm. Every iteration can be called a round, and the total
number of rounds is 10, 12, or 14, when key length is 128, 192, or 256 respectively. The 128 bit
algorithm is divided into 16 bytes. These bytes are represented into 4x4 array called the state
array, and all the different operations of the AES algorithm such as addroundkey, subbytes,
shiftrows, mixcolumns and key expansion are performed on the state [3].
Fig.1 Block Diagram of AES
In AES algorithm encryption of data consists of ten rounds. Each round consists of four
operations or transformations. Only the last round i.e. the tenth round has only three operations
to be performed. The four steps of the algorithm are as below [4].
2.1 SubBytes
Each entry in the state array is of bytes. S-box is a standard substitution table. Every byte in the
state array is substituted by the corresponding byte from the S-box. Each byte of the state array
is changed.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
79
2.2 ShiftRows
Each row of the state array is rotated to the left by a specific indent. Second row is shifted by
one position to left, third row by two position and fourth row by three positions to left.
2.3 Mixcolumns
In mixcolumn operation the columns of the State are considered as polynomials over GF (28
)
and are multiplied with a fixed polynomial. The mixcolumn is not used in the last round of the
algorithm.
2.4 Addroundkey
It is a simple bitwise XOR of the current state array block with a portion of expanded key,
expanded by key expansion block.
The flow of AES algorithm is very simple. For encryption, the cipher begins with an
Addroundkey stage, followed by nine rounds. Each round includes all four stages, followed by
tenth round of three stages. Only the Addroundkey stage makes use of key. For this reasons, the
cipher begins and ends with an Addroundkey stage. Any other stage, used at the beginning or at
the end, is reversible without knowing the key and hence would provide no security. The Figure
2 below shows the flow of the encryption algorithm [5].
Fig.2 An AES Encryption Flow Chart
3. SYSTEM DESIGNED USING NIOS II PROCESSOR
A NIOS II is 32 bit soft core processor. A NIOS II processor system consists of a NIOS II
processor, a set of on-chip peripherals, on-chip memory, GPIO’s, all connected with Avalon bus
to generate a system [6, 7]. The Nios II processor is a configurable soft-core processor, as
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
80
opposed to a fixed, off-the-shelf microcontroller. As Nios II processor is configurable adding
and removing components or features on a system is easy to meets performance goals in terms
of area. Soft-core processor can be targeted to any Altera FPGA family and is not fixed in
silicon [8, 9, 10].
Following are the features of NIOS II processor
• The Nios II processor is a general-purpose RISC processor core, providing:
• Full 32-bit instruction set, data path, and address space
• 32 general-purpose registers
• 32 interrupt sources
• External interrupt controller interface for more interrupt sources
• Access to a variety of on-chip peripherals, and interfaces to off-chip memories and
peripherals
• Single-instruction 32 × 32 multiply and divide producing a 32-bit result
• Optional memory protection unit (MPU)
• Instruction set architecture (ISA) compatible across all Nios II processor systems
• Software development environment based on the GNU C/C++ tool chain and NIOS
IDE
• Performance up to 250 DMIPS
Fig.3 AES connected with NIOS II Processor through GPIO
4. DESIGN STEPS OF AES AS AN ACCELERATOR
The design steps are as follows:
4.1 Integrating the SOPC Builder System into the Quartus II Project
The AES is written in VHDL which is driven as an accelerator /custom hardware and the inputs
and outputs are applied through GPIO in SOPC builder which is given through c-code in IDE.
The contents are as follows
• Standard processor, component cores as a controller part.
• AES is given as hardware written in VHDL.
• Inputs and Outputs are given through GPIO.
Following are the components required in SOPC builder as a controller part of AES
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
81
Fig.4 System generation using SOPC Builder
4.2 AES program written in hardware is connected with system designed through
General Purpose Input / Output (GPIO)
VHDL program for AES algorithm is written and is connected with the system designed using
the NIOS II processor through GPIO.
4.3 AES Block Diagram File view
Using the Quartus II software, all tasks are performed required to create the final FPGA
hardware design. Using the Quartus II software, pin assignment, locations for I/O signals,
timing requirements are specified, and also other design constraints are applied. Compile the
Quartus II project to produce a .sof file to configure the FPGA.
Fig.5 AES Block Diagram File view
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
82
4.4 Compiled and downloaded in FPGA
Fig. 6 Programmer Window
4.5 Control program written in Nios II IDE
The control part of the AES algorithm is written in C language in NIOS II IDE. The input and
the output is given through C program written in IDE.
4.6 Encrypted result in console window
The inputs and outputs are applied through GPIO in NIOS II IDE which is written in C-code.
• To compile a Nios II project, right click the project in the Nios II C/C++ Projects view,
and click Build Project.
• To run the program on a target board, right click the project in the Nios II C/C++
Projects view, click on Run As, and then click Nios II Hardware.
5. RESULT AND CONCLUSION
5.1 Simulation result of AES used as an accelerator
Fig.7 Encryption results on console window of NIOS II IDE
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
83
5.2 Synthesis Report of AES as an custom hardware
AES is synthesized in Quartus II software and the report is given below
Fig.8 Synthesis Report of AES
5.3 RTL view of AES
AES is synthesized in Quartus II software and the RTL view is given below
Fig.9 RTL view of AES
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
84
Table 1 below shows the CPU clock cycles taken for encryption when AES algorithm is
completely written in software and when AES algorithm written in VHDL and connected with
the system generated using NIOS II processor as a custom hardware.
Table 1. CPU clock cycles for encryption of data
AES algorithm Total time for encryption
(CPU cycles)
Hardware Software
AES 21731020
AES as custom hardware control, inputs and outputs 26425
From the above table 1 number of clock cycles required for AES as custom hardware is very
less as compared to AES in software. Hence AES as custom hardware accelerates the speed of
operation.
REFERENCES
[1] FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and
Technology, U.S. Department of Commerce, November 2001 (http://csrc.nist.gov/
publications/fips/fips197/fips-197.pdf).
[2] William Stallings “Cryptography and Network Security,” 3rd Edition published by Pearson Education
Inc and Dorling Kindersley Publishing Inc. Advanced Encryption Standard (AES), Nov. 26, 2001.
[3] Stallings W. “Cryptography and Network Security: Principles and Practices, 4th ed., Pearson
Education, Inc. pp. 63-173., 2006.
[4] A. J. Elbirt, W. Yip, B. Chetwynd, and C. Paar., An FPGA implementation and performance
evaluation of theAES block cipher candidate algorithm finalist., presented at Proc. 3rd AES Conf.
(AES3). [Online]. Available: http://csrc.nist.gov/encryption/aes/round2/conf3/aes3papers.html
[5] DAEMEN, J.—RIJMEN, V.: AES Proposal: Rijndael, The Rijndael Block Cipher, AES Proposal,
pp.1–45,1999 (http://csrc.nist.gov/CryptoToolkit/aes/)
[6] Altera Corporation, “Quartus II Development Software Handbook v4.0,” [Online Document],2004
February, Available HTTP: http://www.altera.com/literature/hb/qts/quartusii_handbook.pdf
[7] Altera corporation, “Nios Embedded Processor, 32-Bit Programmer’s Reference Manual” [Online
Document] January, 2003
Available:http://www.altera.com/literature/manual/mnl_nios_programmers32.pdf
[8] Rahman T., Pan S. and Zhang Q., “Design of a High Throughput 128-bit (Rijndael
BlockCipher)”,Proceeding of International Multiconferrence of Engineers and computer scientists 2010
Vol II IMECS 2010, March 17- 19,2010, Hongkong.
[9] Nios II Hardware Development Tutorial, altera, December 2009 Altera Corporation Website,
www.altera.com, June 2006
[10] Altera Corporation, “Nios Software Development Tutorial,” [Online Document], 2003 July, [Cited
2004 March 1], Available HTTP: http://www.altera.com/literature/tt/tt_nios_sw.pdf
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
85
Authors
Meghana A. Hasamnis Pursuing Ph.D. from RTM Nagpur University,
Nagpur, India in the field of embedded system. She is M.Tech. from VNIT,
Nagpur, India. She is working as an Associate Professor at Shri. Ramdeobaba
College of Engineering and Management Nagpur, India in the Department of
Electronics Engineering for last 10 years.
Priyanka Jambhulkar Post graduate student in the Department of Electronics
Engineering at Shri. Ramdeobaba College of Engineering and Management,
Nagpur, India, pursuing her M. Tech in VLSI. Done her B.E. in Electronics and
Communication from Nagpur University, India.
Dr. S. S. Limaye Ph.D. from Nagpur University in the faculty of Electronics
Engineering. Currently he is working with JIT as a Principal. He has 38 years of
experience in teaching as well as in industry. He also carried out a number of
consultancy projects at DCM Data products, Delhi, PSI Data Systems
Bangalore, Zen and Art New York. His area of specialization includes digital
signal processing, VLSI design, LDPC codes, Embedded System, CORDIC
algorithm. He is a recognized Supervisor RTM Nagpur University, Nagpur.

More Related Content

What's hot

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationIRJET Journal
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer securityDeepak John
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of commonIJNSA Journal
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithmijsrd.com
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
 
An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...eSAT Publishing House
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
 
A combined approach using triple des and blowfish
A combined approach using triple des and blowfishA combined approach using triple des and blowfish
A combined approach using triple des and blowfisheSAT Publishing House
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based serviceseSAT Journals
 
A combined approach using triple des and blowfish research area
A combined approach using triple des and blowfish research areaA combined approach using triple des and blowfish research area
A combined approach using triple des and blowfish research areaeSAT Journals
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
 

What's hot (19)

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
M04302093096
M04302093096M04302093096
M04302093096
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard AlgorithmAn Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
Final report
Final reportFinal report
Final report
 
A combined approach using triple des and blowfish
A combined approach using triple des and blowfishA combined approach using triple des and blowfish
A combined approach using triple des and blowfish
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based services
 
A combined approach using triple des and blowfish research area
A combined approach using triple des and blowfish research areaA combined approach using triple des and blowfish research area
A combined approach using triple des and blowfish research area
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
 

Similar to IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR

Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithmeSAT Journals
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICpaperpublications3
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,paperpublications3
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...IJMTST Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...ijcsit
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmTELKOMNIKA JOURNAL
 

Similar to IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR (20)

Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 
Aes
AesAes
Aes
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
A04660105
A04660105A04660105
A04660105
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Aes
AesAes
Aes
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
G04701051058
G04701051058G04701051058
G04701051058
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
VHDL Encryption
VHDL EncryptionVHDL Encryption
VHDL Encryption
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR

  • 1. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 DOI : 10.5121/acij.2012.3410 77 IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR Meghana Hasamnis1 and Priyanka Jambhulkar2 and S. S. Limaye3 1 Associate Professor, Department of Electronics Engineering, Shri Ramdeobaba College of Engineering and Management, Nagpur, India meghanahasamnis@rediffmail.com 2 Department of Electronics Engineering, Shri Ramdeobaba College of Engineering and Management, Nagpur, India priyaj157@gmail.com 3 Professor, Department of Electronics Engineering, Jhulelal Institute of Technology, Nagpur, India shyam_limaye@hotmail.com ABSTRACT In this paper Advanced Encryption Standard (AES) algorithm has been designed and implemented as custom hardware. The algorithm is controlled through C-code written in NIOS II IDE. AES as a custom hardware is interfaced with the system designed around NIOS II Processor using SOPC builder tool. AES is written in hardware in VHDL language and the interface is through GPIO (General Purpose Input / Output Port). AES implemented using data size of 128 bits, while the length of the key used is of 128 bits. The key size of AES used is of 128 bits, as it is secure from the different attacks in existence. The FPGA used is CYCLONE II from Altera. AES as a custom hardware increases the speed of encryption and serves as an accelerator and hence improves the performance of the system. .Keywords Advanced Encryption Standard (AES), NIOS II Processor, SOPC Builder, NIOS II IDE. 1. INTRODUCTION Cryptography plays an important role in the security of data. It enables to store sensitive information or transmit it across insecure networks so that unauthorized persons cannot read it. Advanced Encryption Standard (AES) is the most common encryption algorithm widely used in applications such as wireless communication [1]. The Advanced Encryption Standard (AES) is well known block-cipher algorithm which is easily portable and reasonable security. For secure exchange of digital data, resulted in large quantities of different encryption algorithms this can be classified into two groups: Symmetric encryption algorithm (with private key algorithms) and Asymmetric encryption algorithm (with public key algorithms). Symmetric key algorithms are in general much faster to execute electronically than asymmetric key algorithms. The most commonly used symmetric encryption algorithm is AES. The input plain text and the cipher key are in state array fashion and hence known as a block cipher. The plaintext input are of fixed size, blocks of 128 bits and produces a block of ciphertext of equal size for each plaintext block. The most commonly used symmetric encryption algorithms are the data encryption standard (DES), triple data encryption algorithm (TDEA) and advanced encryption standard (AES). TDEA has two features which ensure its widespread use over years. First, with its 168-bit key length, it overcomes the vulnerability to brute-force attack of DEA which has 56-
  • 2. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 78 bit key length. Second, the underlying encryption algorithm in TDEA is the same as in DEA. The main drawback of TDEA is that the algorithm is relatively slow in software. The original DEA was designed around mid-1970’s suitable for hardware implementation but does not produce efficient software code. TDEA, which has three times as many as round as DEA, is correspondingly slower. A secondary drawback is that both DES and TDEA use a 64-bit block size and hence are prone to attacks [2]. For reasons of both efficiency and security a larger block size is desirable. As a replacement, NIST in 1997 issued a call for proposals for a new advanced encryption standard (AES),which should have a security strength equal to or better than TDEA and significantly improved efficiency. In addition to these general requirements, NIST specified that AES must be a symmetric block cipher with a block length of 128-bits and support for key lengths of 128,192 and 256 bits. 2. AES ALGORITHM The AES algorithm is a symmetric-key cipher, in which both the sender and the receiver uses a single key for encryption and decryption. The length of the plain text is fixed to be 128 bits, while the key length can be either 128,192, or 256 bits. The key length selected is of 128 bits. AES algorithm is an iterative algorithm. Every iteration can be called a round, and the total number of rounds is 10, 12, or 14, when key length is 128, 192, or 256 respectively. The 128 bit algorithm is divided into 16 bytes. These bytes are represented into 4x4 array called the state array, and all the different operations of the AES algorithm such as addroundkey, subbytes, shiftrows, mixcolumns and key expansion are performed on the state [3]. Fig.1 Block Diagram of AES In AES algorithm encryption of data consists of ten rounds. Each round consists of four operations or transformations. Only the last round i.e. the tenth round has only three operations to be performed. The four steps of the algorithm are as below [4]. 2.1 SubBytes Each entry in the state array is of bytes. S-box is a standard substitution table. Every byte in the state array is substituted by the corresponding byte from the S-box. Each byte of the state array is changed.
  • 3. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 79 2.2 ShiftRows Each row of the state array is rotated to the left by a specific indent. Second row is shifted by one position to left, third row by two position and fourth row by three positions to left. 2.3 Mixcolumns In mixcolumn operation the columns of the State are considered as polynomials over GF (28 ) and are multiplied with a fixed polynomial. The mixcolumn is not used in the last round of the algorithm. 2.4 Addroundkey It is a simple bitwise XOR of the current state array block with a portion of expanded key, expanded by key expansion block. The flow of AES algorithm is very simple. For encryption, the cipher begins with an Addroundkey stage, followed by nine rounds. Each round includes all four stages, followed by tenth round of three stages. Only the Addroundkey stage makes use of key. For this reasons, the cipher begins and ends with an Addroundkey stage. Any other stage, used at the beginning or at the end, is reversible without knowing the key and hence would provide no security. The Figure 2 below shows the flow of the encryption algorithm [5]. Fig.2 An AES Encryption Flow Chart 3. SYSTEM DESIGNED USING NIOS II PROCESSOR A NIOS II is 32 bit soft core processor. A NIOS II processor system consists of a NIOS II processor, a set of on-chip peripherals, on-chip memory, GPIO’s, all connected with Avalon bus to generate a system [6, 7]. The Nios II processor is a configurable soft-core processor, as
  • 4. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 80 opposed to a fixed, off-the-shelf microcontroller. As Nios II processor is configurable adding and removing components or features on a system is easy to meets performance goals in terms of area. Soft-core processor can be targeted to any Altera FPGA family and is not fixed in silicon [8, 9, 10]. Following are the features of NIOS II processor • The Nios II processor is a general-purpose RISC processor core, providing: • Full 32-bit instruction set, data path, and address space • 32 general-purpose registers • 32 interrupt sources • External interrupt controller interface for more interrupt sources • Access to a variety of on-chip peripherals, and interfaces to off-chip memories and peripherals • Single-instruction 32 × 32 multiply and divide producing a 32-bit result • Optional memory protection unit (MPU) • Instruction set architecture (ISA) compatible across all Nios II processor systems • Software development environment based on the GNU C/C++ tool chain and NIOS IDE • Performance up to 250 DMIPS Fig.3 AES connected with NIOS II Processor through GPIO 4. DESIGN STEPS OF AES AS AN ACCELERATOR The design steps are as follows: 4.1 Integrating the SOPC Builder System into the Quartus II Project The AES is written in VHDL which is driven as an accelerator /custom hardware and the inputs and outputs are applied through GPIO in SOPC builder which is given through c-code in IDE. The contents are as follows • Standard processor, component cores as a controller part. • AES is given as hardware written in VHDL. • Inputs and Outputs are given through GPIO. Following are the components required in SOPC builder as a controller part of AES
  • 5. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 81 Fig.4 System generation using SOPC Builder 4.2 AES program written in hardware is connected with system designed through General Purpose Input / Output (GPIO) VHDL program for AES algorithm is written and is connected with the system designed using the NIOS II processor through GPIO. 4.3 AES Block Diagram File view Using the Quartus II software, all tasks are performed required to create the final FPGA hardware design. Using the Quartus II software, pin assignment, locations for I/O signals, timing requirements are specified, and also other design constraints are applied. Compile the Quartus II project to produce a .sof file to configure the FPGA. Fig.5 AES Block Diagram File view
  • 6. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 82 4.4 Compiled and downloaded in FPGA Fig. 6 Programmer Window 4.5 Control program written in Nios II IDE The control part of the AES algorithm is written in C language in NIOS II IDE. The input and the output is given through C program written in IDE. 4.6 Encrypted result in console window The inputs and outputs are applied through GPIO in NIOS II IDE which is written in C-code. • To compile a Nios II project, right click the project in the Nios II C/C++ Projects view, and click Build Project. • To run the program on a target board, right click the project in the Nios II C/C++ Projects view, click on Run As, and then click Nios II Hardware. 5. RESULT AND CONCLUSION 5.1 Simulation result of AES used as an accelerator Fig.7 Encryption results on console window of NIOS II IDE
  • 7. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 83 5.2 Synthesis Report of AES as an custom hardware AES is synthesized in Quartus II software and the report is given below Fig.8 Synthesis Report of AES 5.3 RTL view of AES AES is synthesized in Quartus II software and the RTL view is given below Fig.9 RTL view of AES
  • 8. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 84 Table 1 below shows the CPU clock cycles taken for encryption when AES algorithm is completely written in software and when AES algorithm written in VHDL and connected with the system generated using NIOS II processor as a custom hardware. Table 1. CPU clock cycles for encryption of data AES algorithm Total time for encryption (CPU cycles) Hardware Software AES 21731020 AES as custom hardware control, inputs and outputs 26425 From the above table 1 number of clock cycles required for AES as custom hardware is very less as compared to AES in software. Hence AES as custom hardware accelerates the speed of operation. REFERENCES [1] FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, November 2001 (http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf). [2] William Stallings “Cryptography and Network Security,” 3rd Edition published by Pearson Education Inc and Dorling Kindersley Publishing Inc. Advanced Encryption Standard (AES), Nov. 26, 2001. [3] Stallings W. “Cryptography and Network Security: Principles and Practices, 4th ed., Pearson Education, Inc. pp. 63-173., 2006. [4] A. J. Elbirt, W. Yip, B. Chetwynd, and C. Paar., An FPGA implementation and performance evaluation of theAES block cipher candidate algorithm finalist., presented at Proc. 3rd AES Conf. (AES3). [Online]. Available: http://csrc.nist.gov/encryption/aes/round2/conf3/aes3papers.html [5] DAEMEN, J.—RIJMEN, V.: AES Proposal: Rijndael, The Rijndael Block Cipher, AES Proposal, pp.1–45,1999 (http://csrc.nist.gov/CryptoToolkit/aes/) [6] Altera Corporation, “Quartus II Development Software Handbook v4.0,” [Online Document],2004 February, Available HTTP: http://www.altera.com/literature/hb/qts/quartusii_handbook.pdf [7] Altera corporation, “Nios Embedded Processor, 32-Bit Programmer’s Reference Manual” [Online Document] January, 2003 Available:http://www.altera.com/literature/manual/mnl_nios_programmers32.pdf [8] Rahman T., Pan S. and Zhang Q., “Design of a High Throughput 128-bit (Rijndael BlockCipher)”,Proceeding of International Multiconferrence of Engineers and computer scientists 2010 Vol II IMECS 2010, March 17- 19,2010, Hongkong. [9] Nios II Hardware Development Tutorial, altera, December 2009 Altera Corporation Website, www.altera.com, June 2006 [10] Altera Corporation, “Nios Software Development Tutorial,” [Online Document], 2003 July, [Cited 2004 March 1], Available HTTP: http://www.altera.com/literature/tt/tt_nios_sw.pdf
  • 9. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012 85 Authors Meghana A. Hasamnis Pursuing Ph.D. from RTM Nagpur University, Nagpur, India in the field of embedded system. She is M.Tech. from VNIT, Nagpur, India. She is working as an Associate Professor at Shri. Ramdeobaba College of Engineering and Management Nagpur, India in the Department of Electronics Engineering for last 10 years. Priyanka Jambhulkar Post graduate student in the Department of Electronics Engineering at Shri. Ramdeobaba College of Engineering and Management, Nagpur, India, pursuing her M. Tech in VLSI. Done her B.E. in Electronics and Communication from Nagpur University, India. Dr. S. S. Limaye Ph.D. from Nagpur University in the faculty of Electronics Engineering. Currently he is working with JIT as a Principal. He has 38 years of experience in teaching as well as in industry. He also carried out a number of consultancy projects at DCM Data products, Delhi, PSI Data Systems Bangalore, Zen and Art New York. His area of specialization includes digital signal processing, VLSI design, LDPC codes, Embedded System, CORDIC algorithm. He is a recognized Supervisor RTM Nagpur University, Nagpur.