A Survey on VLSI Implementation of AES Algorithm with Dynamic S-Box
In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains additional techniques. However, it undergoes security threats like differential power analysis (DPA) attacks, confidential information leakage, sus...
Saved in:
| Published in | Journal of applied security research Vol. 17; no. 2; pp. 241 - 256 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Routledge
03.04.2022
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1936-1610 1936-1629 |
| DOI | 10.1080/19361610.2020.1870403 |
Cover
| Abstract | In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains additional techniques. However, it undergoes security threats like differential power analysis (DPA) attacks, confidential information leakage, suspicious data insertion, brute force attacks, and other severe attacks. Hence, the cryptographic techniques that have been implemented to enhance the security level for VLSI devices is the focus of this survey. The symmetric cryptographic technique of advanced encryption standard (AES) is considered suitable for this security enhancement and it is an advanced encryption process, and so the intelligible data are transmitted in an unintelligible form to confuse the attackers and the data is securely transmitted without any interruption. Different techniques to implement the AES approaches in VLSI devices are analyzed. The dynamic S-box technique is also analyzed for key-dependent processes. The key-dependent S-box of block ciphers is more secure than a general fixed S-box. The strength of the cipher is increased by the usage of an S-box. A dynamic S-box, generated to be key-dependent and with a discrete logarithmic approach, enhanced the S-box nonlinearity. Several measures analyzed regarding security and complexity of nonlinear transformation of S-box improved. Hence, the AES algorithm with dynamic S-box makes the system dynamic, more nonlinear, and with an unbreakable architecture. In this review, it also identified that to implement nonlinear transformation in AES, an S-box component has been used. This survey has been provided as guidelines for VLSI architecture implementation in a more secure way with cryptographic algorithm of AES and a dynamic S-box. |
|---|---|
| AbstractList | In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains additional techniques. However, it undergoes security threats like differential power analysis (DPA) attacks, confidential information leakage, suspicious data insertion, brute force attacks, and other severe attacks. Hence, the cryptographic techniques that have been implemented to enhance the security level for VLSI devices is the focus of this survey. The symmetric cryptographic technique of advanced encryption standard (AES) is considered suitable for this security enhancement and it is an advanced encryption process, and so the intelligible data are transmitted in an unintelligible form to confuse the attackers and the data is securely transmitted without any interruption. Different techniques to implement the AES approaches in VLSI devices are analyzed. The dynamic S-box technique is also analyzed for key-dependent processes. The key-dependent S-box of block ciphers is more secure than a general fixed S-box. The strength of the cipher is increased by the usage of an S-box. A dynamic S-box, generated to be key-dependent and with a discrete logarithmic approach, enhanced the S-box nonlinearity. Several measures analyzed regarding security and complexity of nonlinear transformation of S-box improved. Hence, the AES algorithm with dynamic S-box makes the system dynamic, more nonlinear, and with an unbreakable architecture. In this review, it also identified that to implement nonlinear transformation in AES, an S-box component has been used. This survey has been provided as guidelines for VLSI architecture implementation in a more secure way with cryptographic algorithm of AES and a dynamic S-box. |
| Author | Padmavathi, R. Anusha Dhanalakshmi, K. S. |
| Author_xml | – sequence: 1 givenname: K. S. surname: Dhanalakshmi fullname: Dhanalakshmi, K. S. organization: Department of ECE, School of Electronics and Electrical Technology, Kalasalingam Academy of Research and Education – sequence: 2 givenname: R. Anusha surname: Padmavathi fullname: Padmavathi, R. Anusha organization: Department of ECE, School of Electronics and Electrical Technology, Kalasalingam Academy of Research and Education |
| BookMark | eNqFkMtOwzAQRS1UJErhE5D8A4GxnafYEEqBSpVYBNhajmODUWJXTqDk73HVwoIFzGIeVzqjmXuMJtZZhdAZgXMCOVyQgqUkDRMFGqQ8gxjYAZpu9YiktJj89ASO0HHfvwEkWUJhiuYlrt79hxqxs_h5VS3xslu3qlN2EIMJmtO4XFS4bF-cN8Nrhzch45vRis5IXEXX7vMEHWrR9up0X2fo6XbxOL-PVg93y3m5iiQjMERNnqU0EQmJZVywhNVKEaJ1w_KsqRso8lrnjQxXhSAiVmlGRV1IpgpFFYGMzVCy2yu963uvNF970wk_cgJ86wT_doJvneB7JwJ3-YuTZvfd4IVp_6WvdrSx2vlObJxvGz6IsXVee2Gl6Tn7e8UX9Lx3FQ |
| CitedBy_id | crossref_primary_10_1016_j_micpro_2024_105007 crossref_primary_10_1109_ACCESS_2025_3533611 |
| Cites_doi | 10.1109/ICEEOT.2016.7755059 10.1109/ARITH.2018.8464780 10.1016/j.micpro.2019.05.015 10.1007/978-981-10-7251-2_19 10.1049/cje.2017.03.004 10.1587/elex.10.20130872 10.1109/SOCC.2018.8618487 10.1016/j.jesit.2015.04.002 10.1145/3058060.3058087 10.1109/ICISE.2016.11 10.1007/s10916-018-1145-9 10.17485/ijst/2016/v9i30/90892 10.1007/978-981-10-7251-2_24 10.1587/elex.14.20170358 10.5121/vlsic.2017.8602 10.1142/S0218126617501419 10.14419/ijet.v7i1.5.9140 10.1016/j.micpro.2017.02.003 10.3390/s20185148 10.1109/ICATCCT.2016.7912073 10.1109/CDAN.2016.7570938 10.1016/j.vlsi.2016.03.002 10.1109/ICEEOT.2016.7755647 10.5120/ijca2017913137 10.1016/j.chaos.2016.12.018 10.1109/JSSC.2017.2679618 10.1007/978-981-10-7470-7_27 10.1109/VLSI-SATA.2016.7593054 10.1007/978-981-13-7091-5_14 10.1109/VLSID.2018.96 |
| ContentType | Journal Article |
| Copyright | 2021 Taylor & Francis Group, LLC 2021 |
| Copyright_xml | – notice: 2021 Taylor & Francis Group, LLC 2021 |
| DBID | AAYXX CITATION |
| DOI | 10.1080/19361610.2020.1870403 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work |
| EISSN | 1936-1629 |
| EndPage | 256 |
| ExternalDocumentID | 10_1080_19361610_2020_1870403 1870403 |
| Genre | Research Article |
| GroupedDBID | .7I .QK 0BK 0R~ 1PW 4.4 5GY AAGDL AAHIA AAMFJ AAMIU AAPUL AAZMC ABCCY ABFIM ABJNI ABLIJ ABPEM ABTAI ABXUL ABXYU ACGFS ACTIO ACTOA ADAHI ADCVX ADKVQ AECIN AEFOU AEISY AEKEX AEMXT AEYOC AEZRU AFRVT AGDLA AGMYJ AGRBW AHDZW AIJEM AIYEW AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AQTUD AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CCCUG CQ1 DGFLZ DKSSO EBS E~B E~C G-F GTTXZ H13 HZ~ IPNFZ KYCEM LJTGL M4Z O9- PQQKQ RIG RNANH ROSJB RSYQP S-F STATR TASJS TBQAZ TDBHL TFH TFL TFW TNTFI TRJHH TUROJ TWQ ULE UT5 UT9 ~01 ~S~ AAYXX CITATION |
| ID | FETCH-LOGICAL-c310t-d87625a514c49353bee11ffd387dbd098bf8dc5200001a4e672ab9c3e9e2e1073 |
| ISSN | 1936-1610 |
| IngestDate | Thu Apr 24 22:58:07 EDT 2025 Wed Oct 01 02:51:54 EDT 2025 Mon Oct 20 23:49:48 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c310t-d87625a514c49353bee11ffd387dbd098bf8dc5200001a4e672ab9c3e9e2e1073 |
| PageCount | 16 |
| ParticipantIDs | crossref_primary_10_1080_19361610_2020_1870403 informaworld_taylorfrancis_310_1080_19361610_2020_1870403 crossref_citationtrail_10_1080_19361610_2020_1870403 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-04-03 |
| PublicationDateYYYYMMDD | 2022-04-03 |
| PublicationDate_xml | – month: 04 year: 2022 text: 2022-04-03 day: 03 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of applied security research |
| PublicationYear | 2022 |
| Publisher | Routledge |
| Publisher_xml | – name: Routledge |
| References | CIT0030 CIT0031 CIT0012 CIT0034 CIT0011 CIT0033 Ahmad N. (CIT0002) 2016; 78 Juremi J. (CIT0010) 2019; 3 Krishna B. M. (CIT0014) 2017; 115 CIT0035 CIT0013 CIT0016 CIT0038 CIT0037 CIT0018 CIT0017 CIT0039 CIT0019 CIT0041 CIT0040 CIT0021 CIT0043 CIT0020 Abdullah A. M. (CIT0001) 2017; 16 Hameed M. E. (CIT0007) 2018; 10 CIT0022 Krishnan M. N. (CIT0015) 2017; 7 Thomas K. (CIT0042) 2016; 3 Nayana G. (CIT0023) 2018; 2 Sakthivel R. (CIT0036) 2016; 16 CIT0003 CIT0025 CIT0024 CIT0005 CIT0027 Priya S. S. S. (CIT0032) 2018; 119 CIT0004 CIT0026 CIT0029 CIT0006 CIT0028 CIT0009 CIT0008 |
| References_xml | – ident: CIT0003 doi: 10.1109/ICEEOT.2016.7755059 – ident: CIT0034 doi: 10.1109/ARITH.2018.8464780 – ident: CIT0013 doi: 10.1016/j.micpro.2019.05.015 – volume: 7 issue: 2 year: 2017 ident: CIT0015 publication-title: ICTACT Journal on Soft Computing – volume: 16 start-page: 95 issue: 1 year: 2016 ident: CIT0036 publication-title: Advances in Systems Science and Applications – volume: 16 year: 2017 ident: CIT0001 publication-title: Cryptography and Network Security – ident: CIT0031 doi: 10.1007/978-981-10-7251-2_19 – ident: CIT0008 doi: 10.1049/cje.2017.03.004 – ident: CIT0038 doi: 10.1587/elex.10.20130872 – ident: CIT0028 doi: 10.1109/SOCC.2018.8618487 – ident: CIT0011 doi: 10.1016/j.jesit.2015.04.002 – ident: CIT0030 doi: 10.1145/3058060.3058087 – volume: 115 start-page: 525 issue: 7 year: 2017 ident: CIT0014 publication-title: International Journal of Pure and Applied Mathematics – ident: CIT0025 doi: 10.1109/ICISE.2016.11 – ident: CIT0021 doi: 10.1007/s10916-018-1145-9 – volume: 3 issue: 1 year: 2019 ident: CIT0010 publication-title: Journal of Applied Technology and Innovation – ident: CIT0004 doi: 10.17485/ijst/2016/v9i30/90892 – ident: CIT0009 doi: 10.1007/978-981-10-7251-2_24 – ident: CIT0018 doi: 10.1587/elex.14.20170358 – ident: CIT0037 doi: 10.5121/vlsic.2017.8602 – volume: 10 start-page: 139 issue: 1 year: 2018 ident: CIT0007 publication-title: Journal of Telecommunication, Electronic and Computer Engineering (JTEC) – ident: CIT0024 doi: 10.1142/S0218126617501419 – ident: CIT0039 – ident: CIT0041 doi: 10.14419/ijet.v7i1.5.9140 – volume: 119 start-page: 1703 issue: 16 year: 2018 ident: CIT0032 publication-title: International Journal of Pure and Applied Mathematics – volume: 2 start-page: 39 issue: 2 year: 2018 ident: CIT0023 publication-title: Perspectives in Communication, Embedded-Systems and Signal-processing-PiCES – ident: CIT0033 doi: 10.1016/j.micpro.2017.02.003 – volume: 3 start-page: 12 issue: 4 year: 2016 ident: CIT0042 publication-title: International Journal for Research in Science Engineering & Technology – volume: 78 issue: 5 year: 2016 ident: CIT0002 publication-title: Journal Teknologi – ident: CIT0043 – ident: CIT0035 doi: 10.3390/s20185148 – ident: CIT0012 – ident: CIT0020 doi: 10.1109/ICATCCT.2016.7912073 – ident: CIT0016 doi: 10.1109/CDAN.2016.7570938 – ident: CIT0017 doi: 10.1016/j.vlsi.2016.03.002 – ident: CIT0040 doi: 10.1109/ICEEOT.2016.7755647 – ident: CIT0019 doi: 10.5120/ijca2017913137 – ident: CIT0005 doi: 10.1016/j.chaos.2016.12.018 – ident: CIT0006 doi: 10.1109/JSSC.2017.2679618 – ident: CIT0026 doi: 10.1007/978-981-10-7470-7_27 – ident: CIT0029 doi: 10.1109/VLSI-SATA.2016.7593054 – ident: CIT0022 doi: 10.1007/978-981-13-7091-5_14 – ident: CIT0027 doi: 10.1109/VLSID.2018.96 |
| SSID | ssj0057520 |
| Score | 2.2498262 |
| Snippet | In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains... |
| SourceID | crossref informaworld |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 241 |
| SubjectTerms | AES differential power analysis (DPA) dynamic S-box key and discrete logarithmic approach VLSI design |
| Title | A Survey on VLSI Implementation of AES Algorithm with Dynamic S-Box |
| URI | https://www.tandfonline.com/doi/abs/10.1080/19361610.2020.1870403 |
| Volume | 17 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: aylor and Francis Online customDbUrl: mediaType: online eissn: 1936-1629 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0057520 issn: 1936-1610 databaseCode: AHDZW dateStart: 20080101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAWR databaseName: Taylor & Francis Social Science and Humanities Library - DRAA customDbUrl: eissn: 1936-1629 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0057520 issn: 1936-1610 databaseCode: TRJHH dateStart: 20040101 isFulltext: true titleUrlDefault: http://www.tandfonline.com/ providerName: Taylor & Francis |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb5wwELa2m0svVZ9q2rTyoeoFQcEGFh9pNtX2edmkiXpBxjbZKrtQsWxU9dd3jA0BNX1fEDIYkOfz-LOZ-YzQs0AQoooocgnzI5igJNLlPlduyOlM-TEDb6kTnN9_iBcn4Zuz6GwyeTuIWto1uSe-XZtX8i9WhTKwq86S_QvL9g-FAjgH-8IRLAzHP7JxCv2-voReDSb8-G752mj9bmw6UUsE06Olk67Pq_pzs9qYVde52YTeWbovq68_IafcktOt3d7OsaJA_eLxfMXhVn6xXW1MPIDnLL2r_1Fywy91XGNrQc9Jy912xYcrDDA51YEptMfEODTJuElGYxe4ovmjooZldv2i862zAYbI0FEauSs75hIjLv6DOzfxj_rJ-mUwmydQCB4mtJ83Vsq2V26gPQIu3p-ivXQx_3TaDcxATFuVzv7ju4SuxH9x7StGVGUkZDugIMe30S1rHpwaINxBE1XeRQcmwRqfqnXBa4Wf466gqi_uocMUG4zgqsQaI3iMEVwVGDCCe4xgjRFsMYJbjNxHJ6-Ojg8Xrt04wxXA1htX6iEu4sCFRchoRHOlgqAoJE1mMpc-S_IikUILbgFJ4aGKZ4TnTFDFFFEBOP0HaFpWpXqIcBIpSWQScxKJMAkllyygUe6HQhKaM38fhV0bZcKqyuvNTdZZYMVnu6bNdNNmtmn3kddX-2JkVX5XgQ0NkDXtelZhNp_J6C_rPvqPuo_RzasucYCmTb1TT4CGNvlTC6_v1WF79A |
| linkProvider | Library Specific Holdings |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8MwDI7QdoALb8RgQA6IW0ebR9ccx0vdGBzYBtyqNElh2taiqkOMX0-ytmggAQeukVy1jmt_tuzPABw7AiEVUWohZlOdoHjS4jZXFuG4qWyXaW9pBpxvbl1_QDqP9HFhFsa0VZocOsqJIua-2vzcphhdtsSdatDhaqRi6_QO6SNtcsQQflapBiM6Aav27zq-X_pjjUfm5IxGyDJS5RzPTw_6EqG-8JcuRJ6rNSDKd84bTkaNaRY2xPs3Osf_fdQ6WC2AKWzllrQBllS8Cer59C58UOOIpwqewPIgSUdb4LwFe9P0Vc1gEsP7bq8N52TDk2KeKYZJBFuXPdgaPyXpMHueQFP2hRezmE-GAvass-RtGwyuLvvnvlVsZbCEhoKZJY3_pFwDLUEYpjhUynGiSGKvKUNpMy-MPCkMm5OOgJwot4l4yARWTCGlk028AypxEqtdAD2qJJKeyxEVxCOSS-ZgGtpESIRDZtcAKW8iEAVludmcMQ6cgtm0VFpglBYUSquBxqfYS87Z8ZcAW7zmIJsXS6J8s0mAf5Xd-4fsEVj2-zfdoNu-vd4HK8hMVpimIFwHlSydqgONd7LwsDDoD-Zj7cs |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3JTsMwELVQKyEu7Iiy-oC4pSRe0vhYlqqsQpTtFnkFRJugkCLK12M3CQIk4MDV0kTJeDzzxpl5A8BWIBHShlIPMZ_aBCVSHve59gjHLe2HzHpL1-B8ehZ2r8jRLa2qCZ_LskqXQ5uCKGLsq93hflKmqojbsZgjtEDFt9kdskvW4ojj-6yH7qdCDdQvL4663codWzgy5mZ0Qp6Tqtp4fnrQlwD1hb70U-DpzABRvXJRb_LYHOaiKd--sTn-65tmwXQJS2G7sKM5MKGTebBW9O7CG903PNNwG1YLafa4APbasDfMXvQIpgm8PukdwjHV8KDsZkpgamD7oAfb_bs0e8jvB9Bd-sL9UcIHDxL2vN30dRFcdQ4u97peOZPBkxYI5p5y3pNyC7MkYZhioXUQGKNw1FJC-SwSJlLScTnZ-MeJDluICyaxZhppm2riJVBL0kQvAxhRrZCKQo6oJBFRXLEAU-ETqRAWzG8AUm1ELEvCcjc3ox8HJa9ppbTYKS0uldYAzQ-xp4Kx4y8B9nmX43x8VWKKuSYx_lV25R-ym2DyfL8TnxyeHa-CKeTaKlxFEF4DtTwb6nULdnKxUZrzO_Fd7G8 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Survey+on+VLSI+Implementation+of+AES+Algorithm+with+Dynamic+S-Box&rft.jtitle=Journal+of+applied+security+research&rft.au=Dhanalakshmi%2C+K.+S.&rft.au=Padmavathi%2C+R.+Anusha&rft.date=2022-04-03&rft.pub=Routledge&rft.issn=1936-1610&rft.eissn=1936-1629&rft.volume=17&rft.issue=2&rft.spage=241&rft.epage=256&rft_id=info:doi/10.1080%2F19361610.2020.1870403&rft.externalDocID=1870403 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1936-1610&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1936-1610&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1936-1610&client=summon |