A Survey on VLSI Implementation of AES Algorithm with Dynamic S-Box

In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains additional techniques. However, it undergoes security threats like differential power analysis (DPA) attacks, confidential information leakage, sus...

Full description

Saved in:
Bibliographic Details
Published inJournal of applied security research Vol. 17; no. 2; pp. 241 - 256
Main Authors Dhanalakshmi, K. S., Padmavathi, R. Anusha
Format Journal Article
LanguageEnglish
Published Routledge 03.04.2022
Subjects
Online AccessGet full text
ISSN1936-1610
1936-1629
DOI10.1080/19361610.2020.1870403

Cover

Abstract In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains additional techniques. However, it undergoes security threats like differential power analysis (DPA) attacks, confidential information leakage, suspicious data insertion, brute force attacks, and other severe attacks. Hence, the cryptographic techniques that have been implemented to enhance the security level for VLSI devices is the focus of this survey. The symmetric cryptographic technique of advanced encryption standard (AES) is considered suitable for this security enhancement and it is an advanced encryption process, and so the intelligible data are transmitted in an unintelligible form to confuse the attackers and the data is securely transmitted without any interruption. Different techniques to implement the AES approaches in VLSI devices are analyzed. The dynamic S-box technique is also analyzed for key-dependent processes. The key-dependent S-box of block ciphers is more secure than a general fixed S-box. The strength of the cipher is increased by the usage of an S-box. A dynamic S-box, generated to be key-dependent and with a discrete logarithmic approach, enhanced the S-box nonlinearity. Several measures analyzed regarding security and complexity of nonlinear transformation of S-box improved. Hence, the AES algorithm with dynamic S-box makes the system dynamic, more nonlinear, and with an unbreakable architecture. In this review, it also identified that to implement nonlinear transformation in AES, an S-box component has been used. This survey has been provided as guidelines for VLSI architecture implementation in a more secure way with cryptographic algorithm of AES and a dynamic S-box.
AbstractList In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains additional techniques. However, it undergoes security threats like differential power analysis (DPA) attacks, confidential information leakage, suspicious data insertion, brute force attacks, and other severe attacks. Hence, the cryptographic techniques that have been implemented to enhance the security level for VLSI devices is the focus of this survey. The symmetric cryptographic technique of advanced encryption standard (AES) is considered suitable for this security enhancement and it is an advanced encryption process, and so the intelligible data are transmitted in an unintelligible form to confuse the attackers and the data is securely transmitted without any interruption. Different techniques to implement the AES approaches in VLSI devices are analyzed. The dynamic S-box technique is also analyzed for key-dependent processes. The key-dependent S-box of block ciphers is more secure than a general fixed S-box. The strength of the cipher is increased by the usage of an S-box. A dynamic S-box, generated to be key-dependent and with a discrete logarithmic approach, enhanced the S-box nonlinearity. Several measures analyzed regarding security and complexity of nonlinear transformation of S-box improved. Hence, the AES algorithm with dynamic S-box makes the system dynamic, more nonlinear, and with an unbreakable architecture. In this review, it also identified that to implement nonlinear transformation in AES, an S-box component has been used. This survey has been provided as guidelines for VLSI architecture implementation in a more secure way with cryptographic algorithm of AES and a dynamic S-box.
Author Padmavathi, R. Anusha
Dhanalakshmi, K. S.
Author_xml – sequence: 1
  givenname: K. S.
  surname: Dhanalakshmi
  fullname: Dhanalakshmi, K. S.
  organization: Department of ECE, School of Electronics and Electrical Technology, Kalasalingam Academy of Research and Education
– sequence: 2
  givenname: R. Anusha
  surname: Padmavathi
  fullname: Padmavathi, R. Anusha
  organization: Department of ECE, School of Electronics and Electrical Technology, Kalasalingam Academy of Research and Education
BookMark eNqFkMtOwzAQRS1UJErhE5D8A4GxnafYEEqBSpVYBNhajmODUWJXTqDk73HVwoIFzGIeVzqjmXuMJtZZhdAZgXMCOVyQgqUkDRMFGqQ8gxjYAZpu9YiktJj89ASO0HHfvwEkWUJhiuYlrt79hxqxs_h5VS3xslu3qlN2EIMJmtO4XFS4bF-cN8Nrhzch45vRis5IXEXX7vMEHWrR9up0X2fo6XbxOL-PVg93y3m5iiQjMERNnqU0EQmJZVywhNVKEaJ1w_KsqRso8lrnjQxXhSAiVmlGRV1IpgpFFYGMzVCy2yu963uvNF970wk_cgJ86wT_doJvneB7JwJ3-YuTZvfd4IVp_6WvdrSx2vlObJxvGz6IsXVee2Gl6Tn7e8UX9Lx3FQ
CitedBy_id crossref_primary_10_1016_j_micpro_2024_105007
crossref_primary_10_1109_ACCESS_2025_3533611
Cites_doi 10.1109/ICEEOT.2016.7755059
10.1109/ARITH.2018.8464780
10.1016/j.micpro.2019.05.015
10.1007/978-981-10-7251-2_19
10.1049/cje.2017.03.004
10.1587/elex.10.20130872
10.1109/SOCC.2018.8618487
10.1016/j.jesit.2015.04.002
10.1145/3058060.3058087
10.1109/ICISE.2016.11
10.1007/s10916-018-1145-9
10.17485/ijst/2016/v9i30/90892
10.1007/978-981-10-7251-2_24
10.1587/elex.14.20170358
10.5121/vlsic.2017.8602
10.1142/S0218126617501419
10.14419/ijet.v7i1.5.9140
10.1016/j.micpro.2017.02.003
10.3390/s20185148
10.1109/ICATCCT.2016.7912073
10.1109/CDAN.2016.7570938
10.1016/j.vlsi.2016.03.002
10.1109/ICEEOT.2016.7755647
10.5120/ijca2017913137
10.1016/j.chaos.2016.12.018
10.1109/JSSC.2017.2679618
10.1007/978-981-10-7470-7_27
10.1109/VLSI-SATA.2016.7593054
10.1007/978-981-13-7091-5_14
10.1109/VLSID.2018.96
ContentType Journal Article
Copyright 2021 Taylor & Francis Group, LLC 2021
Copyright_xml – notice: 2021 Taylor & Francis Group, LLC 2021
DBID AAYXX
CITATION
DOI 10.1080/19361610.2020.1870403
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
EISSN 1936-1629
EndPage 256
ExternalDocumentID 10_1080_19361610_2020_1870403
1870403
Genre Research Article
GroupedDBID .7I
.QK
0BK
0R~
1PW
4.4
5GY
AAGDL
AAHIA
AAMFJ
AAMIU
AAPUL
AAZMC
ABCCY
ABFIM
ABJNI
ABLIJ
ABPEM
ABTAI
ABXUL
ABXYU
ACGFS
ACTIO
ACTOA
ADAHI
ADCVX
ADKVQ
AECIN
AEFOU
AEISY
AEKEX
AEMXT
AEYOC
AEZRU
AFRVT
AGDLA
AGMYJ
AGRBW
AHDZW
AIJEM
AIYEW
AKBVH
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AQTUD
AVBZW
AWYRJ
BEJHT
BLEHA
BMOTO
BOHLJ
CCCUG
CQ1
DGFLZ
DKSSO
EBS
E~B
E~C
G-F
GTTXZ
H13
HZ~
IPNFZ
KYCEM
LJTGL
M4Z
O9-
PQQKQ
RIG
RNANH
ROSJB
RSYQP
S-F
STATR
TASJS
TBQAZ
TDBHL
TFH
TFL
TFW
TNTFI
TRJHH
TUROJ
TWQ
ULE
UT5
UT9
~01
~S~
AAYXX
CITATION
ID FETCH-LOGICAL-c310t-d87625a514c49353bee11ffd387dbd098bf8dc5200001a4e672ab9c3e9e2e1073
ISSN 1936-1610
IngestDate Thu Apr 24 22:58:07 EDT 2025
Wed Oct 01 02:51:54 EDT 2025
Mon Oct 20 23:49:48 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c310t-d87625a514c49353bee11ffd387dbd098bf8dc5200001a4e672ab9c3e9e2e1073
PageCount 16
ParticipantIDs crossref_primary_10_1080_19361610_2020_1870403
informaworld_taylorfrancis_310_1080_19361610_2020_1870403
crossref_citationtrail_10_1080_19361610_2020_1870403
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-04-03
PublicationDateYYYYMMDD 2022-04-03
PublicationDate_xml – month: 04
  year: 2022
  text: 2022-04-03
  day: 03
PublicationDecade 2020
PublicationTitle Journal of applied security research
PublicationYear 2022
Publisher Routledge
Publisher_xml – name: Routledge
References CIT0030
CIT0031
CIT0012
CIT0034
CIT0011
CIT0033
Ahmad N. (CIT0002) 2016; 78
Juremi J. (CIT0010) 2019; 3
Krishna B. M. (CIT0014) 2017; 115
CIT0035
CIT0013
CIT0016
CIT0038
CIT0037
CIT0018
CIT0017
CIT0039
CIT0019
CIT0041
CIT0040
CIT0021
CIT0043
CIT0020
Abdullah A. M. (CIT0001) 2017; 16
Hameed M. E. (CIT0007) 2018; 10
CIT0022
Krishnan M. N. (CIT0015) 2017; 7
Thomas K. (CIT0042) 2016; 3
Nayana G. (CIT0023) 2018; 2
Sakthivel R. (CIT0036) 2016; 16
CIT0003
CIT0025
CIT0024
CIT0005
CIT0027
Priya S. S. S. (CIT0032) 2018; 119
CIT0004
CIT0026
CIT0029
CIT0006
CIT0028
CIT0009
CIT0008
References_xml – ident: CIT0003
  doi: 10.1109/ICEEOT.2016.7755059
– ident: CIT0034
  doi: 10.1109/ARITH.2018.8464780
– ident: CIT0013
  doi: 10.1016/j.micpro.2019.05.015
– volume: 7
  issue: 2
  year: 2017
  ident: CIT0015
  publication-title: ICTACT Journal on Soft Computing
– volume: 16
  start-page: 95
  issue: 1
  year: 2016
  ident: CIT0036
  publication-title: Advances in Systems Science and Applications
– volume: 16
  year: 2017
  ident: CIT0001
  publication-title: Cryptography and Network Security
– ident: CIT0031
  doi: 10.1007/978-981-10-7251-2_19
– ident: CIT0008
  doi: 10.1049/cje.2017.03.004
– ident: CIT0038
  doi: 10.1587/elex.10.20130872
– ident: CIT0028
  doi: 10.1109/SOCC.2018.8618487
– ident: CIT0011
  doi: 10.1016/j.jesit.2015.04.002
– ident: CIT0030
  doi: 10.1145/3058060.3058087
– volume: 115
  start-page: 525
  issue: 7
  year: 2017
  ident: CIT0014
  publication-title: International Journal of Pure and Applied Mathematics
– ident: CIT0025
  doi: 10.1109/ICISE.2016.11
– ident: CIT0021
  doi: 10.1007/s10916-018-1145-9
– volume: 3
  issue: 1
  year: 2019
  ident: CIT0010
  publication-title: Journal of Applied Technology and Innovation
– ident: CIT0004
  doi: 10.17485/ijst/2016/v9i30/90892
– ident: CIT0009
  doi: 10.1007/978-981-10-7251-2_24
– ident: CIT0018
  doi: 10.1587/elex.14.20170358
– ident: CIT0037
  doi: 10.5121/vlsic.2017.8602
– volume: 10
  start-page: 139
  issue: 1
  year: 2018
  ident: CIT0007
  publication-title: Journal of Telecommunication, Electronic and Computer Engineering (JTEC)
– ident: CIT0024
  doi: 10.1142/S0218126617501419
– ident: CIT0039
– ident: CIT0041
  doi: 10.14419/ijet.v7i1.5.9140
– volume: 119
  start-page: 1703
  issue: 16
  year: 2018
  ident: CIT0032
  publication-title: International Journal of Pure and Applied Mathematics
– volume: 2
  start-page: 39
  issue: 2
  year: 2018
  ident: CIT0023
  publication-title: Perspectives in Communication, Embedded-Systems and Signal-processing-PiCES
– ident: CIT0033
  doi: 10.1016/j.micpro.2017.02.003
– volume: 3
  start-page: 12
  issue: 4
  year: 2016
  ident: CIT0042
  publication-title: International Journal for Research in Science Engineering & Technology
– volume: 78
  issue: 5
  year: 2016
  ident: CIT0002
  publication-title: Journal Teknologi
– ident: CIT0043
– ident: CIT0035
  doi: 10.3390/s20185148
– ident: CIT0012
– ident: CIT0020
  doi: 10.1109/ICATCCT.2016.7912073
– ident: CIT0016
  doi: 10.1109/CDAN.2016.7570938
– ident: CIT0017
  doi: 10.1016/j.vlsi.2016.03.002
– ident: CIT0040
  doi: 10.1109/ICEEOT.2016.7755647
– ident: CIT0019
  doi: 10.5120/ijca2017913137
– ident: CIT0005
  doi: 10.1016/j.chaos.2016.12.018
– ident: CIT0006
  doi: 10.1109/JSSC.2017.2679618
– ident: CIT0026
  doi: 10.1007/978-981-10-7470-7_27
– ident: CIT0029
  doi: 10.1109/VLSI-SATA.2016.7593054
– ident: CIT0022
  doi: 10.1007/978-981-13-7091-5_14
– ident: CIT0027
  doi: 10.1109/VLSID.2018.96
SSID ssj0057520
Score 2.2498262
Snippet In recent research, very large-scale integration (VLSI) design and its implementation plays a major role. It has been considered as compact and contains...
SourceID crossref
informaworld
SourceType Enrichment Source
Index Database
Publisher
StartPage 241
SubjectTerms AES
differential power analysis (DPA)
dynamic S-box
key and discrete logarithmic approach
VLSI design
Title A Survey on VLSI Implementation of AES Algorithm with Dynamic S-Box
URI https://www.tandfonline.com/doi/abs/10.1080/19361610.2020.1870403
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: aylor and Francis Online
  customDbUrl:
  mediaType: online
  eissn: 1936-1629
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0057520
  issn: 1936-1610
  databaseCode: AHDZW
  dateStart: 20080101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAWR
  databaseName: Taylor & Francis Social Science and Humanities Library - DRAA
  customDbUrl:
  eissn: 1936-1629
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0057520
  issn: 1936-1610
  databaseCode: TRJHH
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: http://www.tandfonline.com/
  providerName: Taylor & Francis
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb5wwELa2m0svVZ9q2rTyoeoFQcEGFh9pNtX2edmkiXpBxjbZKrtQsWxU9dd3jA0BNX1fEDIYkOfz-LOZ-YzQs0AQoooocgnzI5igJNLlPlduyOlM-TEDb6kTnN9_iBcn4Zuz6GwyeTuIWto1uSe-XZtX8i9WhTKwq86S_QvL9g-FAjgH-8IRLAzHP7JxCv2-voReDSb8-G752mj9bmw6UUsE06Olk67Pq_pzs9qYVde52YTeWbovq68_IafcktOt3d7OsaJA_eLxfMXhVn6xXW1MPIDnLL2r_1Fywy91XGNrQc9Jy912xYcrDDA51YEptMfEODTJuElGYxe4ovmjooZldv2i862zAYbI0FEauSs75hIjLv6DOzfxj_rJ-mUwmydQCB4mtJ83Vsq2V26gPQIu3p-ivXQx_3TaDcxATFuVzv7ju4SuxH9x7StGVGUkZDugIMe30S1rHpwaINxBE1XeRQcmwRqfqnXBa4Wf466gqi_uocMUG4zgqsQaI3iMEVwVGDCCe4xgjRFsMYJbjNxHJ6-Ojg8Xrt04wxXA1htX6iEu4sCFRchoRHOlgqAoJE1mMpc-S_IikUILbgFJ4aGKZ4TnTFDFFFEBOP0HaFpWpXqIcBIpSWQScxKJMAkllyygUe6HQhKaM38fhV0bZcKqyuvNTdZZYMVnu6bNdNNmtmn3kddX-2JkVX5XgQ0NkDXtelZhNp_J6C_rPvqPuo_RzasucYCmTb1TT4CGNvlTC6_v1WF79A
linkProvider Library Specific Holdings
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8MwDI7QdoALb8RgQA6IW0ebR9ccx0vdGBzYBtyqNElh2taiqkOMX0-ytmggAQeukVy1jmt_tuzPABw7AiEVUWohZlOdoHjS4jZXFuG4qWyXaW9pBpxvbl1_QDqP9HFhFsa0VZocOsqJIua-2vzcphhdtsSdatDhaqRi6_QO6SNtcsQQflapBiM6Aav27zq-X_pjjUfm5IxGyDJS5RzPTw_6EqG-8JcuRJ6rNSDKd84bTkaNaRY2xPs3Osf_fdQ6WC2AKWzllrQBllS8Cer59C58UOOIpwqewPIgSUdb4LwFe9P0Vc1gEsP7bq8N52TDk2KeKYZJBFuXPdgaPyXpMHueQFP2hRezmE-GAvass-RtGwyuLvvnvlVsZbCEhoKZJY3_pFwDLUEYpjhUynGiSGKvKUNpMy-MPCkMm5OOgJwot4l4yARWTCGlk028AypxEqtdAD2qJJKeyxEVxCOSS-ZgGtpESIRDZtcAKW8iEAVludmcMQ6cgtm0VFpglBYUSquBxqfYS87Z8ZcAW7zmIJsXS6J8s0mAf5Xd-4fsEVj2-zfdoNu-vd4HK8hMVpimIFwHlSydqgONd7LwsDDoD-Zj7cs
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3JTsMwELVQKyEu7Iiy-oC4pSRe0vhYlqqsQpTtFnkFRJugkCLK12M3CQIk4MDV0kTJeDzzxpl5A8BWIBHShlIPMZ_aBCVSHve59gjHLe2HzHpL1-B8ehZ2r8jRLa2qCZ_LskqXQ5uCKGLsq93hflKmqojbsZgjtEDFt9kdskvW4ojj-6yH7qdCDdQvL4663codWzgy5mZ0Qp6Tqtp4fnrQlwD1hb70U-DpzABRvXJRb_LYHOaiKd--sTn-65tmwXQJS2G7sKM5MKGTebBW9O7CG903PNNwG1YLafa4APbasDfMXvQIpgm8PukdwjHV8KDsZkpgamD7oAfb_bs0e8jvB9Bd-sL9UcIHDxL2vN30dRFcdQ4u97peOZPBkxYI5p5y3pNyC7MkYZhioXUQGKNw1FJC-SwSJlLScTnZ-MeJDluICyaxZhppm2riJVBL0kQvAxhRrZCKQo6oJBFRXLEAU-ETqRAWzG8AUm1ELEvCcjc3ox8HJa9ppbTYKS0uldYAzQ-xp4Kx4y8B9nmX43x8VWKKuSYx_lV25R-ym2DyfL8TnxyeHa-CKeTaKlxFEF4DtTwb6nULdnKxUZrzO_Fd7G8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Survey+on+VLSI+Implementation+of+AES+Algorithm+with+Dynamic+S-Box&rft.jtitle=Journal+of+applied+security+research&rft.au=Dhanalakshmi%2C+K.+S.&rft.au=Padmavathi%2C+R.+Anusha&rft.date=2022-04-03&rft.pub=Routledge&rft.issn=1936-1610&rft.eissn=1936-1629&rft.volume=17&rft.issue=2&rft.spage=241&rft.epage=256&rft_id=info:doi/10.1080%2F19361610.2020.1870403&rft.externalDocID=1870403
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1936-1610&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1936-1610&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1936-1610&client=summon