A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays
The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile, securing voice communications is a challenging task. In the literature, there are some methods found using oscillators and chaotic signals fo...
Saved in:
| Published in | Journal of King Saud University. Computer and information sciences Vol. 34; no. 6; pp. 3878 - 3885 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.06.2022
Elsevier |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1319-1578 2213-1248 2213-1248 |
| DOI | 10.1016/j.jksuci.2020.08.005 |
Cover
| Abstract | The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile, securing voice communications is a challenging task. In the literature, there are some methods found using oscillators and chaotic signals for protecting direct voice communications, but they have limited functionalities due to synchronization problems between chaotic signals and oscillators. This paper gives an idea of encrypting voice signals over peer to peer communication with the help of a modified and lightweight AES algorithm. This algorithm is similar to the traditional AES algorithm in most of the aspects but does not imply the use of mix column that is used in the traditional AES algorithm. The lightweight algorithm is tested on two different Field Programmable Gate Array (FPGA) and the designs are analyzed with respect to time delay and effective utilization of resources. |
|---|---|
| AbstractList | The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile, securing voice communications is a challenging task. In the literature, there are some methods found using oscillators and chaotic signals for protecting direct voice communications, but they have limited functionalities due to synchronization problems between chaotic signals and oscillators. This paper gives an idea of encrypting voice signals over peer to peer communication with the help of a modified and lightweight AES algorithm. This algorithm is similar to the traditional AES algorithm in most of the aspects but does not imply the use of mix column that is used in the traditional AES algorithm. The lightweight algorithm is tested on two different Field Programmable Gate Array (FPGA) and the designs are analyzed with respect to time delay and effective utilization of resources. |
| Author | Kumar, Keshav Ramkumar, K.R. Kaur, Amanpreet |
| Author_xml | – sequence: 1 givenname: Keshav surname: Kumar fullname: Kumar, Keshav email: keshav.kumar@chitkara.edu.in – sequence: 2 givenname: K.R. surname: Ramkumar fullname: Ramkumar, K.R. email: k.ramkumar@chitkara.edu.in – sequence: 3 givenname: Amanpreet surname: Kaur fullname: Kaur, Amanpreet email: amanpreet.kaur@chitkara.edu.in |
| BookMark | eNqNkc1u1DAYRS1UJIbSN2DhF8jg3_ywQBpVBSpVYgGsLcf-nDo4cWR7Ws3bN0NQF10AG1v-pHts3_MWXcxxBoTeU7KnhNYfxv34Kx-N3zPCyJ60e0LkK7RjjPKKMtFeoB3ltKuobNo36CrnkRBCm1oKXu_QdMDBD_flEc4rPtx8xzoMMflyP2E_LQEmmIsuPs7YxYRhNum0FD8P-CF6A3iCnPUAGR_zeeg8BIuXFIekp0n3AfCgC2Cdkj7ld-i10yHD1Z_9Ev38fPPj-mt19-3L7fXhrjKiFaUS61OJEbajtnOkbaUlvCWO1n1tgRJYT511te0Y67teUtY3vKeu5wyamjrOL9HtxrVRj2pJftLppKL26vcgpkHpVLwJoDTjVFpDaisa4WTXa97JtddGUymsbFaW3FjHedGnRx3CM5ASdVagRrUpUGcFirRqVbDmPm45k2LOCZwyfiuyJO3Dv8LiRfg_7_y0xWAt98FDUtn4VRlYn8CU9ff-74AnuEe4_g |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3518533 crossref_primary_10_3389_fmech_2024_1406559 crossref_primary_10_1016_j_cstp_2021_06_014 crossref_primary_10_1007_s10470_025_02343_x crossref_primary_10_3103_S0146411622080028 crossref_primary_10_1007_s11760_023_02831_5 crossref_primary_10_1007_s40866_024_00192_7 crossref_primary_10_1007_s10836_022_05997_x |
| Cites_doi | 10.1109/JSAC.1984.1146071 10.1109/ICCCNT45670.2019.8944857 10.1007/s11277-016-3385-7 10.1016/j.csi.2019.04.002 10.1007/s11042-016-4333-y 10.1109/ISIVC.2016.7893960 10.1016/j.procs.2018.03.011 10.1007/10721064_26 10.1109/ISESD.2018.8605446 10.1016/j.compeleceng.2009.12.011 10.1049/ip-f-1.1983.0066 10.1016/j.sbspro.2015.02.299 10.1109/INVENTIVE.2016.7830170 10.1007/s10617-017-9189-5 10.1016/j.ijleo.2015.11.188 10.1109/JSSC.2004.829377 10.1371/journal.pone.0209618 10.1109/DDECS.2007.4295295 10.1109/ASSCC.2018.8579273 10.1016/j.optcom.2017.04.015 10.1504/IJMIC.2017.085934 10.1007/s11227-019-02878-7 10.11591/ijeecs.v11.i3.pp942-948 10.1016/j.micpro.2015.12.002 |
| ContentType | Journal Article |
| Copyright | 2020 The Authors |
| Copyright_xml | – notice: 2020 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION ADTOC UNPAY DOA |
| DOI | 10.1016/j.jksuci.2020.08.005 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2213-1248 |
| EndPage | 3885 |
| ExternalDocumentID | oai_doaj_org_article_a2315dc06d474f59ba3950167a154d57 10.1016/j.jksuci.2020.08.005 10_1016_j_jksuci_2020_08_005 S1319157820304316 |
| GroupedDBID | --K 0R~ 0SF 4.4 457 5VS 6I. AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQXK AAXUO ABMAC ACGFS ADBBV ADEZE AEXQZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ ASPBG AVWKF AZFZN BCNDV EBS EJD FDB FEDTE FGOYB GROUPED_DOAJ HVGLF HZ~ IPNFZ IXB KQ8 M41 NCXOZ O-L O9- OK1 R2- RIG ROL SES SSZ XH2 AAJSJ AASML AAYWO AAYXX ABEEZ ABWVN ACULB ADVLN AFGXO AFJKZ AGQPQ APXCP BGLVJ C6C CCPQU CITATION K7- PHGZM PHGZT PIMPY PQGLB SOJ ADTOC UNPAY |
| ID | FETCH-LOGICAL-c484t-45780c4d91d9f0885d0380f16b6de10e0389df6d922b9b512b73b1fb32e761f33 |
| IEDL.DBID | IXB |
| ISSN | 1319-1578 2213-1248 |
| IngestDate | Fri Oct 03 12:53:07 EDT 2025 Tue Aug 19 22:06:27 EDT 2025 Thu Apr 24 22:56:55 EDT 2025 Wed Oct 01 05:02:23 EDT 2025 Fri Feb 23 02:38:56 EST 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | Lightweight AES algorithm Mix column and FPGA Voice encryption AES algorithm |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. cc-by-nc-nd |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c484t-45780c4d91d9f0885d0380f16b6de10e0389df6d922b9b512b73b1fb32e761f33 |
| OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S1319157820304316 |
| PageCount | 8 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_a2315dc06d474f59ba3950167a154d57 unpaywall_primary_10_1016_j_jksuci_2020_08_005 crossref_citationtrail_10_1016_j_jksuci_2020_08_005 crossref_primary_10_1016_j_jksuci_2020_08_005 elsevier_sciencedirect_doi_10_1016_j_jksuci_2020_08_005 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | June 2022 2022-06-00 2022-06-01 |
| PublicationDateYYYYMMDD | 2022-06-01 |
| PublicationDate_xml | – month: 06 year: 2022 text: June 2022 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of King Saud University. Computer and information sciences |
| PublicationYear | 2022 |
| Publisher | Elsevier B.V Elsevier |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier |
| References | Guillén-Fernández, Meléndez-Cano, Tlelo-Cuautle, Núñez-Pérez, Rangel-Magdaleno (b0055) 2019; 14 Bedoui, M., Mestiri, H., Bouallegue, B., Machhout, M., 2016, November. A reliable fault detection scheme for the AES hardware implementation. In: 2016 International Symposium on Signal, Image, Video and Communications (ISIVC). IEEE, pp. 47–52. Gamido, Sison, Medina (b0040) 2018; 11 Singh, Dod (b0100) 2016; 2016 Venkatesha, G., Dinesh, S., Manjunath, M., 2019. AES Based Algorithm for Image Encryption and Decryption. Perspectives in Communication, Embedded-systems and Signal-processing-PiCES, 2 (11), 342–345. Liu, Xiao, Zhang, Bi, Zhang, Fang, Hu (b0065) 2017; 398 Kak, S.C., 1983, August. Overview of analogue signal encryption. In: IEE Proceedings F-Communications, Radar and Signal Processing, Vol. 130, No. 5 IET, pp. 399–404. Kumar, Karthigaikumar (b0125) 2018; 22 Ebrahim, M., Khan, S., Khalid, U.B., 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398. Slimani, Merazka (b0075) 2018; 128 Donzellini, Oneto, Ponta, Anguita (b0090) 2019 Vanhoef, Piessens (b0030) 2017 Daemen, J., Rijmen, V., 2000. Advanced Encryption Standard (AES), 2001. The block cipher Rijndael, 1820, 277–284. Arab, Rostami, Ghavami (b0150) 2019; 75 Luschas, Schreier, Lee (b0060) 2004; 39 Aljawarneh, Yassein (b0025) 2017; 76 Vaidyanathan, S., Sambas, A., Mamat, M., WS, M.S., 2017. Analysis, synchronisation and circuit implementation of a novel jerk chaotic system and its application for voice encryption. Int. J. Model. Identification Control, 28 (2), 153–166. Zodpe, Sapkal (b0135) 2020; 32 Mohsin, Zaidan, Zaidan, Albahri, Albahri, Alsalem, Mohammed (b0020) 2019; 66 Mondal, S., Sharma, R.K., 2019, July. Application of Advanced Encryption Standard on Real Time Secured Voice Communication using FPGA. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp. 1–6. Mestiri, Kahri, Bouallegue, Machhout (b0110) 2016; 41 Gadde, V.V., Awano, H., Ikeda, M., 2018, November. An encryption-authentication unified A/D conversion scheme for IoT sensor nodes. In: 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC). IEEE, pp. 123–126. Farooq, Aslam (b0105) 2017; 29 Priya, Karthigaikumar, Mangai, Das (b0130) 2017; 94 Kumar, Rana (b0145) 2016; 127 Petrescu, Păvăloiu, Drăgoi (b0095) 2015; 180 Algredo-Badillo, Feregrino-Uribe, Cumplido, Morales-Sandoval (b0140) 2010; 36 Gersho (b0045) 1984; 2 Katkade, P., Phade, G.M., 2016. Application of AES algorithm for data security in serial communication. In: 2016 International Conference on Inventive Computation Technologies (ICICT), Vol. 3. IEEE, pp. 1–5. Riyadi, M.A., Pandapotan, N., Khafid, M.R.A., Prakoso, T., 2018, October. FPGA-based 128-bit Chaotic Encryption Method for Voice Communication. In: 2018 International Symposium on Electronics and Smart Devices (ISESD). IEEE, pp. 1–5. Circ Di Natale, G., Flottes, M.L., Rouzeyre, B., 2007, April. A novel parity bit scheme for SBox in AES circuits. In: 2007 IEEE Design and Diagnostics of Electronic Circuits and Systems. IEEE, pp. 1–5. Mohsin (10.1016/j.jksuci.2020.08.005_b0020) 2019; 66 Priya (10.1016/j.jksuci.2020.08.005_b0130) 2017; 94 Vanhoef (10.1016/j.jksuci.2020.08.005_b0030) 2017 Singh (10.1016/j.jksuci.2020.08.005_b0100) 2016; 2016 Kumar (10.1016/j.jksuci.2020.08.005_b0125) 2018; 22 Liu (10.1016/j.jksuci.2020.08.005_b0065) 2017; 398 10.1016/j.jksuci.2020.08.005_b0010 10.1016/j.jksuci.2020.08.005_b0070 Luschas (10.1016/j.jksuci.2020.08.005_b0060) 2004; 39 10.1016/j.jksuci.2020.08.005_b0050 10.1016/j.jksuci.2020.08.005_b0005 Gamido (10.1016/j.jksuci.2020.08.005_b0040) 2018; 11 Farooq (10.1016/j.jksuci.2020.08.005_b0105) 2017; 29 Zodpe (10.1016/j.jksuci.2020.08.005_b0135) 2020; 32 Arab (10.1016/j.jksuci.2020.08.005_b0150) 2019; 75 Mestiri (10.1016/j.jksuci.2020.08.005_b0110) 2016; 41 Kumar (10.1016/j.jksuci.2020.08.005_b0145) 2016; 127 Slimani (10.1016/j.jksuci.2020.08.005_b0075) 2018; 128 10.1016/j.jksuci.2020.08.005_b0080 Donzellini (10.1016/j.jksuci.2020.08.005_b0090) 2019 Gersho (10.1016/j.jksuci.2020.08.005_b0045) 1984; 2 10.1016/j.jksuci.2020.08.005_b0085 10.1016/j.jksuci.2020.08.005_b0120 Petrescu (10.1016/j.jksuci.2020.08.005_b0095) 2015; 180 Guillén-Fernández (10.1016/j.jksuci.2020.08.005_b0055) 2019; 14 10.1016/j.jksuci.2020.08.005_b0115 10.1016/j.jksuci.2020.08.005_b0155 10.1016/j.jksuci.2020.08.005_b0035 Algredo-Badillo (10.1016/j.jksuci.2020.08.005_b0140) 2010; 36 10.1016/j.jksuci.2020.08.005_b0015 Aljawarneh (10.1016/j.jksuci.2020.08.005_b0025) 2017; 76 |
| References_xml | – volume: 66 year: 2019 ident: b0020 article-title: Based blockchain-PSO-AES techniques in finger vein biometrics: a novel verification secure framework for patient authentication publication-title: Computer Standards Interfaces – volume: 14 year: 2019 ident: b0055 article-title: On the synchronization techniques of chaotic oscillators and their FPGA-based implementation for secure image transmission publication-title: PLoS ONE – volume: 94 start-page: 2259 year: 2017 end-page: 2273 ident: b0130 article-title: An efficient hardware architecture for high throughput AES encryptor using MUX based sub pipelined S-box publication-title: Wireless Pers. Commun. – start-page: 1313 year: 2017 end-page: 1328 ident: b0030 article-title: Key reinstallation attacks: forcing nonce reuse in WPA2 publication-title: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security – reference: Mondal, S., Sharma, R.K., 2019, July. Application of Advanced Encryption Standard on Real Time Secured Voice Communication using FPGA. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp. 1–6. – volume: 76 start-page: 22703 year: 2017 end-page: 22724 ident: b0025 article-title: A resource-efficient encryption algorithm for multimedia big data publication-title: Multimedia Tools Appl. – reference: Gadde, V.V., Awano, H., Ikeda, M., 2018, November. An encryption-authentication unified A/D conversion scheme for IoT sensor nodes. In: 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC). IEEE, pp. 123–126. – reference: Katkade, P., Phade, G.M., 2016. Application of AES algorithm for data security in serial communication. In: 2016 International Conference on Inventive Computation Technologies (ICICT), Vol. 3. IEEE, pp. 1–5. – reference: Riyadi, M.A., Pandapotan, N., Khafid, M.R.A., Prakoso, T., 2018, October. FPGA-based 128-bit Chaotic Encryption Method for Voice Communication. In: 2018 International Symposium on Electronics and Smart Devices (ISESD). IEEE, pp. 1–5. – volume: 75 start-page: 6663 year: 2019 end-page: 6682 ident: b0150 article-title: An image encryption method based on chaos system and AES algorithm publication-title: J. Supercomputing – volume: 127 start-page: 2341 year: 2016 end-page: 2345 ident: b0145 article-title: Development of modified AES algorithm for data security publication-title: Optik – reference: Ebrahim, M., Khan, S., Khalid, U.B., 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398. – reference: Circ Di Natale, G., Flottes, M.L., Rouzeyre, B., 2007, April. A novel parity bit scheme for SBox in AES circuits. In: 2007 IEEE Design and Diagnostics of Electronic Circuits and Systems. IEEE, pp. 1–5. – volume: 2016 start-page: 789 year: 2016 ident: b0100 article-title: An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm publication-title: IACR Cryptol. ePrint Arch. – reference: Bedoui, M., Mestiri, H., Bouallegue, B., Machhout, M., 2016, November. A reliable fault detection scheme for the AES hardware implementation. In: 2016 International Symposium on Signal, Image, Video and Communications (ISIVC). IEEE, pp. 47–52. – volume: 29 start-page: 295 year: 2017 end-page: 302 ident: b0105 article-title: Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA publication-title: J. King Saud Univ.-Computer Information Sci. – volume: 11 start-page: 942 year: 2018 end-page: 948 ident: b0040 article-title: Modified AES for text and image encryption publication-title: Indonesian J. Electrical Eng. Computer Sci. – volume: 41 start-page: 47 year: 2016 end-page: 55 ident: b0110 article-title: A high-speed AES design resistant to fault injection attacks publication-title: Microprocess. Microsyst. – volume: 398 start-page: 62 year: 2017 end-page: 66 ident: b0065 article-title: Digital chaos-masked optical encryption scheme enhanced by two-dimensional key space publication-title: Opt. Commun. – volume: 32 start-page: 115 year: 2020 end-page: 122 ident: b0135 article-title: An efficient AES implementation using FPGA with enhanced security features publication-title: J. King Saud Univ.-Eng. Sci. – reference: Vaidyanathan, S., Sambas, A., Mamat, M., WS, M.S., 2017. Analysis, synchronisation and circuit implementation of a novel jerk chaotic system and its application for voice encryption. Int. J. Model. Identification Control, 28 (2), 153–166. – reference: Venkatesha, G., Dinesh, S., Manjunath, M., 2019. AES Based Algorithm for Image Encryption and Decryption. Perspectives in Communication, Embedded-systems and Signal-processing-PiCES, 2 (11), 342–345. – volume: 36 start-page: 565 year: 2010 end-page: 577 ident: b0140 article-title: Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11 i standard publication-title: Comput. Electr. Eng. – volume: 180 start-page: 1507 year: 2015 end-page: 1513 ident: b0095 article-title: Digital logic introduction using FPGAs publication-title: Procedia-Soc. Behav. Sci. – reference: Kak, S.C., 1983, August. Overview of analogue signal encryption. In: IEE Proceedings F-Communications, Radar and Signal Processing, Vol. 130, No. 5 IET, pp. 399–404. – volume: 128 start-page: 79 year: 2018 end-page: 88 ident: b0075 article-title: Encryption of speech signal with multiple secret keys publication-title: Procedia Comput. Sci. – start-page: 465 year: 2019 end-page: 517 ident: b0090 article-title: Introduction to FPGA and HDL Design publication-title: Introduction to Digital Systems Design – volume: 22 start-page: 13 year: 2018 end-page: 24 ident: b0125 article-title: FPGA implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals publication-title: Design Automation Embedded Systems – volume: 2 start-page: 460 year: 1984 end-page: 466 ident: b0045 article-title: Perfect secrecy encryption of analog signals publication-title: IEEE J. Sel. Areas Commun. – reference: Daemen, J., Rijmen, V., 2000. Advanced Encryption Standard (AES), 2001. The block cipher Rijndael, 1820, 277–284. – volume: 39 start-page: 1462 year: 2004 end-page: 1467 ident: b0060 article-title: Radio frequency digital-to-analog converter publication-title: IEEE J. Solid-State Circuits – volume: 2 start-page: 460 issue: 3 year: 1984 ident: 10.1016/j.jksuci.2020.08.005_b0045 article-title: Perfect secrecy encryption of analog signals publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.1984.1146071 – ident: 10.1016/j.jksuci.2020.08.005_b0085 doi: 10.1109/ICCCNT45670.2019.8944857 – volume: 94 start-page: 2259 issue: 4 year: 2017 ident: 10.1016/j.jksuci.2020.08.005_b0130 article-title: An efficient hardware architecture for high throughput AES encryptor using MUX based sub pipelined S-box publication-title: Wireless Pers. Commun. doi: 10.1007/s11277-016-3385-7 – volume: 66 year: 2019 ident: 10.1016/j.jksuci.2020.08.005_b0020 article-title: Based blockchain-PSO-AES techniques in finger vein biometrics: a novel verification secure framework for patient authentication publication-title: Computer Standards Interfaces doi: 10.1016/j.csi.2019.04.002 – ident: 10.1016/j.jksuci.2020.08.005_b0035 – volume: 76 start-page: 22703 issue: 21 year: 2017 ident: 10.1016/j.jksuci.2020.08.005_b0025 article-title: A resource-efficient encryption algorithm for multimedia big data publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-4333-y – ident: 10.1016/j.jksuci.2020.08.005_b0120 doi: 10.1109/ISIVC.2016.7893960 – volume: 32 start-page: 115 issue: 2 year: 2020 ident: 10.1016/j.jksuci.2020.08.005_b0135 article-title: An efficient AES implementation using FPGA with enhanced security features publication-title: J. King Saud Univ.-Eng. Sci. – start-page: 1313 year: 2017 ident: 10.1016/j.jksuci.2020.08.005_b0030 article-title: Key reinstallation attacks: forcing nonce reuse in WPA2 – volume: 128 start-page: 79 year: 2018 ident: 10.1016/j.jksuci.2020.08.005_b0075 article-title: Encryption of speech signal with multiple secret keys publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2018.03.011 – ident: 10.1016/j.jksuci.2020.08.005_b0010 doi: 10.1007/10721064_26 – ident: 10.1016/j.jksuci.2020.08.005_b0080 doi: 10.1109/ISESD.2018.8605446 – volume: 36 start-page: 565 issue: 3 year: 2010 ident: 10.1016/j.jksuci.2020.08.005_b0140 article-title: Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11 i standard publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2009.12.011 – ident: 10.1016/j.jksuci.2020.08.005_b0005 doi: 10.1049/ip-f-1.1983.0066 – volume: 2016 start-page: 789 year: 2016 ident: 10.1016/j.jksuci.2020.08.005_b0100 article-title: An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm publication-title: IACR Cryptol. ePrint Arch. – ident: 10.1016/j.jksuci.2020.08.005_b0015 – volume: 180 start-page: 1507 year: 2015 ident: 10.1016/j.jksuci.2020.08.005_b0095 article-title: Digital logic introduction using FPGAs publication-title: Procedia-Soc. Behav. Sci. doi: 10.1016/j.sbspro.2015.02.299 – ident: 10.1016/j.jksuci.2020.08.005_b0115 doi: 10.1109/INVENTIVE.2016.7830170 – volume: 22 start-page: 13 issue: 1–2 year: 2018 ident: 10.1016/j.jksuci.2020.08.005_b0125 article-title: FPGA implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals publication-title: Design Automation Embedded Systems doi: 10.1007/s10617-017-9189-5 – volume: 29 start-page: 295 issue: 3 year: 2017 ident: 10.1016/j.jksuci.2020.08.005_b0105 article-title: Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA publication-title: J. King Saud Univ.-Computer Information Sci. – volume: 127 start-page: 2341 issue: 4 year: 2016 ident: 10.1016/j.jksuci.2020.08.005_b0145 article-title: Development of modified AES algorithm for data security publication-title: Optik doi: 10.1016/j.ijleo.2015.11.188 – volume: 39 start-page: 1462 issue: 9 year: 2004 ident: 10.1016/j.jksuci.2020.08.005_b0060 article-title: Radio frequency digital-to-analog converter publication-title: IEEE J. Solid-State Circuits doi: 10.1109/JSSC.2004.829377 – start-page: 465 year: 2019 ident: 10.1016/j.jksuci.2020.08.005_b0090 article-title: Introduction to FPGA and HDL Design – volume: 14 issue: 2 year: 2019 ident: 10.1016/j.jksuci.2020.08.005_b0055 article-title: On the synchronization techniques of chaotic oscillators and their FPGA-based implementation for secure image transmission publication-title: PLoS ONE doi: 10.1371/journal.pone.0209618 – ident: 10.1016/j.jksuci.2020.08.005_b0155 doi: 10.1109/DDECS.2007.4295295 – ident: 10.1016/j.jksuci.2020.08.005_b0070 doi: 10.1109/ASSCC.2018.8579273 – volume: 398 start-page: 62 year: 2017 ident: 10.1016/j.jksuci.2020.08.005_b0065 article-title: Digital chaos-masked optical encryption scheme enhanced by two-dimensional key space publication-title: Opt. Commun. doi: 10.1016/j.optcom.2017.04.015 – ident: 10.1016/j.jksuci.2020.08.005_b0050 doi: 10.1504/IJMIC.2017.085934 – volume: 75 start-page: 6663 issue: 10 year: 2019 ident: 10.1016/j.jksuci.2020.08.005_b0150 article-title: An image encryption method based on chaos system and AES algorithm publication-title: J. Supercomputing doi: 10.1007/s11227-019-02878-7 – volume: 11 start-page: 942 issue: 3 year: 2018 ident: 10.1016/j.jksuci.2020.08.005_b0040 article-title: Modified AES for text and image encryption publication-title: Indonesian J. Electrical Eng. Computer Sci. doi: 10.11591/ijeecs.v11.i3.pp942-948 – volume: 41 start-page: 47 year: 2016 ident: 10.1016/j.jksuci.2020.08.005_b0110 article-title: A high-speed AES design resistant to fault injection attacks publication-title: Microprocess. Microsyst. doi: 10.1016/j.micpro.2015.12.002 |
| SSID | ssj0001765436 |
| Score | 2.3955915 |
| Snippet | The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile,... |
| SourceID | doaj unpaywall crossref elsevier |
| SourceType | Open Website Open Access Repository Enrichment Source Index Database Publisher |
| StartPage | 3878 |
| SubjectTerms | AES algorithm Lightweight AES algorithm Mix column and FPGA Voice encryption |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LTuswELUQG9jwRvTykBdsA3ZiO_GyIBBCgg0gsYv8iEu5SVul7UX9ezxOUpVV74Jt5CSWZ-w5Y52Zg9CldDyockdEKeITFJ1FGaUmMrEwaZrEBQmtlJ6excMbe3zn7ytSX8AJa9oDNwt3rTwA4dYQYVnKHJdaJZIDd1754G95qCMnmVxJpsLtSgo1k6G0CKp0qPfLrm4ukLs-_07nZujTw5iEDp6gXrcSl0L7_h_haWs-mqjFlyrLlfBzv4d2WtyI-81899FGMTpAu50mA2636CGq-riEfPsrXHni_t0LVuVgXA9nHxUeVh1bHMyBPV7F_q16MQHuM_439ocGrkATZVBMMTDiBzgw3HDL4qqgzgrDxRtWda0W0yP0dn_3evsQtZIKkWEZm0XMLwQxzEpqpfMHDLckyYijQgtbUFJAuz3rhJVxrKX2YECniaZOe6OlgrokOUabo_GoOEEYwITS3DplMmYE1UppyqhULi1YTEQPJd2C5qbtNw6yF2XeEcs-88YMOZghBzVMwnsoWr41afptrBl_A7ZajoVu2eGB96G89aF8nQ_1UNpZOm-BRwMo_KeGa35_tXSM_5rvn9-Y7ynajqEKI1wGnaHNWT0vzj02mumLsA2-Ae0gCZw priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT9swFLZQe9hpbAO0ooF82HGu7MR24mNBVAgJNGlUYqfIP-KukLRVmoLKX4_tJNWKNMGuke04frbfZ-d73wPgu7AsZOVGWErsDigqRSkhGumI6ySJoxwHKaXrG345oVd37G4P_OhiYXb-3wce1v3Daq1n7iQX4SC26QVL-5w55N0D_cnNz9HvcKYiAhEWNt4oIjFybivtIuX-0cyOJwqC_TsO6cN6vpSbJ1kUfzmc8T647rra8EwehutaDfXzKxXH937LJ_CxRZ5w1EyVz2Avn38B-11WB9gu8gNQjmDhT-xP4dIUji5-QVlMF9Ws_lPCWdnxzb1BoUO80NWqNkvPnoaPC7ftwNJnVZnmK-g59VMYOHKw5YGVPlIL-qs7KKtKblaHYDK-uD2_RG1SBqRpSmtE3SBjTY0gRli3RTGD4xRbwhU3OcG5F-wzlhsRRUooBydUEitilTN7womN4yPQmy_m-VcAPRyRihkrdUo1J0pKRSgR0iY5jTAfgLgzUKZbxXKfOKPIOmrafdaMaOZHNPP5NDEbALSttWwUO94of-Ztvy3r9bbDA2e6rF2-mXQwmBmNuaEJtUwoGQvmIzikg6CGJQOQdDMna6FLA0lcU7M3Xj_cTrR39ff4fyt8A726WucnDjzV6rRdMy8URRXE priority: 102 providerName: Unpaywall |
| Title | A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays |
| URI | https://dx.doi.org/10.1016/j.jksuci.2020.08.005 https://doi.org/10.1016/j.jksuci.2020.08.005 https://doaj.org/article/a2315dc06d474f59ba3950167a154d57 |
| UnpaywallVersion | publishedVersion |
| Volume | 34 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2213-1248 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001765436 issn: 1319-1578 databaseCode: KQ8 dateStart: 19960101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVESC databaseName: Elsevier Free Content customDbUrl: eissn: 2213-1248 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001765436 issn: 1319-1578 databaseCode: IXB dateStart: 19960101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVAVX databaseName: Springer Nature HAS Fully OA customDbUrl: eissn: 2213-1248 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001765436 issn: 1319-1578 databaseCode: AAJSJ dateStart: 0 isFulltext: true titleUrlDefault: https://www.springernature.com providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b9swECaCdGiXpk_UfRgcuqomxYekUQkSpAYSFHANuJPAh-QqlWxDthP435dHU24ypchKkCLBOx6Pp_u-Q-hrVglflTsiShH3QNFplFJqIhNLkyQsLomnUrq6lpdTPp6J2RE667EwkFYZbP_epntrHVpGYTdHq7oeTajTHgps7PB3j1Gg3WY8hfIN32en_-IsCaAnPcgI8DowoEfQ-TSvmz_rrandQzEmnssT6tjdu6E8kf-Di-r5drFSuzvVNPcuootX6GXwIHG-X-RrdFQu3qCTvjoDDof1LWpz3MDL-84HP3F-PsGqmS-7evO7xXXb542DYLDzXLEb1e1WkAWNb5fOfOAWqqPMyzWG3Pg59rluOORztYC4whCCw6rr1G79Dk0vzn-eXUahuEJkeMo3EXcbQQy3GbVZ5UyNsISlpKJSS1tSUgLxnq2kzeJYZ9q5BTphmlbaiS-RtGLsPTpeLBflB4TBrVBa2EqZlBtJtVKacpqpKil5TOQAsX5DCxOYx6EARlP0KWY3xV4MBYihgLqYRAxQdBi12jNvPNL_FGR16Au82b5h2c2LoDiFcu6ssIZIyxNeiUwrlglAYijnSlqRDFDSS7p4oIbuU_Uj0387KMZ_rffjk6f6hF7EAMLwsaDP6HjTbcsvzjXa6CF6lufjyXjoQwtDfxJc2_T6R_7rL-jIEBU |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b9swECbSdEiXvou6Tw5dVZMSH9LoBAncNsmSBPBG8CG6SiXbkO0E_vfh0ZKbTCm6EqRI8I7H4-n77hD6Vngeq3InRGsSHigmT3JKbWJTYaXM0pLEVEpn52J8xX5O-GQPHfVcGIBVdrZ_a9Ojte5aht1uDhdVNbygQXsoZGOHv3sZFU_QU8aDdwIsvsnh30CLBPpkZBkBYQdG9BS6iPO6_rNc2yq8FFMSk3lCIbt7V1TM5P_gpjpYzxZ6c6vr-t5NdPISPe9cSDzarvIV2itnr9GLvjwD7k7rG9SMcA1P79sY_cSj4wus6-m8rVa_G1w1PXAcJIOD64rDqHazABg0vpkH-4EbKI8yLZcYwPFTHMFuuAN0NUC5whCDw7pt9Wb5Fl2dHF8ejZOuukJiWc5WCQsbQSxzBXWFD7aGO5LlxFNhhCspKSHznvPCFWlqChP8AiMzQ70J8pOC-ix7h_Zn81n5HmHwK7ThzmubMyuo0dpQRgvtZclSIgYo6zdU2S71OFTAqFWPMbtWWzEoEIOCwpiED1CyG7XYpt54pP8hyGrXFxJnx4Z5O1Wd5igd_FnuLBGOSeZ5YXRWcKBi6OBLOi4HSPaSVg_0MHyqemT67zvF-Kf1fvjvqb6ig_Hl2ak6_XH-6yN6lgIjIwaGPqH9VbsuPwc_aWW-xHNwB0HWDwo |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT9swFLZQe9hpbAO0ooF82HGu7MR24mNBVAgJNGlUYqfIP-KukLRVmoLKX4_tJNWKNMGuke04frbfZ-d73wPgu7AsZOVGWErsDigqRSkhGumI6ySJoxwHKaXrG345oVd37G4P_OhiYXb-3wce1v3Daq1n7iQX4SC26QVL-5w55N0D_cnNz9HvcKYiAhEWNt4oIjFybivtIuX-0cyOJwqC_TsO6cN6vpSbJ1kUfzmc8T647rra8EwehutaDfXzKxXH937LJ_CxRZ5w1EyVz2Avn38B-11WB9gu8gNQjmDhT-xP4dIUji5-QVlMF9Ws_lPCWdnxzb1BoUO80NWqNkvPnoaPC7ftwNJnVZnmK-g59VMYOHKw5YGVPlIL-qs7KKtKblaHYDK-uD2_RG1SBqRpSmtE3SBjTY0gRli3RTGD4xRbwhU3OcG5F-wzlhsRRUooBydUEitilTN7womN4yPQmy_m-VcAPRyRihkrdUo1J0pKRSgR0iY5jTAfgLgzUKZbxXKfOKPIOmrafdaMaOZHNPP5NDEbALSttWwUO94of-Ztvy3r9bbDA2e6rF2-mXQwmBmNuaEJtUwoGQvmIzikg6CGJQOQdDMna6FLA0lcU7M3Xj_cTrR39ff4fyt8A726WucnDjzV6rRdMy8URRXE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+lightweight+AES+algorithm+implementation+for+encrypting+voice+messages+using+field+programmable+gate+arrays&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Kumar%2C+Keshav&rft.au=Ramkumar%2C+K.R.&rft.au=Kaur%2C+Amanpreet&rft.date=2022-06-01&rft.pub=Elsevier+B.V&rft.issn=1319-1578&rft.eissn=2213-1248&rft.volume=34&rft.issue=6&rft.spage=3878&rft.epage=3885&rft_id=info:doi/10.1016%2Fj.jksuci.2020.08.005&rft.externalDocID=S1319157820304316 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1319-1578&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1319-1578&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1319-1578&client=summon |