A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays

The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile, securing voice communications is a challenging task. In the literature, there are some methods found using oscillators and chaotic signals fo...

Full description

Saved in:
Bibliographic Details
Published inJournal of King Saud University. Computer and information sciences Vol. 34; no. 6; pp. 3878 - 3885
Main Authors Kumar, Keshav, Ramkumar, K.R., Kaur, Amanpreet
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.06.2022
Elsevier
Subjects
Online AccessGet full text
ISSN1319-1578
2213-1248
2213-1248
DOI10.1016/j.jksuci.2020.08.005

Cover

Abstract The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile, securing voice communications is a challenging task. In the literature, there are some methods found using oscillators and chaotic signals for protecting direct voice communications, but they have limited functionalities due to synchronization problems between chaotic signals and oscillators. This paper gives an idea of encrypting voice signals over peer to peer communication with the help of a modified and lightweight AES algorithm. This algorithm is similar to the traditional AES algorithm in most of the aspects but does not imply the use of mix column that is used in the traditional AES algorithm. The lightweight algorithm is tested on two different Field Programmable Gate Array (FPGA) and the designs are analyzed with respect to time delay and effective utilization of resources.
AbstractList The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile, securing voice communications is a challenging task. In the literature, there are some methods found using oscillators and chaotic signals for protecting direct voice communications, but they have limited functionalities due to synchronization problems between chaotic signals and oscillators. This paper gives an idea of encrypting voice signals over peer to peer communication with the help of a modified and lightweight AES algorithm. This algorithm is similar to the traditional AES algorithm in most of the aspects but does not imply the use of mix column that is used in the traditional AES algorithm. The lightweight algorithm is tested on two different Field Programmable Gate Array (FPGA) and the designs are analyzed with respect to time delay and effective utilization of resources.
Author Kumar, Keshav
Ramkumar, K.R.
Kaur, Amanpreet
Author_xml – sequence: 1
  givenname: Keshav
  surname: Kumar
  fullname: Kumar, Keshav
  email: keshav.kumar@chitkara.edu.in
– sequence: 2
  givenname: K.R.
  surname: Ramkumar
  fullname: Ramkumar, K.R.
  email: k.ramkumar@chitkara.edu.in
– sequence: 3
  givenname: Amanpreet
  surname: Kaur
  fullname: Kaur, Amanpreet
  email: amanpreet.kaur@chitkara.edu.in
BookMark eNqNkc1u1DAYRS1UJIbSN2DhF8jg3_ywQBpVBSpVYgGsLcf-nDo4cWR7Ws3bN0NQF10AG1v-pHts3_MWXcxxBoTeU7KnhNYfxv34Kx-N3zPCyJ60e0LkK7RjjPKKMtFeoB3ltKuobNo36CrnkRBCm1oKXu_QdMDBD_flEc4rPtx8xzoMMflyP2E_LQEmmIsuPs7YxYRhNum0FD8P-CF6A3iCnPUAGR_zeeg8BIuXFIekp0n3AfCgC2Cdkj7ld-i10yHD1Z_9Ev38fPPj-mt19-3L7fXhrjKiFaUS61OJEbajtnOkbaUlvCWO1n1tgRJYT511te0Y67teUtY3vKeu5wyamjrOL9HtxrVRj2pJftLppKL26vcgpkHpVLwJoDTjVFpDaisa4WTXa97JtddGUymsbFaW3FjHedGnRx3CM5ASdVagRrUpUGcFirRqVbDmPm45k2LOCZwyfiuyJO3Dv8LiRfg_7_y0xWAt98FDUtn4VRlYn8CU9ff-74AnuEe4_g
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3518533
crossref_primary_10_3389_fmech_2024_1406559
crossref_primary_10_1016_j_cstp_2021_06_014
crossref_primary_10_1007_s10470_025_02343_x
crossref_primary_10_3103_S0146411622080028
crossref_primary_10_1007_s11760_023_02831_5
crossref_primary_10_1007_s40866_024_00192_7
crossref_primary_10_1007_s10836_022_05997_x
Cites_doi 10.1109/JSAC.1984.1146071
10.1109/ICCCNT45670.2019.8944857
10.1007/s11277-016-3385-7
10.1016/j.csi.2019.04.002
10.1007/s11042-016-4333-y
10.1109/ISIVC.2016.7893960
10.1016/j.procs.2018.03.011
10.1007/10721064_26
10.1109/ISESD.2018.8605446
10.1016/j.compeleceng.2009.12.011
10.1049/ip-f-1.1983.0066
10.1016/j.sbspro.2015.02.299
10.1109/INVENTIVE.2016.7830170
10.1007/s10617-017-9189-5
10.1016/j.ijleo.2015.11.188
10.1109/JSSC.2004.829377
10.1371/journal.pone.0209618
10.1109/DDECS.2007.4295295
10.1109/ASSCC.2018.8579273
10.1016/j.optcom.2017.04.015
10.1504/IJMIC.2017.085934
10.1007/s11227-019-02878-7
10.11591/ijeecs.v11.i3.pp942-948
10.1016/j.micpro.2015.12.002
ContentType Journal Article
Copyright 2020 The Authors
Copyright_xml – notice: 2020 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
ADTOC
UNPAY
DOA
DOI 10.1016/j.jksuci.2020.08.005
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2213-1248
EndPage 3885
ExternalDocumentID oai_doaj_org_article_a2315dc06d474f59ba3950167a154d57
10.1016/j.jksuci.2020.08.005
10_1016_j_jksuci_2020_08_005
S1319157820304316
GroupedDBID --K
0R~
0SF
4.4
457
5VS
6I.
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAQXK
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
AEXQZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ASPBG
AVWKF
AZFZN
BCNDV
EBS
EJD
FDB
FEDTE
FGOYB
GROUPED_DOAJ
HVGLF
HZ~
IPNFZ
IXB
KQ8
M41
NCXOZ
O-L
O9-
OK1
R2-
RIG
ROL
SES
SSZ
XH2
AAJSJ
AASML
AAYWO
AAYXX
ABEEZ
ABWVN
ACULB
ADVLN
AFGXO
AFJKZ
AGQPQ
APXCP
BGLVJ
C6C
CCPQU
CITATION
K7-
PHGZM
PHGZT
PIMPY
PQGLB
SOJ
ADTOC
UNPAY
ID FETCH-LOGICAL-c484t-45780c4d91d9f0885d0380f16b6de10e0389df6d922b9b512b73b1fb32e761f33
IEDL.DBID IXB
ISSN 1319-1578
2213-1248
IngestDate Fri Oct 03 12:53:07 EDT 2025
Tue Aug 19 22:06:27 EDT 2025
Thu Apr 24 22:56:55 EDT 2025
Wed Oct 01 05:02:23 EDT 2025
Fri Feb 23 02:38:56 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Lightweight AES algorithm
Mix column and FPGA
Voice encryption
AES algorithm
Language English
License This is an open access article under the CC BY-NC-ND license.
cc-by-nc-nd
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c484t-45780c4d91d9f0885d0380f16b6de10e0389df6d922b9b512b73b1fb32e761f33
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S1319157820304316
PageCount 8
ParticipantIDs doaj_primary_oai_doaj_org_article_a2315dc06d474f59ba3950167a154d57
unpaywall_primary_10_1016_j_jksuci_2020_08_005
crossref_citationtrail_10_1016_j_jksuci_2020_08_005
crossref_primary_10_1016_j_jksuci_2020_08_005
elsevier_sciencedirect_doi_10_1016_j_jksuci_2020_08_005
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate June 2022
2022-06-00
2022-06-01
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 06
  year: 2022
  text: June 2022
PublicationDecade 2020
PublicationTitle Journal of King Saud University. Computer and information sciences
PublicationYear 2022
Publisher Elsevier B.V
Elsevier
Publisher_xml – name: Elsevier B.V
– name: Elsevier
References Guillén-Fernández, Meléndez-Cano, Tlelo-Cuautle, Núñez-Pérez, Rangel-Magdaleno (b0055) 2019; 14
Bedoui, M., Mestiri, H., Bouallegue, B., Machhout, M., 2016, November. A reliable fault detection scheme for the AES hardware implementation. In: 2016 International Symposium on Signal, Image, Video and Communications (ISIVC). IEEE, pp. 47–52.
Gamido, Sison, Medina (b0040) 2018; 11
Singh, Dod (b0100) 2016; 2016
Venkatesha, G., Dinesh, S., Manjunath, M., 2019. AES Based Algorithm for Image Encryption and Decryption. Perspectives in Communication, Embedded-systems and Signal-processing-PiCES, 2 (11), 342–345.
Liu, Xiao, Zhang, Bi, Zhang, Fang, Hu (b0065) 2017; 398
Kak, S.C., 1983, August. Overview of analogue signal encryption. In: IEE Proceedings F-Communications, Radar and Signal Processing, Vol. 130, No. 5 IET, pp. 399–404.
Kumar, Karthigaikumar (b0125) 2018; 22
Ebrahim, M., Khan, S., Khalid, U.B., 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398.
Slimani, Merazka (b0075) 2018; 128
Donzellini, Oneto, Ponta, Anguita (b0090) 2019
Vanhoef, Piessens (b0030) 2017
Daemen, J., Rijmen, V., 2000. Advanced Encryption Standard (AES), 2001. The block cipher Rijndael, 1820, 277–284.
Arab, Rostami, Ghavami (b0150) 2019; 75
Luschas, Schreier, Lee (b0060) 2004; 39
Aljawarneh, Yassein (b0025) 2017; 76
Vaidyanathan, S., Sambas, A., Mamat, M., WS, M.S., 2017. Analysis, synchronisation and circuit implementation of a novel jerk chaotic system and its application for voice encryption. Int. J. Model. Identification Control, 28 (2), 153–166.
Zodpe, Sapkal (b0135) 2020; 32
Mohsin, Zaidan, Zaidan, Albahri, Albahri, Alsalem, Mohammed (b0020) 2019; 66
Mondal, S., Sharma, R.K., 2019, July. Application of Advanced Encryption Standard on Real Time Secured Voice Communication using FPGA. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp. 1–6.
Mestiri, Kahri, Bouallegue, Machhout (b0110) 2016; 41
Gadde, V.V., Awano, H., Ikeda, M., 2018, November. An encryption-authentication unified A/D conversion scheme for IoT sensor nodes. In: 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC). IEEE, pp. 123–126.
Farooq, Aslam (b0105) 2017; 29
Priya, Karthigaikumar, Mangai, Das (b0130) 2017; 94
Kumar, Rana (b0145) 2016; 127
Petrescu, Păvăloiu, Drăgoi (b0095) 2015; 180
Algredo-Badillo, Feregrino-Uribe, Cumplido, Morales-Sandoval (b0140) 2010; 36
Gersho (b0045) 1984; 2
Katkade, P., Phade, G.M., 2016. Application of AES algorithm for data security in serial communication. In: 2016 International Conference on Inventive Computation Technologies (ICICT), Vol. 3. IEEE, pp. 1–5.
Riyadi, M.A., Pandapotan, N., Khafid, M.R.A., Prakoso, T., 2018, October. FPGA-based 128-bit Chaotic Encryption Method for Voice Communication. In: 2018 International Symposium on Electronics and Smart Devices (ISESD). IEEE, pp. 1–5.
Circ Di Natale, G., Flottes, M.L., Rouzeyre, B., 2007, April. A novel parity bit scheme for SBox in AES circuits. In: 2007 IEEE Design and Diagnostics of Electronic Circuits and Systems. IEEE, pp. 1–5.
Mohsin (10.1016/j.jksuci.2020.08.005_b0020) 2019; 66
Priya (10.1016/j.jksuci.2020.08.005_b0130) 2017; 94
Vanhoef (10.1016/j.jksuci.2020.08.005_b0030) 2017
Singh (10.1016/j.jksuci.2020.08.005_b0100) 2016; 2016
Kumar (10.1016/j.jksuci.2020.08.005_b0125) 2018; 22
Liu (10.1016/j.jksuci.2020.08.005_b0065) 2017; 398
10.1016/j.jksuci.2020.08.005_b0010
10.1016/j.jksuci.2020.08.005_b0070
Luschas (10.1016/j.jksuci.2020.08.005_b0060) 2004; 39
10.1016/j.jksuci.2020.08.005_b0050
10.1016/j.jksuci.2020.08.005_b0005
Gamido (10.1016/j.jksuci.2020.08.005_b0040) 2018; 11
Farooq (10.1016/j.jksuci.2020.08.005_b0105) 2017; 29
Zodpe (10.1016/j.jksuci.2020.08.005_b0135) 2020; 32
Arab (10.1016/j.jksuci.2020.08.005_b0150) 2019; 75
Mestiri (10.1016/j.jksuci.2020.08.005_b0110) 2016; 41
Kumar (10.1016/j.jksuci.2020.08.005_b0145) 2016; 127
Slimani (10.1016/j.jksuci.2020.08.005_b0075) 2018; 128
10.1016/j.jksuci.2020.08.005_b0080
Donzellini (10.1016/j.jksuci.2020.08.005_b0090) 2019
Gersho (10.1016/j.jksuci.2020.08.005_b0045) 1984; 2
10.1016/j.jksuci.2020.08.005_b0085
10.1016/j.jksuci.2020.08.005_b0120
Petrescu (10.1016/j.jksuci.2020.08.005_b0095) 2015; 180
Guillén-Fernández (10.1016/j.jksuci.2020.08.005_b0055) 2019; 14
10.1016/j.jksuci.2020.08.005_b0115
10.1016/j.jksuci.2020.08.005_b0155
10.1016/j.jksuci.2020.08.005_b0035
Algredo-Badillo (10.1016/j.jksuci.2020.08.005_b0140) 2010; 36
10.1016/j.jksuci.2020.08.005_b0015
Aljawarneh (10.1016/j.jksuci.2020.08.005_b0025) 2017; 76
References_xml – volume: 66
  year: 2019
  ident: b0020
  article-title: Based blockchain-PSO-AES techniques in finger vein biometrics: a novel verification secure framework for patient authentication
  publication-title: Computer Standards Interfaces
– volume: 14
  year: 2019
  ident: b0055
  article-title: On the synchronization techniques of chaotic oscillators and their FPGA-based implementation for secure image transmission
  publication-title: PLoS ONE
– volume: 94
  start-page: 2259
  year: 2017
  end-page: 2273
  ident: b0130
  article-title: An efficient hardware architecture for high throughput AES encryptor using MUX based sub pipelined S-box
  publication-title: Wireless Pers. Commun.
– start-page: 1313
  year: 2017
  end-page: 1328
  ident: b0030
  article-title: Key reinstallation attacks: forcing nonce reuse in WPA2
  publication-title: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
– reference: Mondal, S., Sharma, R.K., 2019, July. Application of Advanced Encryption Standard on Real Time Secured Voice Communication using FPGA. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp. 1–6.
– volume: 76
  start-page: 22703
  year: 2017
  end-page: 22724
  ident: b0025
  article-title: A resource-efficient encryption algorithm for multimedia big data
  publication-title: Multimedia Tools Appl.
– reference: Gadde, V.V., Awano, H., Ikeda, M., 2018, November. An encryption-authentication unified A/D conversion scheme for IoT sensor nodes. In: 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC). IEEE, pp. 123–126.
– reference: Katkade, P., Phade, G.M., 2016. Application of AES algorithm for data security in serial communication. In: 2016 International Conference on Inventive Computation Technologies (ICICT), Vol. 3. IEEE, pp. 1–5.
– reference: Riyadi, M.A., Pandapotan, N., Khafid, M.R.A., Prakoso, T., 2018, October. FPGA-based 128-bit Chaotic Encryption Method for Voice Communication. In: 2018 International Symposium on Electronics and Smart Devices (ISESD). IEEE, pp. 1–5.
– volume: 75
  start-page: 6663
  year: 2019
  end-page: 6682
  ident: b0150
  article-title: An image encryption method based on chaos system and AES algorithm
  publication-title: J. Supercomputing
– volume: 127
  start-page: 2341
  year: 2016
  end-page: 2345
  ident: b0145
  article-title: Development of modified AES algorithm for data security
  publication-title: Optik
– reference: Ebrahim, M., Khan, S., Khalid, U.B., 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398.
– reference: Circ Di Natale, G., Flottes, M.L., Rouzeyre, B., 2007, April. A novel parity bit scheme for SBox in AES circuits. In: 2007 IEEE Design and Diagnostics of Electronic Circuits and Systems. IEEE, pp. 1–5.
– volume: 2016
  start-page: 789
  year: 2016
  ident: b0100
  article-title: An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm
  publication-title: IACR Cryptol. ePrint Arch.
– reference: Bedoui, M., Mestiri, H., Bouallegue, B., Machhout, M., 2016, November. A reliable fault detection scheme for the AES hardware implementation. In: 2016 International Symposium on Signal, Image, Video and Communications (ISIVC). IEEE, pp. 47–52.
– volume: 29
  start-page: 295
  year: 2017
  end-page: 302
  ident: b0105
  article-title: Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA
  publication-title: J. King Saud Univ.-Computer Information Sci.
– volume: 11
  start-page: 942
  year: 2018
  end-page: 948
  ident: b0040
  article-title: Modified AES for text and image encryption
  publication-title: Indonesian J. Electrical Eng. Computer Sci.
– volume: 41
  start-page: 47
  year: 2016
  end-page: 55
  ident: b0110
  article-title: A high-speed AES design resistant to fault injection attacks
  publication-title: Microprocess. Microsyst.
– volume: 398
  start-page: 62
  year: 2017
  end-page: 66
  ident: b0065
  article-title: Digital chaos-masked optical encryption scheme enhanced by two-dimensional key space
  publication-title: Opt. Commun.
– volume: 32
  start-page: 115
  year: 2020
  end-page: 122
  ident: b0135
  article-title: An efficient AES implementation using FPGA with enhanced security features
  publication-title: J. King Saud Univ.-Eng. Sci.
– reference: Vaidyanathan, S., Sambas, A., Mamat, M., WS, M.S., 2017. Analysis, synchronisation and circuit implementation of a novel jerk chaotic system and its application for voice encryption. Int. J. Model. Identification Control, 28 (2), 153–166.
– reference: Venkatesha, G., Dinesh, S., Manjunath, M., 2019. AES Based Algorithm for Image Encryption and Decryption. Perspectives in Communication, Embedded-systems and Signal-processing-PiCES, 2 (11), 342–345.
– volume: 36
  start-page: 565
  year: 2010
  end-page: 577
  ident: b0140
  article-title: Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11 i standard
  publication-title: Comput. Electr. Eng.
– volume: 180
  start-page: 1507
  year: 2015
  end-page: 1513
  ident: b0095
  article-title: Digital logic introduction using FPGAs
  publication-title: Procedia-Soc. Behav. Sci.
– reference: Kak, S.C., 1983, August. Overview of analogue signal encryption. In: IEE Proceedings F-Communications, Radar and Signal Processing, Vol. 130, No. 5 IET, pp. 399–404.
– volume: 128
  start-page: 79
  year: 2018
  end-page: 88
  ident: b0075
  article-title: Encryption of speech signal with multiple secret keys
  publication-title: Procedia Comput. Sci.
– start-page: 465
  year: 2019
  end-page: 517
  ident: b0090
  article-title: Introduction to FPGA and HDL Design
  publication-title: Introduction to Digital Systems Design
– volume: 22
  start-page: 13
  year: 2018
  end-page: 24
  ident: b0125
  article-title: FPGA implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals
  publication-title: Design Automation Embedded Systems
– volume: 2
  start-page: 460
  year: 1984
  end-page: 466
  ident: b0045
  article-title: Perfect secrecy encryption of analog signals
  publication-title: IEEE J. Sel. Areas Commun.
– reference: Daemen, J., Rijmen, V., 2000. Advanced Encryption Standard (AES), 2001. The block cipher Rijndael, 1820, 277–284.
– volume: 39
  start-page: 1462
  year: 2004
  end-page: 1467
  ident: b0060
  article-title: Radio frequency digital-to-analog converter
  publication-title: IEEE J. Solid-State Circuits
– volume: 2
  start-page: 460
  issue: 3
  year: 1984
  ident: 10.1016/j.jksuci.2020.08.005_b0045
  article-title: Perfect secrecy encryption of analog signals
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.1984.1146071
– ident: 10.1016/j.jksuci.2020.08.005_b0085
  doi: 10.1109/ICCCNT45670.2019.8944857
– volume: 94
  start-page: 2259
  issue: 4
  year: 2017
  ident: 10.1016/j.jksuci.2020.08.005_b0130
  article-title: An efficient hardware architecture for high throughput AES encryptor using MUX based sub pipelined S-box
  publication-title: Wireless Pers. Commun.
  doi: 10.1007/s11277-016-3385-7
– volume: 66
  year: 2019
  ident: 10.1016/j.jksuci.2020.08.005_b0020
  article-title: Based blockchain-PSO-AES techniques in finger vein biometrics: a novel verification secure framework for patient authentication
  publication-title: Computer Standards Interfaces
  doi: 10.1016/j.csi.2019.04.002
– ident: 10.1016/j.jksuci.2020.08.005_b0035
– volume: 76
  start-page: 22703
  issue: 21
  year: 2017
  ident: 10.1016/j.jksuci.2020.08.005_b0025
  article-title: A resource-efficient encryption algorithm for multimedia big data
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-4333-y
– ident: 10.1016/j.jksuci.2020.08.005_b0120
  doi: 10.1109/ISIVC.2016.7893960
– volume: 32
  start-page: 115
  issue: 2
  year: 2020
  ident: 10.1016/j.jksuci.2020.08.005_b0135
  article-title: An efficient AES implementation using FPGA with enhanced security features
  publication-title: J. King Saud Univ.-Eng. Sci.
– start-page: 1313
  year: 2017
  ident: 10.1016/j.jksuci.2020.08.005_b0030
  article-title: Key reinstallation attacks: forcing nonce reuse in WPA2
– volume: 128
  start-page: 79
  year: 2018
  ident: 10.1016/j.jksuci.2020.08.005_b0075
  article-title: Encryption of speech signal with multiple secret keys
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2018.03.011
– ident: 10.1016/j.jksuci.2020.08.005_b0010
  doi: 10.1007/10721064_26
– ident: 10.1016/j.jksuci.2020.08.005_b0080
  doi: 10.1109/ISESD.2018.8605446
– volume: 36
  start-page: 565
  issue: 3
  year: 2010
  ident: 10.1016/j.jksuci.2020.08.005_b0140
  article-title: Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11 i standard
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2009.12.011
– ident: 10.1016/j.jksuci.2020.08.005_b0005
  doi: 10.1049/ip-f-1.1983.0066
– volume: 2016
  start-page: 789
  year: 2016
  ident: 10.1016/j.jksuci.2020.08.005_b0100
  article-title: An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm
  publication-title: IACR Cryptol. ePrint Arch.
– ident: 10.1016/j.jksuci.2020.08.005_b0015
– volume: 180
  start-page: 1507
  year: 2015
  ident: 10.1016/j.jksuci.2020.08.005_b0095
  article-title: Digital logic introduction using FPGAs
  publication-title: Procedia-Soc. Behav. Sci.
  doi: 10.1016/j.sbspro.2015.02.299
– ident: 10.1016/j.jksuci.2020.08.005_b0115
  doi: 10.1109/INVENTIVE.2016.7830170
– volume: 22
  start-page: 13
  issue: 1–2
  year: 2018
  ident: 10.1016/j.jksuci.2020.08.005_b0125
  article-title: FPGA implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals
  publication-title: Design Automation Embedded Systems
  doi: 10.1007/s10617-017-9189-5
– volume: 29
  start-page: 295
  issue: 3
  year: 2017
  ident: 10.1016/j.jksuci.2020.08.005_b0105
  article-title: Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA
  publication-title: J. King Saud Univ.-Computer Information Sci.
– volume: 127
  start-page: 2341
  issue: 4
  year: 2016
  ident: 10.1016/j.jksuci.2020.08.005_b0145
  article-title: Development of modified AES algorithm for data security
  publication-title: Optik
  doi: 10.1016/j.ijleo.2015.11.188
– volume: 39
  start-page: 1462
  issue: 9
  year: 2004
  ident: 10.1016/j.jksuci.2020.08.005_b0060
  article-title: Radio frequency digital-to-analog converter
  publication-title: IEEE J. Solid-State Circuits
  doi: 10.1109/JSSC.2004.829377
– start-page: 465
  year: 2019
  ident: 10.1016/j.jksuci.2020.08.005_b0090
  article-title: Introduction to FPGA and HDL Design
– volume: 14
  issue: 2
  year: 2019
  ident: 10.1016/j.jksuci.2020.08.005_b0055
  article-title: On the synchronization techniques of chaotic oscillators and their FPGA-based implementation for secure image transmission
  publication-title: PLoS ONE
  doi: 10.1371/journal.pone.0209618
– ident: 10.1016/j.jksuci.2020.08.005_b0155
  doi: 10.1109/DDECS.2007.4295295
– ident: 10.1016/j.jksuci.2020.08.005_b0070
  doi: 10.1109/ASSCC.2018.8579273
– volume: 398
  start-page: 62
  year: 2017
  ident: 10.1016/j.jksuci.2020.08.005_b0065
  article-title: Digital chaos-masked optical encryption scheme enhanced by two-dimensional key space
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2017.04.015
– ident: 10.1016/j.jksuci.2020.08.005_b0050
  doi: 10.1504/IJMIC.2017.085934
– volume: 75
  start-page: 6663
  issue: 10
  year: 2019
  ident: 10.1016/j.jksuci.2020.08.005_b0150
  article-title: An image encryption method based on chaos system and AES algorithm
  publication-title: J. Supercomputing
  doi: 10.1007/s11227-019-02878-7
– volume: 11
  start-page: 942
  issue: 3
  year: 2018
  ident: 10.1016/j.jksuci.2020.08.005_b0040
  article-title: Modified AES for text and image encryption
  publication-title: Indonesian J. Electrical Eng. Computer Sci.
  doi: 10.11591/ijeecs.v11.i3.pp942-948
– volume: 41
  start-page: 47
  year: 2016
  ident: 10.1016/j.jksuci.2020.08.005_b0110
  article-title: A high-speed AES design resistant to fault injection attacks
  publication-title: Microprocess. Microsyst.
  doi: 10.1016/j.micpro.2015.12.002
SSID ssj0001765436
Score 2.3955915
Snippet The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile,...
SourceID doaj
unpaywall
crossref
elsevier
SourceType Open Website
Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 3878
SubjectTerms AES algorithm
Lightweight AES algorithm
Mix column and FPGA
Voice encryption
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LTuswELUQG9jwRvTykBdsA3ZiO_GyIBBCgg0gsYv8iEu5SVul7UX9ezxOUpVV74Jt5CSWZ-w5Y52Zg9CldDyockdEKeITFJ1FGaUmMrEwaZrEBQmtlJ6excMbe3zn7ytSX8AJa9oDNwt3rTwA4dYQYVnKHJdaJZIDd1754G95qCMnmVxJpsLtSgo1k6G0CKp0qPfLrm4ukLs-_07nZujTw5iEDp6gXrcSl0L7_h_haWs-mqjFlyrLlfBzv4d2WtyI-81899FGMTpAu50mA2636CGq-riEfPsrXHni_t0LVuVgXA9nHxUeVh1bHMyBPV7F_q16MQHuM_439ocGrkATZVBMMTDiBzgw3HDL4qqgzgrDxRtWda0W0yP0dn_3evsQtZIKkWEZm0XMLwQxzEpqpfMHDLckyYijQgtbUFJAuz3rhJVxrKX2YECniaZOe6OlgrokOUabo_GoOEEYwITS3DplMmYE1UppyqhULi1YTEQPJd2C5qbtNw6yF2XeEcs-88YMOZghBzVMwnsoWr41afptrBl_A7ZajoVu2eGB96G89aF8nQ_1UNpZOm-BRwMo_KeGa35_tXSM_5rvn9-Y7ynajqEKI1wGnaHNWT0vzj02mumLsA2-Ae0gCZw
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT9swFLZQe9hpbAO0ooF82HGu7MR24mNBVAgJNGlUYqfIP-KukLRVmoLKX4_tJNWKNMGuke04frbfZ-d73wPgu7AsZOVGWErsDigqRSkhGumI6ySJoxwHKaXrG345oVd37G4P_OhiYXb-3wce1v3Daq1n7iQX4SC26QVL-5w55N0D_cnNz9HvcKYiAhEWNt4oIjFybivtIuX-0cyOJwqC_TsO6cN6vpSbJ1kUfzmc8T647rra8EwehutaDfXzKxXH937LJ_CxRZ5w1EyVz2Avn38B-11WB9gu8gNQjmDhT-xP4dIUji5-QVlMF9Ws_lPCWdnxzb1BoUO80NWqNkvPnoaPC7ftwNJnVZnmK-g59VMYOHKw5YGVPlIL-qs7KKtKblaHYDK-uD2_RG1SBqRpSmtE3SBjTY0gRli3RTGD4xRbwhU3OcG5F-wzlhsRRUooBydUEitilTN7womN4yPQmy_m-VcAPRyRihkrdUo1J0pKRSgR0iY5jTAfgLgzUKZbxXKfOKPIOmrafdaMaOZHNPP5NDEbALSttWwUO94of-Ztvy3r9bbDA2e6rF2-mXQwmBmNuaEJtUwoGQvmIzikg6CGJQOQdDMna6FLA0lcU7M3Xj_cTrR39ff4fyt8A726WucnDjzV6rRdMy8URRXE
  priority: 102
  providerName: Unpaywall
Title A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays
URI https://dx.doi.org/10.1016/j.jksuci.2020.08.005
https://doi.org/10.1016/j.jksuci.2020.08.005
https://doaj.org/article/a2315dc06d474f59ba3950167a154d57
UnpaywallVersion publishedVersion
Volume 34
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2213-1248
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001765436
  issn: 1319-1578
  databaseCode: KQ8
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVESC
  databaseName: Elsevier Free Content
  customDbUrl:
  eissn: 2213-1248
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001765436
  issn: 1319-1578
  databaseCode: IXB
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVAVX
  databaseName: Springer Nature HAS Fully OA
  customDbUrl:
  eissn: 2213-1248
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001765436
  issn: 1319-1578
  databaseCode: AAJSJ
  dateStart: 0
  isFulltext: true
  titleUrlDefault: https://www.springernature.com
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b9swECaCdGiXpk_UfRgcuqomxYekUQkSpAYSFHANuJPAh-QqlWxDthP435dHU24ypchKkCLBOx6Pp_u-Q-hrVglflTsiShH3QNFplFJqIhNLkyQsLomnUrq6lpdTPp6J2RE667EwkFYZbP_epntrHVpGYTdHq7oeTajTHgps7PB3j1Gg3WY8hfIN32en_-IsCaAnPcgI8DowoEfQ-TSvmz_rrandQzEmnssT6tjdu6E8kf-Di-r5drFSuzvVNPcuootX6GXwIHG-X-RrdFQu3qCTvjoDDof1LWpz3MDL-84HP3F-PsGqmS-7evO7xXXb542DYLDzXLEb1e1WkAWNb5fOfOAWqqPMyzWG3Pg59rluOORztYC4whCCw6rr1G79Dk0vzn-eXUahuEJkeMo3EXcbQQy3GbVZ5UyNsISlpKJSS1tSUgLxnq2kzeJYZ9q5BTphmlbaiS-RtGLsPTpeLBflB4TBrVBa2EqZlBtJtVKacpqpKil5TOQAsX5DCxOYx6EARlP0KWY3xV4MBYihgLqYRAxQdBi12jNvPNL_FGR16Au82b5h2c2LoDiFcu6ssIZIyxNeiUwrlglAYijnSlqRDFDSS7p4oIbuU_Uj0387KMZ_rffjk6f6hF7EAMLwsaDP6HjTbcsvzjXa6CF6lufjyXjoQwtDfxJc2_T6R_7rL-jIEBU
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b9swECbSdEiXvou6Tw5dVZMSH9LoBAncNsmSBPBG8CG6SiXbkO0E_vfh0ZKbTCm6EqRI8I7H4-n77hD6Vngeq3InRGsSHigmT3JKbWJTYaXM0pLEVEpn52J8xX5O-GQPHfVcGIBVdrZ_a9Ojte5aht1uDhdVNbygQXsoZGOHv3sZFU_QU8aDdwIsvsnh30CLBPpkZBkBYQdG9BS6iPO6_rNc2yq8FFMSk3lCIbt7V1TM5P_gpjpYzxZ6c6vr-t5NdPISPe9cSDzarvIV2itnr9GLvjwD7k7rG9SMcA1P79sY_cSj4wus6-m8rVa_G1w1PXAcJIOD64rDqHazABg0vpkH-4EbKI8yLZcYwPFTHMFuuAN0NUC5whCDw7pt9Wb5Fl2dHF8ejZOuukJiWc5WCQsbQSxzBXWFD7aGO5LlxFNhhCspKSHznvPCFWlqChP8AiMzQ70J8pOC-ix7h_Zn81n5HmHwK7ThzmubMyuo0dpQRgvtZclSIgYo6zdU2S71OFTAqFWPMbtWWzEoEIOCwpiED1CyG7XYpt54pP8hyGrXFxJnx4Z5O1Wd5igd_FnuLBGOSeZ5YXRWcKBi6OBLOi4HSPaSVg_0MHyqemT67zvF-Kf1fvjvqb6ig_Hl2ak6_XH-6yN6lgIjIwaGPqH9VbsuPwc_aWW-xHNwB0HWDwo
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT9swFLZQe9hpbAO0ooF82HGu7MR24mNBVAgJNGlUYqfIP-KukLRVmoLKX4_tJNWKNMGuke04frbfZ-d73wPgu7AsZOVGWErsDigqRSkhGumI6ySJoxwHKaXrG345oVd37G4P_OhiYXb-3wce1v3Daq1n7iQX4SC26QVL-5w55N0D_cnNz9HvcKYiAhEWNt4oIjFybivtIuX-0cyOJwqC_TsO6cN6vpSbJ1kUfzmc8T647rra8EwehutaDfXzKxXH937LJ_CxRZ5w1EyVz2Avn38B-11WB9gu8gNQjmDhT-xP4dIUji5-QVlMF9Ws_lPCWdnxzb1BoUO80NWqNkvPnoaPC7ftwNJnVZnmK-g59VMYOHKw5YGVPlIL-qs7KKtKblaHYDK-uD2_RG1SBqRpSmtE3SBjTY0gRli3RTGD4xRbwhU3OcG5F-wzlhsRRUooBydUEitilTN7womN4yPQmy_m-VcAPRyRihkrdUo1J0pKRSgR0iY5jTAfgLgzUKZbxXKfOKPIOmrafdaMaOZHNPP5NDEbALSttWwUO94of-Ztvy3r9bbDA2e6rF2-mXQwmBmNuaEJtUwoGQvmIzikg6CGJQOQdDMna6FLA0lcU7M3Xj_cTrR39ff4fyt8A726WucnDjzV6rRdMy8URRXE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+lightweight+AES+algorithm+implementation+for+encrypting+voice+messages+using+field+programmable+gate+arrays&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Kumar%2C+Keshav&rft.au=Ramkumar%2C+K.R.&rft.au=Kaur%2C+Amanpreet&rft.date=2022-06-01&rft.pub=Elsevier+B.V&rft.issn=1319-1578&rft.eissn=2213-1248&rft.volume=34&rft.issue=6&rft.spage=3878&rft.epage=3885&rft_id=info:doi/10.1016%2Fj.jksuci.2020.08.005&rft.externalDocID=S1319157820304316
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1319-1578&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1319-1578&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1319-1578&client=summon