Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory

A high speed security algorithm is always important for wired/wireless environment.  The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both h...

Full description

Saved in:
Bibliographic Details
Published inRecent Trends in Network Security and Applications pp. 224 - 231
Main Authors Subashri, T., Arunachalam, R., Gokul Vinoth Kumar, B., Vaidehi, V.
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2010
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN9783642144776
3642144772
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-14478-3_23

Cover

More Information
Summary:A high speed security algorithm is always important for wired/wireless environment.  The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. We implement the AES in hardware because the hardware implementation has the advantage of increased throughput and offers better security.  In order to reduce the constraint on the hardware resources while implementing the look-up table based s-box we propose a search based s-box architecture. Also the pipelined architecture of the AES algorithm is used in order to increase the throughput of the algorithm. The key schedule algorithm of the AES encryption is also pipelined.
ISBN:9783642144776
3642144772
ISSN:1865-0929
1865-0937
DOI:10.1007/978-3-642-14478-3_23