Open Access iconOpen Access

ARTICLE

crossmark

Implementation of a High-Speed and High-Throughput Advanced Encryption Standard

T. Manoj Kumar1,*, P. Karthigaikumar2

1 Department of ECE, Karpagam Institute of Technology, Coimbatore, India
2 Department of ECE, Karpagam College of Engineering, Coimbatore, India

* Corresponding Author: T. Manoj Kumar. Email: email

Intelligent Automation & Soft Computing 2022, 31(2), 1025-1036. https://doi.org/10.32604/iasc.2022.020090

Abstract

Data security is an essential aspect of data communication and data storage. To provide high-level security against all kinds of unauthorized accesses, cryptographic algorithms have been applied to various fields such as medical and military applications. Advanced Encryption Standard (AES), a symmetric cryptographic algorithm, is acknowledged as the most secure algorithm for the cryptographic process globally. Several modifications have been made to the original architecture after it was proposed by two Belgian researchers, Joan Daemen and Vincent Rijment, at the third AES candidate Conference in 2000. The existing modifications aim to increase security and speed. This paper proposes an efficient pipelined architecture for the key expansion process, effectively reducing the propagation delay to generate the required subkeys. Along with the pipeline structure, the fork and join architecture is also used in the key expansion part of the AES architecture, and it significantly reduces the time taken to generate the required subkeys. The proposed architecture is simulated and implemented on Xilinx Virtex4 XC4VLX200 FPGA. The result indicates that the proposed architecture achieves an improvement of about 37% in throughput compared with the original architecture. Also, the proposed architecture can convert the given plain text to cipher with a minimal propagation delay.


Keywords


Cite This Article

T. Manoj Kumar and P. Karthigaikumar, "Implementation of a high-speed and high-throughput advanced encryption standard," Intelligent Automation & Soft Computing, vol. 31, no.2, pp. 1025–1036, 2022.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1435

    View

  • 854

    Download

  • 0

    Like

Share Link