Implementation of Advanced Encryption System Algorithm
Implementation of Advanced Encryption System Algorithm
Implementation of Advanced Encryption System Algorithm
Volume 8 Issue 2, March-April 2024 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD64771 | Volume – 8 | Issue – 2 | Mar-Apr 2024 Page 839
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
numbers are used to ensure the validity period of Figure-2: algorithm block diagram
encryption keys, electronic verification and ``The basic idea of the proposed model is to integrate
confirmation to ensure data security, online AES into all foci of the DES Fiesta network.
verification over the Internet, and private transactions Numerically, each round of the model can be
such as transactions with Visa and Platinum cards. communicated as follows: ``The above The set of
will be done. conditions is emphasized over a total of 10 rounds,
IV. IMPLEMENTATION” where the data square of 128 data is divided into left
AES calculations are done using Verilog encoding in and right halves, and every round n, the left bit and
Model Sim Altera Web Elective 6.3g. First, we try to right bit (Ln-1, Rn) of the last round. An XOR
perform the computation by encoding and operation is performed between the three elements of
unscrambleing a single 128-bit square. Once a -1) The key (Kn) created in this round was created as
functional square shape is in place, the resulting step a commitment to the AES count.
is to embed this square shape into a square movement
strategy. The figure input (CFB) shown in Figures 4
and 5 was chosen because messages should not be
embedded in the square size of another figure while
preventing some control over the figure's
content.
@ IJTSRD | Unique Paper ID – IJTSRD64771 | Volume – 8 | Issue – 2 | Mar-Apr 2024 Page 840
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD64771 | Volume – 8 | Issue – 2 | Mar-Apr 2024 Page 841
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
3) AES is ideal for closed spaces where encryption
or decryption is implemented. RAM and ROM
requirements are very low.
4) Web servers that need to manage various cipher
suites.
5) Insightful applications requiring security with
current encryption to the system
VIII.CONCLUSION
Figure-10: AES DECERPATION CODE “We have presented the potential of an improved
AES-DES solution as a system that supports the
current AES architecture. With these estimates,
remote exchanges, electronic payment exchanges,
credit cards, video It creates a generally more secure
and attack-resistant encryption method that can be
used in various areas such as disk systems. This
article describes the use of 128 AES devices in
equipment. The numbers were connected using Xilinx
and Modelsim,” and the results were “verified using
standard test vectors.” Estimation is performed by
Figure-11: AECS_DEC Verilog. Implementing AES integration on equipment
actually improves throughput efficiency, regardless of
whether zone integrity and speed switching are
compromised in each case due to equipment usage.
The improved AES-DES considers strategies to
enhance current AES plans. This model provides
better nonlinearity than simple AES and converges
with DES, resulting in better resolution and "less
likely" logarithmic traps in the model.
IX.FUTURE SCOPE
This proposed computation can be made many times
Figure-12: AES Decryption Design summary more surprisingly secure by extending the number of
(draw table for design summary)” accents in the cryptographic computation to adapt it
to the required security level. You can also "apply" a
The final structural overview of the project is shown retrograde process that reduces the number of accents
in the image above. This design brief was completed to reduce security.
assuming the use of an FPGA. IOB testing is very
expensive but is often overlooked by reducing "Moved Encryption Standard (AES) is the most
information and yield parameters. B. When accepting secure symmetric encryption method with expanded
information and keys as information one after another overall authentication. AES is a profitable Methods
and displaying image messages individually to such as Sub Bytes (S-Box) ensure higher security and
translate the content. This can cause the IOB to drop faster encryption/decryption. Subbyte and key
to very low levels. The remaining basic principles schedule. Extensive research has been done on S-
prevent usage from becoming very low. This way you Box/Inv movement. S-Box and Mix Columns/Inv.
can realize your project on his FPGA board Mix columns in submitted ASICs and FPGAs to
mentioned above. ” animate AES calculations and reduce circuit area.
"reduced."
VII. APPLICATONS
1) Can be used for smart card security, remote REFFERNCES
sensor framework, remote work framework. [1] Behrouz A. Forouzan, Cryptography and
2) AES has high computational efficiency and can Network security, TMH
be used in high-speed applications such as [2] M.B Vishnu, S.K. Tiong, Zaini M, Koh S P,
broadband connections. “Security Enhancement of Digital Motion
Image Transmission using Hybrid AES-DES
@ IJTSRD | Unique Paper ID – IJTSRD64771 | Volume – 8 | Issue – 2 | Mar-Apr 2024 Page 842
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
[3] algorithm,” 14th Asia-Pacific Conference on [17] S,Lara , Accelerating algorithms in hardware,
Communications, APCC 2008, pp 1-5,2008 date
visited:(10/06/2008)http://www.embedded.com
[4] Maire McLoone, John V. McCanny, ”High
/show/Article.jhtml?articleID=175 00157
Performance Single Chip FPGA Rijndael
Algorithm Implementations,” Proceedings of [18] NIST, Advanced Encryption Standard (AES),
the Third International Workshop on (FIP PUB 197) http://csrc.nist.gov/publications
Cryptographic Hardware & Embedded Systems [19] Wikipedia: www.wikipedia.org.
, Springer-Verlag London UK, ISBN:3-54
[5] Sanchez-Avila, C.; Sanchez-Reillol R, “The
Rijndael block cipher: A comparison with
DES,” 35th IEEE International Carnahan
conference on Security Technology, pp229-
234, 2001
[6] McLoone, M. McCanny, J.V, “A high
performance FPGA implementation of DES ,”
IEEE Workshop on Signal Processing Systems,
SiPS 2000,pp 374-383,2000
[7] Standaert, F.-X, Rouvroy G, Quisquater, J.- J,“
FPGA Implementations of the DES and Triple-
DES Masked Against Power Analysis Attacks,”
International conference on Field
Programmable Logic and Applications, FPL
'06. pp 1-4, 2006
[8] Saeid Taherkhani, Enver
EveOrhanGemikonaklir, “Implementation of
Non- Pipelined and PipelinedData Encryption
Standard (DES) Using Xilinx Virtex -6 FPGA
Technology,” 10thComputer & Information
Technology(CIT 2010), pp 1257-1262, 2010
[9] Design of VLSI system by Dr Danial J. Miynek
[10] William Stallings, Cryptography and Network
Security: Principles and Practice, 2nd ed.,
Prentice-Hall, Inc. 2000.
[11] http://www.xilinx.com
[12] M.Pitchaiah, Philemon Deniel, Praveen 2012
"Implementation of Advanced Encryption
Algorithm" International Journal of Scientific
& Engineering Research ISSN 2229-5518.
[13] Behrouz A. Forouzan, "Cryptography and
Network Security" TMH.
[14] Gireesh Kumar P, P. Mahesh Kumar 2013
"Implementation of AES Algorithm Using
Verilig " International Journal of Embedded
systems ISSN 2249-6556.
[15] Data Encryption Standard (DES) ,Federal
Information Processing Standards Publication
(FIPS PUB 46-3)Reaffirmed
[16] William Stallings “Cryptography and network
Security” Principles and practise Fourth Edition
@ IJTSRD | Unique Paper ID – IJTSRD64771 | Volume – 8 | Issue – 2 | Mar-Apr 2024 Page 843