Susrutha Babu Sukhavasi, S. Suparshya Babu, K. Elleithy, Abdelrahman Elleithy
{"title":"精通Rijndael算法的分析与实现,优化计算","authors":"Susrutha Babu Sukhavasi, S. Suparshya Babu, K. Elleithy, Abdelrahman Elleithy","doi":"10.1109/LISAT.2017.8001977","DOIUrl":null,"url":null,"abstract":"Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security in communications. In this paper, we have implemented 128 bit AES algorithm in hardware descriptive languages. Our proposed implementation has demonstrated efficient results in delay and area. Furthermore, we provide a comparison with the corresponding coding implementations.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis and implementation of proficient Rijndael algorithm with optimized computation\",\"authors\":\"Susrutha Babu Sukhavasi, S. Suparshya Babu, K. Elleithy, Abdelrahman Elleithy\",\"doi\":\"10.1109/LISAT.2017.8001977\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security in communications. In this paper, we have implemented 128 bit AES algorithm in hardware descriptive languages. Our proposed implementation has demonstrated efficient results in delay and area. Furthermore, we provide a comparison with the corresponding coding implementations.\",\"PeriodicalId\":370931,\"journal\":{\"name\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LISAT.2017.8001977\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2017.8001977","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis and implementation of proficient Rijndael algorithm with optimized computation
Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security in communications. In this paper, we have implemented 128 bit AES algorithm in hardware descriptive languages. Our proposed implementation has demonstrated efficient results in delay and area. Furthermore, we provide a comparison with the corresponding coding implementations.