Low Cost Aes Crypto Core
نویسندگان
چکیده
AES (Advanced Encryption Standard) is state of the art symmetric cipher. This study illustrates a new approach to low cost and efficient implementation of AES cipher on 8 bit microprocessors. This crypto processor implementation is recommended for low speed applications where cost, availability and ease of developing and manufacturing comes in. Most efficient possible implementation of Galois field multiplication and key expansion on 8 bit microprocessors is demonstrated. Decryption algorithm is modified for two way communication without any overhead. Two modes of operations are considered, Electronic Codebook and Counter mode. Counter mode is further optimized for lowest latency due to its pre-processing feature.
منابع مشابه
Low Power Circuit Architecture of AES Crypto Module for Wireless Sensor Network
Recently, much research has been conducted for security for wireless sensor networks and ubiquitous computing. Security issues such as authentication and data integrity are major requirements to construct sensor network systems. Advanced Encryption Standard (AES) is considered as one of candidate algorithms for data encryption in wireless sensor networks. In this paper, we will present the hard...
متن کاملSpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Emerging applications such as the Internet of Things require security solutions that are small and low cost, yet feature solid protection against a wide range of sophisticated attacks. Lightweight cryptographic schemes such as the Speck cipher that was recently proposed by the NSA aim to solve some of these challenges. However, before using Speck in any practical application, sound protection a...
متن کاملDesign of an ultra high speed AES processor for next generation IT security
The Advanced Encryption Standard (AES) has added new dimension to cryptography with its potentials of safeguarding the IT systems. This paper presents the design of an ultra high speed AES processor to generate cryptographically secured information at a rate of multi-ten Gbps. The proposed design addresses the next generation IT security requirements: the resistance against all crypto-analytica...
متن کاملEnhanced Flush+Reload Attack on AES
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
متن کاملPerformance Measurement of AES Crypto Algorithm in Microcode Environment of IXP2400 Platform
In this report first i highlight the mathematical properties of 128-bit AES encryption and then keeping these properties in view i port the algorithm in microcode environment of the IXP2400 platform. Then I do some performance measurement based on the memory optimization and thread optimization. I apply a pipelined and best parallelized approach of implementing the AES algorithm. I also studied...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013