A modernistic architecture of masked Advanced Encryption Standard algorithm for SAN

نویسنده

  • Vasantha Kumara
چکیده

The present information and technology processed by computers to access the private information like video conferencing, account status in bank, e – transaction of money and business deals through internet for all these encryption of the information in various forms are necessary. So to protect the information from different attacks using symmetric or asymmetric key encryption by adding the random value to the intermediate result is called masking. In terms of computational complexity symmetric key algorithm is less complex than the asymmetric or multiple key algorithms. The aim is to provide the data security to the storage area network and also the proposed method is to optimize the masked AES with the unrolled structure and it can be achieved through mapping operation. Hence to optimize the area of masked AES only needs to map the plain text and masking values from Galois Field 256 (GF (2 8 )) to Galois Field 16 (GF(2 4 )) once at the start of the operation and map the cipher text back from Galois Field 16 to Galois Field 256 once at the end of the operation. So just moving masking operation as well as the inverse mapping operation outside the masked advanced encryption standard algorithm round function area can

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

Parallel AES Encryption Engine for Many Core Processor Arrays Using Masked S-Box

With the ever increasing growth of data communication, hardware encryption technology will become an irreplaceable safety technology. In this paper, I present a method of AES encryption and decryption algorithm with 128 bit key on an FPGA. In order to protect “data-at-rest” in memory from differential power analysis attacks with high-throughput advanced encryption standard (AES) engine with mas...

متن کامل

Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures

This Paper presents a systolic architecture for Advanced Encryption standard (AES). Use of systolic architecture has improved the hardware complexity and the rate of encryption/decryption. Similarities of encryption and decryption are used to provide a high performance using an efficient architecture. The efficiency of the design is quite high due to use of short and balanced combinational path...

متن کامل

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015