Beruflich Dokumente
Kultur Dokumente
bits which is fixed with three different key sizes The sequence in which the operation is
128,192,256 bits. The operations are based on carried out is as follows:
Rinjdael algorithm. The input of AES algorithm is
128-bit or 16 byte data which can be specified as a Round 1:
block. The basic unit of processing in the AES
A. Add Round key.
algorithm is a byte. All byte values in the AES
algorithm will be presented as the concatenation of its Following Rounds:
individual bit values (0 or 1) between the braces in the
order (b7, b6, b5, b4, b3, b2, b1, b0). These bytes are A. Sub Bytes.
interpreted as finite field elements using a polynomial B. Shift Rows.
representation as follows C. Mix Column.
D. Add Round Key.
b7X7+ b6X6+ b5X5+ b4X4+ b3X3+ b2X2+ b1X+b0 =
Final Round:
This has the effect of moving positions of lower a) Byte Substitution subword()
positions in the row, while the lowest bytes wrap b) Rotation rotword()
around to the top of the row. c) Xor with RCON (round constant)
The input to key schedule is the cipher key
K. Key expansion generates a total of Nb(Nr + 1)
c) Mix Columns: words. The algorithm requires an initial set of Nb
Mix column is calculated using the below formula. words, and each of the Nr rounds requires Nb words
of key data. The resulting key schedule consists of a
linear array of 4-byte words, denoted [wi ], with i in
Ro 2311 a0 the range 0 ≤ i < Nb(Nr + 1).
R1 = 1 2 3 1 a1 The subword()function takes a four byte
R2 1123 a2 input and applies the byte substitution operation and
R3 3112 a3 produces an output word. The rotword() takes a word
[a0, a1, a2, a3] as input and performs a cyclic
Here a0, a1, a2, a3 is calculated using the permutation to produce [a1, a2, a3, a0] as output
polynomials as below word. The round constant word array rcon[i] is
a(x) = {2}x3 + {3}x2 + {1}x + {1}. calculated using the below formula in rinjdale finite
The mix column transformation operates on field.
the state column by column, treating each column as
rcon[i]= mod + + +x+1
a four term polynomial. The columns are considered
as polynomials over GF(28) and multiplied modulo The first Nk words of the expanded key are
x4 + 1 with a fixed polynomial a(x) which is got from filled with the cipher key. Every following word w[i]
the above formula. This can also written as a matrix is equal to the xor of previous word w[i-1] and the
multiplication word Nk positions earlier w[i-Nk]. For words in
s’(x) = a(x) s(x) positions that are a multiple of Nk, a transformation
is applied to w[i-1] prior to the XOR, followed by an
XOR with a round constant Rcon[i]. This
transformation consists of a cyclic shift of the bytes
in a word rotword() and byte substitution subword().
But in key expansion of 256-bit cipher if Nk=8 and i-
4 is a multiple of Nk then subword() function is
applied to w[i-1] prior to the xor. The algorithm for
the key expansion routine is:
w[i] = w[i-Nk] xor temp Inverse Shift Rows: The inverse shift rows operation
i=i+1 inverses the shift row operation in the encryption
} process by right shifting the elements in the rows.
end while Add Round Key: The add round key process is the
end same as that of the one in the encryption process.
Thus with all the above operations the algorithm for Inverse Mix Columns: In inverse mix column
the encryption of the data is as follows. Since it operation the same operation in the mix column is
begins and ends with the add round key operation done but with the different matrix as specified below.
there is no wasted un keyed step in the beginning or the algorithm for decryption process is:
the end.
Table 3 Algorithm for encryption Table 4 Algorithm for decryption
Here the simulation result shows the data, key used, Key(128/192/ Plain Text
cipher (encrypted data) and decrypted data. The next
step is to develop a hardware architecture using
VERILOG and FPGA.
IV.HARDWARE IMPLEMENTATION OF RIJNDAEL Key
Sbo
ENCRYPTION ALGORITHM schedul
Sub
Many hardware implementation of Rijndael er
encryption algorithm using VHDL is available. In Roun Shift rows
most of the case hardware implemetataion of AES Roun d Key
Cipher Text
Dr. M. Madheswaran has obtained his Ph.D. In [13], there are several test vectors for all
degree in Electronics Engineering from
Institute of Technology, Banaras Hindu
candidates of AES. Different test vectors are used to
University, Varanasi in 1999 and M.E test the proposed design. The test vectors for all the
degree in Microwave Engineering from case are given below: Plaintext: 00 11 22 33 44 55 66
Birla Institute of Technology, Ranchi, India. 77 88 99 aa bb cc dd ee ff
He has started his teaching profession in the
year 1991 to serve his parent Institution Key: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c
Mohd. Sathak Engineering College, 0d 0e 0f
Kilakarai where he obtained his Bachelor Degree in ECE. He has Cipher text: 69 c4 e0 d8 6a 7b 04 30 d8 cd b7 80 70
served KSR college of Technology from 1999 to 2001 and PSNA b4 c5 5a
College of Engineering and Technology, Dindigul from 2001 to
2006. He has been awarded Young Scientist Fellowship by the In Figures 4 gives the schematic proposed design and
Tamil Nadu State Council for Science and Technology and Senior 5,6 and 7, the simulation outputs of the
Research Fellowship by Council for Scientific and Industrial abovementioned test vectors of the encryption
Research, New Delhi in the year 1994 and 1996 respectively. He
has published 120 research papers in International and National
algorithms are given. The following figures show
Journals as well as conferences. His field of interest includes schematic diagram and simulation outputs of the
semiconductor devices, microwave electronics, optoelectronics and AES encryption .
signal processing. He is a Senior member of IEEE, Fellow of
IETE, and IE and member of ISTE
Appendix and Simulation Results
Figure 5 Simulation output of AES‐128 Encryption
Figure 6. Simulation output of AES‐192 Encryption
Figure 7.Simulation output of AES‐256 Encryption