2021
DOI: 10.1088/1742-6596/1979/1/012066
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Counter Clock Gated S-Box Transformation Based AES Algorithm of Low Power Consumption and Dissipation in VLSI System Design

Abstract: Advanced Encryption Standard (AES) is an effective algorithm trending today. According to the key length, it works efficiently. Here three types of key lengths are used such as 128, 192, and 256 bits. This paper introduced an Adaptive Counter-Clock (ACC) S-Box algorithm. This algorithm rectifies the error during data encryption and secure data from hackers. In this paper, we have done power consumption, power dissipation, and reduced the area size. Field Programmable Gate Array (FPGA) is utilized for hardware … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Another work 32 compared the scalability, memory, power, and area consumption between AES and eXtendedTEA (XTEA). The research work in Reference 33 proposed an Adaptive Counter clock (ACC) technique in the AES S‐box algorithm. With this technique, the authors rectified error in the AES iteration process and four stages of S‐box combinational logic was deployed.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Another work 32 compared the scalability, memory, power, and area consumption between AES and eXtendedTEA (XTEA). The research work in Reference 33 proposed an Adaptive Counter clock (ACC) technique in the AES S‐box algorithm. With this technique, the authors rectified error in the AES iteration process and four stages of S‐box combinational logic was deployed.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a conventional architecture, each step or process of subkey generation must be delayed until the previous Similarly, multiple keys are generated from the designed FJMKE architecture, and it is used to accomplish the encryption over multiple plain texts. For example, the generation of W15 using the FJMKE architecture is expressed in the following Equation (8).…”
Section: Fjmke Architecturementioning
confidence: 99%
“…The methods of encryption/decryption are classified into two types such as symmetric and asymmetric methods. In that, symmetric cryptography uses only one key for encryption and decryption, whereas asymmetric cryptography uses two distinct keys to accomplish the encryption and decryption [7][8][9]. Symmetric cryptography is extensively used among all cryptographic methods due to its low energy necessities and simplicity.…”
Section: Introductionmentioning
confidence: 99%
“…Besides being competent, unnoticeable, and robust, the least significant bit (LSB) steganography is among the most reliable methods for image steganography. It has been widely employed to conceal text behind images in various fields, including encryption, anti-hacking, and secure online data sharing [11], [12]. In the initial phase of this investigation, a video file was read and converted into frames.…”
Section: Introductionmentioning
confidence: 99%