2015 Annual IEEE India Conference (INDICON) 2015
DOI: 10.1109/indicon.2015.7443814
|View full text |Cite
|
Sign up to set email alerts
|

FPGA implementation of an 8-bit AES architecture: A rolled and masked S-Box approach

Abstract: As network technology advances, information security issues increase the need for developing low-area and lowpower high performance real-time processing of cryptographic algorithms. In this paper, we present a novel 8-bit architecture for Advanced Encryption Standard (AES) encryption which supports keys of 128-bit in length. The proposed architecture consists of a single round of ShiftRows, ByteSubstitution, MixColumns and AddRoundKey operations through which the data is iterated for ten rounds, which results … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…SCA is one of attack models that utilizes side informations to obtain the secret key. A cryptographic device is a device that implements cryptographic algorithms on a hardware [6][7][8]. Power analysis is a type of SCA attacks that can reveal confidential information [9].…”
Section: Introductionmentioning
confidence: 99%
“…SCA is one of attack models that utilizes side informations to obtain the secret key. A cryptographic device is a device that implements cryptographic algorithms on a hardware [6][7][8]. Power analysis is a type of SCA attacks that can reveal confidential information [9].…”
Section: Introductionmentioning
confidence: 99%
“…In the past, the attack on a cryptographic system is viewed only theoretically. A conventional cryptanalyst generally uses linear, differential, and brute force technique to analyze and obtain the vulnerabilities of an encryption algorithm [1], [2]. The cryptanalyst represents the cryptographic algorithm as a mathematical object.…”
Section: Introductionmentioning
confidence: 99%
“…By that reason, we see a need of an examination on the vulnerabilities and the points of attacks of the MCU devices which will be used on the IoT devices. However, in fact, when a cryptographic algorithm implemented in hardware will produce high performance, it can be mass produced and low costly [1], [2], [3]. Common forms of cryptographic devices are universal serial bus (USB) tokens, smart card [4], chips, field programmable gate array FPGA [5], [6], and micro-controllers [7].…”
mentioning
confidence: 99%