2014 International Conference on Contemporary Computing and Informatics (IC3I) 2014
DOI: 10.1109/ic3i.2014.7019744
|View full text |Cite
|
Sign up to set email alerts
|

FPGA implementation of enhanced key expansion algorithm for Advanced Encryption Standard

Abstract: Cryptography is a technique related to aspects of information security such as data confidentiality, data integrity and entity authentication. In data and telecommunication systems, Security is the most important part for an effective communication, where to increase the security as well as complexity, more randomization in secret keys is necessary to enhance the cryptography algorithms. In traditional AES, Even though the round keys have high security, Power analysis attack and Saturation attack are effective… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…Most of the AES processes are done in a particular finite field. Hence, if there are 16 bytes A0, A1, A2…A15 these bytes are represented as two dimensional arrays [4,16].…”
Section: Fig 1 the Aes Encryption Systems Steps Of Each Roundmentioning
confidence: 99%
See 2 more Smart Citations
“…Most of the AES processes are done in a particular finite field. Hence, if there are 16 bytes A0, A1, A2…A15 these bytes are represented as two dimensional arrays [4,16].…”
Section: Fig 1 the Aes Encryption Systems Steps Of Each Roundmentioning
confidence: 99%
“…However, the security of DES was reduced because of the short length key. Different attacks are capable of hacking DES in less than 255 complexities; in order to replace the DES it was important to find a stronger encryption algorithm [4,5]. It was interesting to find an alternative encryption method instead of DES to avoid the attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The Enhanced Key Expansion unit requires space for only storing one round key, and thus generates the round keys on the fly. The traditional key expansion algorithm is prone to saturation and power analysis attacks, hence, we instead employ enhanced key expansion algorithm [26] to generate round keys which is given in the equations (9)- (12):…”
Section: Enhanced Key Expansion Unitmentioning
confidence: 99%
“…It can both increase the difficulty of brute force AES and can effectively prevent the weaknesses of a variety of AES key expansion attack, and will not affect the speed of its 514 | P a g e www.ijacsa.thesai.org current run. [11]. In HLES algorithm, the key is divided to four parts of 128-bit that are expanded to occupy 10 rounds.…”
Section: B Key Expansion and Roundsmentioning
confidence: 99%