2007 International Conference on Signal Processing, Communications and Networking 2007
DOI: 10.1109/icscn.2007.350770
|View full text |Cite
|
Sign up to set email alerts
|

High Speed VLSI Design CCMP AES Cipher for WLAN (IEEE 802.11i)

Abstract: The Advanced Encryption Standard (AES) algorithm has become the default choice for various security services in numerous applications. In this paper, we propose a high speed, non-pipelined FPGA implementation of the AES-CCMP (Counter-mode/CBC-MAC Protocol) cipher for wireless LAN using Xilinx development tools and Virtex-It Pro FPGA circuits. IEEE 802.11i defines the AES-based cipher system, which is operated on CCMP Mode. All the modules in this core are described by using Verilog 2001 language. The developed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…In scheme II, TCPU-D(II) =TD-CPU(II)=0. As in [6], there is significant difference between the hardware AES decryption and the software decryption. That means, TD(III)=TD(IV)<<TD(II).…”
Section: Experiments Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In scheme II, TCPU-D(II) =TD-CPU(II)=0. As in [6], there is significant difference between the hardware AES decryption and the software decryption. That means, TD(III)=TD(IV)<<TD(II).…”
Section: Experiments Results and Analysismentioning
confidence: 99%
“…These contain 3.960Mb data. As in [6], AES algorithm based on hardware can reach a performance of 1.722 Gb/s for decryption. It means hardware can process 34.44Mb data in one frame; these are larger than an image of 1920*1080 pixels, 16 depth bits.…”
Section: Manufacturing Engineering and Processmentioning
confidence: 99%
“…The implementation of AES-CCMP protocol and it is analyzed with the DES and RSA algorithm. The comparative analysis took part in the Wireless medium (Daemen and Rijmen, 1998;Doomun and Soyjaudah, 2008;Islam et al, 2008;NIST, 1993;Samiah et al, 2007;Sanchez-Avila and Sanchez-Reillo, 2001;Schneier and Whiting, 2000;Sivakumar and Velmurugan, 2007;Smyth et al, 2006;Stallings, 2013 Fig. 1.…”
Section: Introductionmentioning
confidence: 99%