Javascript must be enabled to continue!
FPGA Implementation of Protected Compact AES S–Box Using CQCG for Embedded Applications
View through CrossRef
In this work, we obtain an area proficient composite field arithmetic Advanced Encryption Standard (AES) Substitution (S) byte and its inverse logic design. The size of this design is calculated by the number of gates used for hardware implementation. Most of the existing AES Substitution box hardware implementation uses separate Substitution byte and its inverse hardware structures. But we implement the both in the same module and a control signal is used to select the substitution byte for encryption operation and its inverse for the decryption operation. By comparing the gate utilization of the previous AES S–Box implementation, we reduced the gate utilization up to 5% that is we take only 78 EX-OR gates and 36 AND gates for implementing the both Substitution byte and its inverse. While implementing an AES algorithm in circuitry or programming, it is liable to be detected by hackers using any one of the side channel attacks. Data to be added with a random bit sequence to prevent from the above mentioned side channel attacks.
Title: FPGA Implementation of Protected Compact AES S–Box Using CQCG for Embedded Applications
Description:
In this work, we obtain an area proficient composite field arithmetic Advanced Encryption Standard (AES) Substitution (S) byte and its inverse logic design.
The size of this design is calculated by the number of gates used for hardware implementation.
Most of the existing AES Substitution box hardware implementation uses separate Substitution byte and its inverse hardware structures.
But we implement the both in the same module and a control signal is used to select the substitution byte for encryption operation and its inverse for the decryption operation.
By comparing the gate utilization of the previous AES S–Box implementation, we reduced the gate utilization up to 5% that is we take only 78 EX-OR gates and 36 AND gates for implementing the both Substitution byte and its inverse.
While implementing an AES algorithm in circuitry or programming, it is liable to be detected by hackers using any one of the side channel attacks.
Data to be added with a random bit sequence to prevent from the above mentioned side channel attacks.
Related Results
Method of QoS evaluation of FPGA as a service
Method of QoS evaluation of FPGA as a service
The subject of study in this article is the evaluation of the performance issues of cloud services implemented using FPGA technology. The goal is to improve the performance of clou...
Аналіз застосування технологій ПЛІС в складі IoT
Аналіз застосування технологій ПЛІС в складі IoT
The subject of study in this article and work is the modern technologies of programmable logic devices (PLD) classified as FPGA, and the peculiarities of its application in Interne...
Methods of Deployment and Evaluation of FPGA as a Service Under Conditions of Changing Requirements and Environments
Methods of Deployment and Evaluation of FPGA as a Service Under Conditions of Changing Requirements and Environments
Applying Field Programmable Gate Array (FPGA) technology in cloud infrastructure and heterogeneous computations is of great interest today. FPGA as a Service assumes that the progr...
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED]Keanu Reeves CBD Gummies ==❱❱ Huge Discounts:[HURRY UP ] Absolute Keanu Reeves CBD Gummies (Available)Order Online Only!! ❰❰= https://www.facebook.com/Keanu-Reeves-CBD-G...
Comparación de enfoques de desarrollo HDL y HLL en FPGA para aplicaciones de procesamiento de imágenes
Comparación de enfoques de desarrollo HDL y HLL en FPGA para aplicaciones de procesamiento de imágenes
Desde su invención a medidados de los 90, las FPGA han destacado por su gran poder de cómputo, bajo consumo energético y alta flexibilidad al reconfigurar su arquitectura interna p...
Minimum Adversarial Examples
Minimum Adversarial Examples
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: ...
2358. Safety Profiles of Three Major Types of COVID-19 Vaccine among Two Cohorts of People Living with HIV
2358. Safety Profiles of Three Major Types of COVID-19 Vaccine among Two Cohorts of People Living with HIV
Abstract
Background
Existing data on adverse effects (AEs) of COVID-19 vaccines among people living with human immunodeficiency ...
Identification and bioinformatics analysis of MADS-box family genes containing K-box domain in maize
Identification and bioinformatics analysis of MADS-box family genes containing K-box domain in maize
The MADS-box family genes are involved in the development of plant roots, leaves, flowers, and fruits, and play a crucial role in plant growth and development. Studying MADS-box ge...

