A Modified Rijndael Algorithm and it’s Implementation on FPGA

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Faculty of Information Engineering and Technology IET Majors Orientation Prof. Yasser Hegazy Dean of IET.
1 Streaming Integral Image Generation on FPGA Michael DeBole Acknowledgements: K. Irick The Pennsylvania State University Department of Computer Science.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 8-Bit Barrel Shifter Cyrus Thomas Ekemini Essien Kuang-Wai (Kenneth) Tseng Advisor: Dr. David Parent December 8, 2004.
The Advanced Encryption Standard (AES) Simplified.
Electronics’2004, Sozopol, September 23 Design of Mixed Signal Circuits and Systems for Wireless Applications V. LANTSOV, Vladimir State University
SECURING THE CLOUDS Presented By: Dr. Mohammed Imtiaz Ahmed Librarian, Pt. Ravi Shankar Shukla University Raipur (C.G), Mohammed Bakhtawar Ahmed.
Institute of Applied Microelectronics and Computer Engineering © 2014 UNIVERSITY OF ROSTOCK | College of Computer Science and Electrical Engineering.
FPGA Design Flow Design Circuit Simulation Implementation Programming.
WiMAX Introduction Worldwide Interoperability for Microwave Access
History Applications Attacks Advantages & Disadvantages Conclusion.
Advanced Encryption Standard. This Lecture Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key.
AE 495 Project Progress Report XX Presentation, Put Date Here Put Your Presentation Title Here Names of the students in your group Department of Aerospace.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage VII: March 1 st 2004.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Network Security Chapter
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
Kevin Orr JT Schratz AES ENCRYPTION. OVERVIEW History Algorithm Uses Brute Force Attack.
Final presentation Encryption/Decryption on embedded system Supervisor: Ina Rivkin students: Chen Ponchek Liel Shoshan Winter 2013 Part A.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
1 Electronics Lab, Physics Dept., Aristotle Univ. of Thessaloniki, Greece 2 Micro2Gen Ltd., NCSR Demokritos, Greece 17th IEEE International Conference.
Institute of Applied Microelectronics and Computer Engineering College of Computer Science and Electrical Engineering, University of Rostock Slide 1 Spezielle.
Institute of Applied Microelectronics and Computer Engineering College of Computer Science and Electrical Engineering, University of Rostock Slide 1 Spezielle.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
InfraRed Chat System Graduation Project 2. Introduction Now a day many systems are working hard to make different types of data transformation.One of.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Low-Power and Area-Efficient Carry Select Adder on Reconfigurable Hardware Presented by V.Santhosh kumar, B.Tech,ECE,4 th Year, GITAM University Under.
Estimation of IQ vector components of RF field - Theory and implementation M. Grecki, T. Jeżyński, A. Brandt.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
FPGA Implementation of RC6 including key schedule Hunar Qadir Fouad Ramia.
DES: Data Encryption Standard
An optimization of the SAFER+ algorithm for custom hardware and TMS320C6x DSP implementation. By: Sachin Garg Vikas Sharma.
1 Commutative Encryption and Watermarking in Video Compression Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007.
The Advanced Encryption Standard Part 1: Overview
Encryption / Decryption on FPGA Midterm Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
Data Structures Dr. Abd El-Aziz Ahmed Assistant Professor Institute of Statistical Studies and Research, Cairo University Springer 2015 DS.
Overview on Hardware Security
INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.
Triple DES.
PreOpenSeesPost: a Generic Interface for OpenSees
FPGA Implementation of Multicore AES 128/192/256
Aishwarya Suresh Wagh Under the Guidance of Prof.Dr.M.P.Satone Secure Symmetric Authentication for RFID Tags.
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Towards OPEN SUNY: A Novel On-line Learning Approach for Electrical and Computer Engineering and Engineering Technology Students By Dr. Mohammed Abdallah.
Towards OPEN SUNY: A Novel On-line Learning Approach for Electrical and Computer Engineering and Engineering Technology Students By Dr. Mohammed Abdallah.
Multiplexer Implementation of Digital Logic Functions
A. P. Shah Institute of Technology
AES (Advance Encryption Standard)
Secure Execution Crypto Microprocessor
Advanced Encryption Standard
專 題 生:吳芮綺 Jui-Chi Wu 指導教授:吳重雨 Chung-Yu Wu
Microgrid Converter Modeling and Control
A. P. Shah Institute of Technology
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Dr. Ahmed ElShafee, Graduation Project I Presentation Template
Advanced Encryption Standard
Presentation transcript:

A Modified Rijndael Algorithm and it’s Implementation on FPGA Information Engineering & Technology German University In Cairo Department of Electronics and Electrical Engineering A Modified Rijndael Algorithm and it’s Implementation on FPGA Ahmed Abou-Bakr Mohamed Electronics Dept., Information Engineering & Technology German University in Cairo (GUC) Dr. Ahmed Hasan Madian Assistant Professor, Electronics Dept.,

Outline Introduction Rijndael Algorithm Implementation Modified Rijndael Implementation results Conclusion Dr. Ahmed H. Madian

Introduction In 1998 the DES has been expired as security algorithm National Institute of Standards and Technology (NIST) initiates a process to develop an Advanced Encryption Standard (AES) On November 26, 2001 NIST announced that the Rijndael encryption algorithm became the AES 3

Rijndael Developed by two Belgian cryptographers where it’s based on SP-Networks. The ciphering process is divided into three stages: Key Expansion Rounds Final Round C. Chitu and M. Glesner, An FPGA implementation of the AES-Rijndael in OCB/ECB modes of operation, Microelectronics Journal 36 (2005) 139146, 21 October, 2004. RIJNDAEL BLOCK DIAGRAM

1- Substitution It’s a non linear operation were 128 bit data is broken down into 16 chunks, 8 bits each, each of which is used as the address for S-box look up table.

1- Substitution (cont’d) Substitution Simulation

2- Inverse Substitution Inverse Substitution Simulation

3- Shift Rows Cyclically permutes the rows of the input data to the left.

3- Shift Rows (cont’d) Shift Rows Simulation

4- Inverse Shift Rows Cyclically permutes the rows of the input data to the right.

4- Inverse Shift Rows (cont’d) Inverse Shift Rows Simulation

5- Mixing Columns P • S S’ = Computes a new matrix S' by multiplying two matrices together the current matrix S by the polynomial matrix P. 2 3 1 S11 S12 S13 S14 S21 S22 S23 S24 S31 S32 S33 S34 S41 S42 S43 S44 S’ =

5- Mixing Columns (cont’d) Multiplication By ‘1’: The Data remains the same. Multiplication By ‘2’: The 8 bit data is left shifted by 1 bit. The least significant bit is replaced by 0. Then the most significant bit of the original data is used for comparison (a) If it is 0, then the left shifted data is the result. (b) If it is 1, then the left shifted value is XORed with the reduction polynomial, which in our case is 00011011, to generate the result.

5- Mixing Columns (cont’d) Multiplication By 2 Simulation Multiplication By ‘3’: We simply XOR the original input with the result of multiplication by 2.

5- Mixing Columns (cont’d) Mixing Columns Simulation

7- Key Expansion One of the functions that ensures that a cryptography algorithm is not vulnerable. Generates ten matrices using the round constant matrix. The key expansion process is divided mainly into three operations: Rotation Substitution Xoring

7- Key Expansion (cont’d) Rotation: Rotates a 32 bit input one byte to the left. Substitution: Similar to the one described above. Xoring: Bit wise xor operation of corresponding bits.

7- Key Expansion (cont’d) Row 6 contains the results from xoring row 5 and row 2 together. To get row 5, row 4 is rotated, substituted and the xored with row 1 of the round constant matrix. Finally the output of such an operation is then xored with row 1 to get row 5.

7- Key Expansion (cont’d) During the implementation only one matrix was generated, due the delay that will be caused since that each new row depends on the previous one. Key Expansion Simulation

8- Round Key Addition It simply performs a bit wise xor operation of the expanded round key with another input.

8- Round Key Addition (cont’d) Round Key Addition Simulation

Modified Rijndael Algorithm

9- Proposed Stage Of Modified Rijndael Mirror Inverse Mirror Doesn’t require any arithmetical or logical operations thus routing was used during implementation.

9- Proposed Stages for Rijndael Modification (cont’d) Mirror Simulation Inverse Mirror Simulation

10- Encryption / Decryption

10- Encryption / Decryption (cont’d) Encryption / Decryption FSM

10- Encryption / Decryption (cont’d)

Implementation results Category Used Total Available % Used Slice Flip Flops 3658 18816 19% Slices 7148 9408 75%

Conclusion Modified Rijndeal algorithm has been presented The modification done with adding new stage mirror stage which doesn’t require bigger hardware area. The system has been simulated and implemented on FPGA with total area of 75% and max. frequency of 44MHz.

Thanks