Advanced Encryption Standard For Smart Card Security Aiyappan Natarajan David Jasinski Kesava R.Talupuru Lilian Atieno Advisor: Prof. Wayne Burleson.

Slides:



Advertisements
Similar presentations
Computer Architecture
Advertisements

CMSC 611: Advanced Computer Architecture
Programmable Interval Timer
TK2633 Introduction to Parallel Data Interfacing DR MASRI AYOB.
Processor System Architecture
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Advanced Encryption Standard For Smart Card Security Aiyappan Natarajan David Jasinski Kesava R.Talupuru Lilian Atieno Advisor: Prof. Wayne Burleson.
Algorithm Scheme. AddRoundKey Each round uses four different words from the expanded key array. Each column in the state matrix is XORed with a different.
The Control Unit: Sequencing the Processor Control Unit: –provides control signals that activate the various microoperations in the datapath the select.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 3: Feb. 4 th Size Estimates/Floorplan Overall Project Objective: Design an.
AES clear a replacement for DES was needed
Mahapatra-Texas A&M-Fall'001 cosynthesis Introduction to cosynthesis Rabi Mahapatra CPSC498.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
VHDL AES 128 Encryption/Decryption
Lecture 23 Symmetric Encryption
Advanced Verilog EECS 270 v10/23/06.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
INPUT-OUTPUT ORGANIZATION
Study of AES Encryption/Decription Optimizations Nathan Windels.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Registers CPE 49 RMUTI KOTAT.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Digital Logic Design.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
80386DX functional Block Diagram PIN Description Register set Flags Physical address space Data types.
Another Example: MIPS From the Harris/Weste book Based on the MIPS-like processor from the Hennessy/Patterson book.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Computer Organization CDA 3103 Dr. Hassan Foroosh Dept. of Computer Science UCF © Copyright Hassan Foroosh 2002.
AES Encryption FIPS 197, November 26, Bit Block Encryption Key Lengths 128, 192, 256 Number of Rounds Key Length Rounds Block.
RTL Design Methodology Transition from Pseudocode & Interface
Final Presentation Encryption on Embedded System Supervisor: Ina Rivkin students: Chen Ponchek Liel Shoshan Spring 2014 Part B.
Lecture 3 RTL Design Methodology Transition from Pseudocode & Interface to a Corresponding Block Diagram.
Department of Electronic & Electrical Engineering Serial interfaces Serial Interfaces allow communication between devices sending one bit at a time. In.
Serial Peripheral Interface SPI I2C (i-squared cee)
Encryption / Decryption on FPGA Final Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
Teaching Digital Logic courses with Altera Technology
ECE DIGITAL LOGIC LECTURE 20: REGISTERS AND COUNTERS Assistant Prof. Fareena Saqib Florida Institute of Technology Fall 2015, 11/19/2015.
MICROPROCESSOR DETAILS 1 Updated April 2011 ©Paul R. Godin prgodin gmail.com.
1 Basic Processor Architecture. 2 Building Blocks of Processor Systems CPU.
The Advanced Encryption Standard Part 1: Overview
Encryption / Decryption on FPGA Midterm Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
KEYBOARD/DISPLAY CONTROLLER - INTEL Features of 8279 The important features of 8279 are, Simultaneous keyboard and display operations. Scanned keyboard.
RTL Design Methodology Transition from Pseudocode & Interface
1 Input-Output Organization Computer Organization Computer Architectures Lab Peripheral Devices Input-Output Interface Asynchronous Data Transfer Modes.
Processor (I).
Design Flow System Level
Instructor: Alexander Stoytchev
Data Security and Encryption (CSE348)
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
8086 Ahad.
Computer Architecture and Design Lecture 6
Fifth Edition by William Stallings
The Encryption Standards
International Data Encryption Algorithm
RTL Design Methodology Transition from Pseudocode & Interface
Course Outline for Computer Architecture
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Presentation transcript:

Advanced Encryption Standard For Smart Card Security Aiyappan Natarajan David Jasinski Kesava R.Talupuru Lilian Atieno Advisor: Prof. Wayne Burleson

Outline  Recap - Aiyappan  System Interface - Aiyappan  Key Expansion - David  Encryption 1 - Lilian  Encryption 2 – Kesava  Future Work – Kesava

I/P Rdy_in Processor FSM EncryptKey Sched I/P FSM O/P FSM O/P 128 clk Reset clk Reset Ready O/P Request O/P start send clk Reset Key Sub key System Architecture Data/Key Reg. Module

Processor Finite State Machine The main controller for all the other modules Controlled by two signals Reset and start Gets instructions stored in the memory Decodes instructions Enables the appropriate signals

Input Controller Communicates with external system through a serial I/O pin Gets the input data and key from the external system Gives the 128-bit parallel data to data/key register module Controlled by processor

Data/Key register module Stores input data and key in the appropriate registers Controlled by processor through two control signals mux_en, d_k

Output Controller Sends the output data to the external system Controlled by processor Data transfer through serial I/O pin External communication through handshaking signals

ExternalSystem InputControllerFSM ProcessorFSM Data/Key Register Serial I/O send Rdy_inRdy_Out rec_data clkResetclk128 Parallel Data Reset Mux_end_k clk Data Key Processor – Input Controller Interface PC instr 2 3

Simulation Results

Simulation Results (contd.)

Processor - Output Controller Interface Encrypted Data ExternalSystem OutputControllerFSM ProcessorFSM Serial I/O clk 128 clk Send_data Data_rdy Reset sentOutput_data instrPC 2 3

Simulation Results

Work completed RTL code for all the modules Test bench for each module Simulation for each module Integrated the Processor, Data/key register, Input and Output controller Test bench for the integrated top module Simulation for the top module

Work to be done Integrate the Encryption core and Key scheduling core along with the interface Test Bench for the entire interface Synthesize each module Simulation for synthesized netlist Synthesize the total integrated module Simulation for the entire system

Key Expansion Outline  Reminder of what Key Expansion is  Update on the progress in this module  Update on what still needs to be done

Key Scheduling  Input: 128 bit Key  Output: 1408 bit Expanded Key  Process: –Word rotation –Look up Tables –XOR operations

Completed Work  Behavioral Model (~481 lines of verilog code)  RTL code (~422 lines of verilog code)  Synthesized RTL code (~30,000 gates) –With warnings  Error Propagation

Behavioral Functionality

Synthesized Design

Error Propagation

What Needs to Be Done  Power Analysis  Gate Level Timing Analysis  Design Optimization

ShiftRow() Transformation bit data is broken down into four rows -Each of the 32-bit rows contains 4 bytes. -The first row is not shifted. -The last three rows of the State are byte-wise cyclically shifted as shown in the next slide.

no shift

Mix column() Transformation - Operates on State column-by-column. - Each column is treated as a four-term polynomial. -The four bytes in the four “rows” are used for matrix multiplication in GF(2 8 ) as shown below.

BLOCK DIAGRAM FOR MIX COLUMN Left shift by 1 bit x1 XOR

Key Add SubstitutionShift RowMix ColumnKey Add SubstitutionShift RowKey Add Sub Key ED Raw Data Encryption Algorithm Flow Sub Key Repeat (Round-1) times

Sub_bytes Transformation SSS SSS …… Input Output

Add Round key Operation ABC D E F G H I J K L M N O P A1 B1 C1 D1 E1 F1 G1 H1 I1 J1 K1 L1 M1 N1 O1 P1 A2 B2 C2 D2 E2 F2 G2 H2 I2 J2 K2 L2 M2 N2 O2 P2 = StateKey Output

State Diagram for Encryption Algorithm S0 S2 S3 S1 Count=1 Count=2 Repeat until Count =10 Count=11 Roll back to S0

Future Work  Integrate all modules  Synthesize all modules  Power Estimation for the integrated system  Repeat all previous steps for the Decryption module