International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 03, Issue 01, Jan-Feb, 2016 Pg. 12-16 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2016 IJEETE Page 12
AREA OPTIMIZED AND HIGH THROUGHPUT AES ALGORITHM BASED ON
PERMUTATION DATA SCRAMBLE APPROACH
Dilna.V
Dept. of Electronics and Communication Engineering
Amrita School of Engineering, Bengaluru Campus
Amrita Vishwa Vidyapeetham (University), India
dilnavnambiar@gmail.com
C. Babu
Dept. of Electronics and Communication Engineering
Amrita School of Engineering, Bengaluru Campus
Amrita Vishwa Vidyapeetham (University), India
c_babu@blr.amrita.edu
Abstract— In today’s scenario most of the things in
human life is E-banking where everything is faster
and smoother. With the various exchange of
electronics signals between any two servers or
systems, the money transactions can be done and
this process is E-banking. Third party software is
used for this E-banking feature where end to end
users are secured. The proposed AES algorithm
enhances the performance by resolving the security
related issues for E-banking features and provides
better throughput operations. The permutation step
involved in the proposed AES algorithm resembles
to Data Encryption Standard (DES) algorithm. The
mode of data transmission in the modified AES is
128 bit plaintext and keys which converted into four
32bit blocks and exclusion of shift row. Using this
feature not only area is optimized but also higher
throughput is achieved. The high potential usage of
same cryptographic algorithms risks the secure data
processing so advanced changes should be
incorporated. Design has been done using Verilog
and simulated using Modelsim. The design has been
synthesized using Xilinx for target device Vertex6.
Keywords—E-banking;Advanced Encryption
Standard (AES);Data Encryption Standard
(DES);Cryptographic algorithm.
I. INTRODUCTION
The Advanced Encryption Standard (AES)
algorithm has been accepted by U.S government.
AES specifies Federal Information Processing
Standard (FIPS) Publications are approved by
cryptographic algorithm. In cryptography AES
algorithm helps to protect the electronic data [1].
Cryptography algorithm performs two types of
operations, encryption and decryption. In encryption
process the plain text converted into cipher text
using with a key and in decryption it is converted
into a plain text using with another key. In
decryption part it performs the reverse operation of
encryption. Due to this conversion, the message
cannot be identified by the hackers. Encryption
operations perform in transmitter side and
decryption operations perform in receiver side. Two
types of keys in cryptographic algorithm are
asymmetric key and symmetric key. Asymmetric
key works different for encryption and decryption
that is for encryption it is public key and for
decryption it is private key. Symmetric key works
with one key used for encryption and decryption.
II. DESCRIPTION OF AES ALGORITHM
The AES algorithm is a symmetric block
cipher that operates on a 128 bits fixed block of
data. Key size is 128,192 and 256 depending on the
rounds 10, 12 and 14 respectively. The AES
encryption process works on four operations such as
Substitute byte, Shift row, Mix-column and Add
round key [2]. The decryption process also use four
operations and can be listed as Inverse Substitute
byte, Inverse shift row, Inverse Mix-column and
Inverse Add round key. Each round in encryption
and decryption except the last round are using four
operations. At the final processing round, the Mix-
column and Inverse Mix-column operations are
getting bypassed in encryption and decryption
process respectively.
1. AES ENCRYPTION
All operation in AES is byte oriented.128 bit
plaintext contains 16 bytes (b0, b1….b15). These
bytes arranged in a 4x4 matrix. Substitute byte, Shift
row, Mix-column and Add round key are major
steps in AES encryption.