International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 03, Issue 01, Jan-Feb, 2016 Pg. 12-16 WWW.IJEETE.COM ISSN 2394-0573 All Rights Reserved © 2016 IJEETE Page 12 AREA OPTIMIZED AND HIGH THROUGHPUT AES ALGORITHM BASED ON PERMUTATION DATA SCRAMBLE APPROACH Dilna.V Dept. of Electronics and Communication Engineering Amrita School of Engineering, Bengaluru Campus Amrita Vishwa Vidyapeetham (University), India dilnavnambiar@gmail.com C. Babu Dept. of Electronics and Communication Engineering Amrita School of Engineering, Bengaluru Campus Amrita Vishwa Vidyapeetham (University), India c_babu@blr.amrita.edu AbstractIn today’s scenario most of the things in human life is E-banking where everything is faster and smoother. With the various exchange of electronics signals between any two servers or systems, the money transactions can be done and this process is E-banking. Third party software is used for this E-banking feature where end to end users are secured. The proposed AES algorithm enhances the performance by resolving the security related issues for E-banking features and provides better throughput operations. The permutation step involved in the proposed AES algorithm resembles to Data Encryption Standard (DES) algorithm. The mode of data transmission in the modified AES is 128 bit plaintext and keys which converted into four 32bit blocks and exclusion of shift row. Using this feature not only area is optimized but also higher throughput is achieved. The high potential usage of same cryptographic algorithms risks the secure data processing so advanced changes should be incorporated. Design has been done using Verilog and simulated using Modelsim. The design has been synthesized using Xilinx for target device Vertex6. KeywordsE-banking;Advanced Encryption Standard (AES);Data Encryption Standard (DES);Cryptographic algorithm. I. INTRODUCTION The Advanced Encryption Standard (AES) algorithm has been accepted by U.S government. AES specifies Federal Information Processing Standard (FIPS) Publications are approved by cryptographic algorithm. In cryptography AES algorithm helps to protect the electronic data [1]. Cryptography algorithm performs two types of operations, encryption and decryption. In encryption process the plain text converted into cipher text using with a key and in decryption it is converted into a plain text using with another key. In decryption part it performs the reverse operation of encryption. Due to this conversion, the message cannot be identified by the hackers. Encryption operations perform in transmitter side and decryption operations perform in receiver side. Two types of keys in cryptographic algorithm are asymmetric key and symmetric key. Asymmetric key works different for encryption and decryption that is for encryption it is public key and for decryption it is private key. Symmetric key works with one key used for encryption and decryption. II. DESCRIPTION OF AES ALGORITHM The AES algorithm is a symmetric block cipher that operates on a 128 bits fixed block of data. Key size is 128,192 and 256 depending on the rounds 10, 12 and 14 respectively. The AES encryption process works on four operations such as Substitute byte, Shift row, Mix-column and Add round key [2]. The decryption process also use four operations and can be listed as Inverse Substitute byte, Inverse shift row, Inverse Mix-column and Inverse Add round key. Each round in encryption and decryption except the last round are using four operations. At the final processing round, the Mix- column and Inverse Mix-column operations are getting bypassed in encryption and decryption process respectively. 1. AES ENCRYPTION All operation in AES is byte oriented.128 bit plaintext contains 16 bytes (b0, b1….b15). These bytes arranged in a 4x4 matrix. Substitute byte, Shift row, Mix-column and Add round key are major steps in AES encryption.