High Security and Low Power AES Crypto Processor Security Algorithm For Image Encryption
High Security and Low Power AES Crypto Processor Security Algorithm For Image Encryption
Dr.N.SENTHILKUMAR A SATHISH
Assistant Professor Department of Electronics and Communication
Department of Electronics and Communication Engineering
Engineering M.Kumarasamy College of Engineering
M.Kumarasamy College of Engineering
Karur-639113, India
Karur-639113, India
[email protected]
[email protected]
S SATHEESH
S SASIKUMAR Department of Electronics and Communication
Department of Electronics and Communication Engineering
Engineering M.Kumarasamy College of Engineering
M.Kumarasamy College of Engineering Karur-639113, India
Karur-639113, India [email protected]
[email protected]
P SRIDHAR
Department of Electronics and Communication
Engineering
M.Kumarasamy College of Engineering
Karur-639113, India
[email protected]
Abstract—Data encryption specifications include the recipient(s) from accessing or using the encrypted data.
Advanced Encryption Standard (AES) algorithm. This A crypto system can be utilized to encrypt a message [1].
AES algorithm has been incorporated into both hardware Only when the proper algorithm and keys are used to
and software, making it one of the most used forms of decode the communication can the recipient see its
encryption technologies. A symmetric cryptography encrypted contents. The primary use of cryptography is
method with adequate security uses Field Programmable the transmission of private data via computer networks.
Gate Arrays (FPGA). The proposed design includes 8bit (1- When a document is encrypted, a key and a
byte) data route and 5 main blocks. The Key Register and mathematical method are applied to turn it from clear
State Register are the register banks to store text files,
text into crypto-text [2]. Crypto-text cannot be read if the
credential keys, and intermediate data. Shift Rows are
reader does not possess the decryption key. It was
added to the State Register to reduce an area. The Mix
Column will be changed to an 8bit data route. has four commonly accepted that DES was no longer reliable due
internal registers, each of which can send and receive 8 to advances in computer processing power. The main
bits, an 8-bit or 1- byte block that is designed for Mix objective NIST's to provide an alternative to DES that
Columns. Additionally, the key expansion and encryption US government agencies could use for non-military
phases employ shared optimized Sub-Bytes. To make information security applications [3]. The fact that
different Sub-Bytes more efficient, we combine and NIST's work would benefit businesses and other non-
streamline them. To cut down on power usage, the design government users and that it would be broadly embraced
makes use of the clock gating technique. AES architecture as a commercial standard was obviously understood. The
for a 128- bit image-based image encryption system is (NIST) invited professionals having knowledge of data
presented in this work. Verilog HDL, Model sim 6.4.c was security and cryptography from throughout participating
used to implement this design in an FPGA XC3S 200 TQ- in the selection process from across the globe and
144. To synthesize Xilinx to tool is being used. discussion. Five encryption methods were selected for
study. The AES algorithm still frequently used today
Keywords—Power Analysis Attack (PAA), Advanced onwards. NIST formally approved the AES algorithm for
Encryption Standard (AES), Field Programmable Gate encryption in the year 2000, and FIPS-197 was then
Array (FPGA), MATLAB. published as a government standard. On the NIST
website, you may view the whole FIPS-197 standard. As
I. INTRODUCTION was to be predicted, a large number of manufacturers of
The encryption is used to a crypto system or cypher encryption- related hardware and software now provide
to prevent anybody other than preventing the intended AES encryption. The block cypher AES and encryption
algorithm using a cipher key and done some several outcome, Add Round Key receives the results
rounds of encryption. A block cypher, a type of byte by byte [10]. The data path for the Key-
encryption technology, only one set of information is Register does not need to be 32 bits longer than
encrypted at a time. The block size for our basic AES the data path for 32bit mixing columns, nor is it
encryption is 128 bits, or 16 bytes [4]. The word required to store the outcomes in the registers.
"rounds" is denoting ten to fourteen times that the data is
encrypted and decrypted throughout the encryption The clock gating approach is used in various
process, according to the size of the key. portions of the plan to lower the amount of
energy used, which results in a lower power
consumption [11].
II. EXISTING SYSTEM In regard to factors of the design, we employ to
minimize dynamic power usage by using the clock gating
It makes use of the SDRR (Secure Double Rate
approach. Individual clock gating is performed for the
Registers) in a well-known AES-128 architecture to
State Register and internal registers of the Mix Columns.
increase the cryptographic hardware's resilience to
For example, State Register and Mix Columns clock is
current PAAs [5]. Combinational and sequential logics
turned off Since these two blocks aren't used during the
are both kept secure by the interleaved processing of real
essential stage of growth, energy must be conserved.
and random data in the AES-128 employing SDRR,
which is when the most power is saved [12]. Fig 2 shows
which uses a combinational approach to analyze random
the proposed system's block diagram.
data constantly throughout the clock cycle [6]. Fig 1
shown the block diagram of existing model.
0 1
Input Plain Text Sub Bytes State Register Mix Columns Output
Add Round 1 0
Key
Mix
Sub bytes Shift Rows
SDRR SDRR
Column
SDRR SDRR
OUT 2
RNG
Cipher Text
RNG
0
SEL
RNG
SEL
SEL
CK
CK
SEL
the masked AES core. Relative to a fully folded in half Sub Bytes Sub Bytes
implementation, in order to conserve space, the
Round 1
DECRYPTION
every cycle. The figure below shows the suggested Add Round key
Add Round key
Round 9
masked AES. Masking the real data with a random Inv Mix Columns
mask first (plaintext). The "Nano AES core" is then fed Inv Sub Bytes
Sub Bytes
the mask and the masked plaintext, encrypting the Inv Shift Rows
Round 9
masked data using the secret key. The cipher-text is Shift Rows
delivered to the module [7]. It is meant to be generated Mix Columns
Add Round key
alongside the findings that were masked.
Round 1
required, State Register holds information on the Shift Rows Inv Shift Rows
Shift Rows [8]. Add Round key Add Round Key
Considering the topology, a stream of 8bit data, A block cypher with symmetric iteration is the
we construct an 8-bit block that is ideal for Add- Pipelined algorithm. The lengths of the block and key
Round-Key with 8 bit input and output. As an can be 128, 192, or 256 bits. The AES was required to
Encryption Decryption
IV. RESULTS
A. Simulation result of Encryption & Decryption
This is Encryption & Decryption Simulation Result. Fig 7: Devise utilization Summary for the Proposed Encryption
Plaintext is Primary Input Data and Key is Key for
Encryption Process. Ciphertext is Encrypted Output. C. RTL VIEW OF AES MAIN MODULE
Key1 to Key 10 are the Generated key for Each Round
by Key Generation Unit [16]. This waveform Simulated This is RTL View of Proposed Design. RTL Means
by Modelsim Tool and we can give the Input based on Register transfer Level. Here the Verilog HDL Code is
Binary Number and we Showed op as Hexa Decimal converted as Schematic View [20]. It shows Each and
format [17] in the Fig 5 and Fig 6 shows our Encrypted Every individual Module as internal module. Various
plaintext and Ciphertext. design blocks. It caused the area of the Spartan 3 xc3s
200 tq144 board to be reduced by 30% (Fig 8).
V. CONCLUSION
The Nano AES symmetric cryptography technique is
used in many applications and networks with a high
quality of security. As a result, AES is a practical
algorithm for little IoT devices. For IoT devices with
constrained resources, this study has developed a
compact AES architecture in this study. The architecture
included two specified register banks with an 8bit data
path in order to save simple text, interim results, and
keys. Shift-Rows were executed within the State-
Register to lessen the amount of logic needed.
Additionally, the design shared improved Sub-Bytes
with the encryption and key expansion phases. In
addition, this study has created Mix-Columns, a suitable
Fig 8: RTL View of proposed system
block for low- area design, using an output and input of
D. COMPARISION TABLE 8 bits. To decrease the amount of space and energy used,
this study has employed the clock gating method in
As shown in Fig 9, area has been reduced by using various design blocks. It caused the area of the Spartan 3
the proposed clock gating technique. xc3s 200 tq144 board to be reduced by 30% is set up
to issue an alert in the event of emergency.
REFERENCES
700 [1] Tanya Bindu, R. and Kavitha, T., 2023. A Survey on Various
Crypto-steganography Techniques for Real-Time Images.
In Intelligent Cyber Physical Systems and Internet of Things:
600 ICoICI 2022 (pp. 365-373). Cham: Springer International
Publishing.
500 Existing AES [2] Patil, Lakhichand Khushal, and Kalpesh A. Popat. "Comparative
Analysis of Several Approaches of Encoding Audio Files."
400 without Clock In Advancements in Smart Computing and Information Security:
Gating First International Conference, ASCIS 2022, Rajkot, India,
November 24–26, 2022, Revised Selected Papers, Part II, pp.
300 Proposed Nano 128-143. Cham: Springer Nature Switzerland, 2023.
AES with clock [3] Bhat, M. Iqbal, and Kaiser J. Giri. "Impact of computational
200 power on cryptography." Multimedia Security: Algorithm
Gating Development, Analysis and Applications (2021): 45-88.
100
[4] Yazdeen, Abdulmajeed Adil, Subhi RM Zeebaree, Mohammed
Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, and
0 Rizgar R. Zebari. "FPGA implementations for data encryption
LUT Slices Gates and decryption via concurrent and parallel computation: A
review." Qubahan Academic Journal 1, no. 2 (2021): 8-16.
[5] Harshitha, P. D., Darshan, R. V., Firdous, S., & Nayana, K.
(2021, May). High Performance Advanced Encryption Standard
Fig 9: it shows area of proposed and existing system system using Secure Double Rate Registers. In 2021 2nd
International Conference for Emerging Technology (INCET) (pp.
1-5). IEEE.
E. High Security Achieved [6] Rahman, M. T., Tajik, S., Rahman, M. S., Tehranipoor, M., &
The AES data encryption method's main benefit is Asadizanjani, N. (2020, December). The key is left under the
mat: On the security assumption of logic locking schemes.
the availability of various key lengths, despite the fact In 2020 IEEE International Symposium on Hardware Oriented
that it is potentially more complex and appealing. The Security and Trust (HOST) (pp. 262-272). IEEE.
AES algorithm is a symmetric block cypher that can [7] Shahbazi, K., & Ko, S. B. (2020). Area-efficient nano-AES
both encrypt (encipher) and decrypt (decipher) data. implementation for Internet-of-Things devices. IEEE
Encryption converts data into cypher text, an unreadable Transactions on Very Large Scale Integration (VLSI)
Systems, 29(1), 136-148.
form, and decryption converts the cypher text back into [8] de Fine Licht, J., Besta, M., Meierhans, S., & Hoefler, T. (2020).
plaintext. mostly because of one important factor: key Transformations of high-level synthesis codes for high-
size. AES uses longer keys because they are safer. performance computing. IEEE Transactions on Parallel and
Finding patterns is a common tactic for breaking a Distributed Systems, 32(5), 1014-1029.
cypher. AES is used to encrypt private data in hardware [9] Singhvi, Ankur. "Optimization and implementation of AES-128
algorithm on FPGA board." In Advances in Electrical and
and software all over the world. Computer Technologies: Select Proceedings of ICAECT 2019,
pp. 713-722. Springer Singapore, 2020
[10] [Liu, Leibo, Shaojun Wei, Jianfeng Zhu, and Chenchen Deng.
"Current Application Fields." In Software Defined Chips:
Volume II, pp. 167-277. Singapore: Springer Nature Singapore,
2022.
[11] Caforio, A., Balli, F. and Banik, S., 2020. Energy analysis of
lightweight AEAD circuits. In Cryptology and Network Security:
19th International Conference, CANS 2020, Vienna, Austria,