Table of Contents Author Guidelines Submit a Manuscript
Journal of Engineering
Volume 2013, Article ID 785126, 26 pages
http://dx.doi.org/10.1155/2013/785126
Research Article

A Very Compact AES-SPIHT Selective Encryption Computer Architecture Design with Improved S-Box

1Department of Electrical and Electronic Engineering, University of Nottingham, Malaysia Campus, 43500 Semenyih, Malaysia
2School of Engineering, Edith Cowan University, Joondalup, WA 6027, Australia

Received 31 August 2012; Revised 5 June 2013; Accepted 5 June 2013

Academic Editor: Alfio D. Grasso

Copyright © 2013 Jia Hao Kong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. I. o. S. a. Technology, “Advanced encryption standard,” in NIST FIPS PUB 197, U. S. D. o. Commerce, 2001. View at Google Scholar
  2. X. Zhang and K. K. Parhi, “High-speed VLSI architectures for the AES algorithm,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 9, pp. 957–967, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Lemsitzer, J. Wolkerstorfer, N. Felber, and M. Braendli, “Multi-gigabit GCM-AES Architecture Optimized for FPGAs,” in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 2007.
  4. S. Qu, G. Shou, Y. Hu, Z. Guo, and Z. Qian, “High throughput, pipelined implementation of AES on FPGA,” in Proceedings of International Symposium on Information Engineering and Electronic Commerce (IEEC '09), pp. 542–545, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Morioka and A. Satoh, “A 10 Gbps full-AES crypto design with a twisted-BDD S-box architecture,” in Proceedings of International Conference on Computer Design (ICCD '02) VLSI in Copmuters and Processors, pp. 98–103, September 2002. View at Scopus
  6. P. Hämäläinen, T. Alho, M. Hännikäinen, and T. D. Hämäläinen, “Design and implementation of low-area and low-power AES encryption hardware core,” in Proceedings of the 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools (DSD '06), pp. 577–583, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  7. J. K. MooSeop Kim and Y. Choi, “Low power circuit architecture of AES crypto module for wireless sensor network,” World Academy of Science, Engineering and Technology, vol. 8, 2005. View at Google Scholar
  8. G. N. Selimis, A. P. Kakarountas, A. P. Fournaris, A. Milidonis, and O. Koufopavlou, “A low power design for sbox cryptographic primitive of advanced encryption standard for mobile end-users,” Journal of Low Power Electronics, vol. 3, pp. 327–336, 2007. View at Publisher · View at Google Scholar
  9. Y.-H. Zeng, X.-C. Zou, Z.-L. Liu, and J.-M. Lei, “Low-power clock-less hardware implementation of the rijndael S-box for wireless sensor networks,” The Journal of China Universities of Posts and Telecommunications, vol. 14, no. 4, pp. 104–109, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. R. Liu and K. K. Parhi, “Fast composite field S-box architectures for advanced encryption standard,” in Proceedings of the 18th ACM Great Lakes Symposium on VLSI (GLSVLSI '08), pp. 65–70, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Daemen and V. Rijmen, The Design of Rijndael, Springer, New York, NY, USA, 2002.
  12. M. McLoone and J. V. McCanny, “Rijndael FPGA implementation utilizing look-up tables,” in Proceedings of IEEE Workshop on Signal Processing Systems (SIPS '01), pp. 349–360, October 2001. View at Scopus
  13. V. Fischer and M. Drutarovsk, “Two methods of Rijndael implementation in reconfigurable hardware,” in Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems, 2001.
  14. D. Canright, “A very compact s-box for AES,” in Proceedings of the 7th International Conference on Cryptographic Hardware and Embedded Systems, Edinburgh, UK, 2005.
  15. J. Daemen and V. Rijmen, “The block cipher Rijndael,” in Proceedings of the the International Conference on Smart Card Research and Applications, 2000.
  16. A. Satoh, S. Morioka, K. Takano, and S. Munetoh, “A compact Rijndael hardware architecture with S-box optimization,” in Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, vol. 2248, pp. 239–254, 2001. View at Publisher · View at Google Scholar
  17. G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, and J.-D. Legat, “Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications,” in Proceedings of International Conference on Information Technology: Coding Computing (ITCC '04), pp. 583–587, April 2004. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Paar, “Some remarks on efficient inversion in finite fields,” in Proceedings of the IEEE International Symposium on Information Theory, p. 58, September 1995. View at Scopus
  19. S. Morioka and A. Satoh, “An optimized S-box circuit architecture for low power AES design,” in Proceedings of Cryptographic Hardware and Embedded Systems (CHES '02), B. Kaliski, ç. Koç, and C. Paar, Eds., vol. 2523, pp. 172–186, Springer, 2003.
  20. J. Boyar and R. Peralta, “A new combinational logic minimization technique with applications to cryptology,” in Experimental Algorithms, P. Festa, Ed., vol. 6049, pp. 178–189, Springer, Berlin, Germany, 2010. View at Google Scholar
  21. J. Boyar and R. Peralta, “A small depth-16 circuit for the AES S-box,” in Information Security and Privacy Research, D. Gritzalis, S. Furnell, and M. Theoharidou, Eds., vol. 376, pp. 287–298, Springer, Berlin, Germany, 2012. View at Google Scholar
  22. T. Itoh and S. Tsujii, “A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases,” Information and Computation, vol. 78, no. 3, pp. 171–177, 1988. View at Google Scholar · View at Scopus
  23. E. N. Mui, “Practical Implementation of Rijndael S-Box Using Combinational Logic,” 2007, http://www.xess.com/projects/Rijndael_SBox.pdf.
  24. D. J. Bernstein, “Optimizing linear maps modulo 2,” 2009, http://binary.cr.yp.to/linearmod2-20091005.pdf.
  25. F. Mavaddat, B. Parhami, and URISC:, Ultimate Reduced Instruction Set Computer, Faculty of Mathematics, 1987.
  26. W. F. Gilreath and P. A. Laplante, Computer Architecture: A Minimalist Perspective, Kluwer Academic Publishers, Dordrecht, The Netherlands, 2003.
  27. T. Good and M. Benaissa, “Very small FPGA application-specific instruction processor for AES,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 53, no. 7, pp. 1477–1486, 2006. View at Publisher · View at Google Scholar · View at Scopus
  28. K. Gaj, “Very compact FPGA implementation of the AES algorithm,” in Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '03), vol. 2779 of Lecture Notes in Computer Science, pp. 319–333, Springer, 2003.
  29. C. E. Shannon, Communication Theory and Secrecy Systems, Bell Telephone Laboratories, New York, NY, USA, 1949.
  30. A. Said and W. A. Pearlman, “A new, fast, and efficient image codec based on set partitioning in hierarchical trees,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 6, no. 3, pp. 243–250, 1996. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Buettner, B. Greenstein, A. Sample, J. Smith, and D. Wetherall, “Revisiting smart dust with RFID sensor networks,” in Proceedings of the 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII '08), 2008.
  32. J. M. Granado-Criado, M. A. Vega-Rodríguez, J. M. Sánchez-Pérez, and J. A. Gómez-Pulido, “A new methodology to implement the AES algorithm using partial and dynamic reconfiguration,” Integration, the VLSI Journal, vol. 43, pp. 72–80, 2010. View at Publisher · View at Google Scholar
  33. C. Chiţu and M. Glesner, “An FPGA implementation of the AES-Rijndael in OCB/ECB modes of operation,” Microelectronics Journal, vol. 36, no. 2, pp. 139–146, 2005. View at Publisher · View at Google Scholar · View at Scopus
  34. M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, “Strong authentication for RFID systems using the AES algorithm,” in Cryptographic Hardware and Embedded Systems—CHES 2004, M. Joye and J. J. Quisquater, Eds., vol. 3156, pp. 85–140, Springer, Berlin, Germany, 2004. View at Google Scholar