Abstract.A high speed security algorithm is always important for wired/wireless environment. The KeywordsAES pipelining, Key pipelining, Search Based Memory, VLSI. 1.IntroductionNetwork security has three major security goals: confidentiality, availability and message integration between senders and receivers . Many algorithms are available in each of these three goals of security. One of the frequently used security algorithm in block cipher is the AES algorithm [3]. High speed security decisions are important in order to support multimedia data transmission. VOIP needs fast security algorithm to guarantee Qos in real-time voice transmission [10], [11].Pipelining is an approach to increase the throughput of AES encryption and decryption algorithm. Speed of AES encryption depends on the number of rounds and the key generation involved in the algorithm. AES uses its own key expansion algorithm. Pipelined AES encryption and key pipelining in AES algorithm can increase the throughput of the algorithm.Like encryption and decryption module another important component of AES algorithm is its key expansion module. Both of encryption and decryption module depends mainly on this key expansion module. This key expansion algorithm is based on iterative looping architecture [3]. If the architecture for AES with basic iterative architecture and partial loop unrolling is compared, the loop unrolling increases the speed of rounds implementation than the single round implementation in AES key expansion algorithm [4].Speed called as encryption throughput is the primary optimization criteria. The large change of the throughput ratio can be explained by the use of block RAMs in AES implementations. Blocks RAMs are used for S-Box implementation. Depending upon the searching process on this block RAMs the speed of S-box substitution is done in one of the four modules of a round. This search based memory is applied to the S-box in AES rounds implementation [5].
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.