Abstract:This paper presents a reconfigurable architecture of the Advanced Encryption Standard (AES-Rijndael) cryptosystem. The suggested reconfigurable architecture is capable of handling all possible combinations of standard bit lengths (128,192,256) of data and key. The fully rolled inner-pipelined architecture ensures lesser hardware complexity. The work develops a FSMD model based controller which is ideal for such iterative implementation of AES. S-boxes here have been implemented using combinational logic over c… Show more
“…Two common alternative architectures adopted while implementing the AES in hardware are fully-pipelined and iterative with inner pipe-lining [12], [13]. Certain implementations of AES-Rijndael requires pipelining at all stages (unrolled rounds), due to the requirement of throughput.…”
Section: The Iterative Aes Architecture and The Fault Model Of Tmentioning
The present paper develops a new fault attack suitable against hardware designs of the Advanced Encryption Standard (AES) cryptosystem. The paper presents a two stage fault based attack of an AES implementation that assumes a random non-zero random byte fault at the input of the eighth round. The paper shows that the fault model is practical, does not assume the location of the byte fault in the state matrix and requires a brute force search of complexity 2 36 . The paper discusses the possibility of the attack on an FPGA implementation of AES by making sudden changes in the frequency of the input clock.
“…Two common alternative architectures adopted while implementing the AES in hardware are fully-pipelined and iterative with inner pipe-lining [12], [13]. Certain implementations of AES-Rijndael requires pipelining at all stages (unrolled rounds), due to the requirement of throughput.…”
Section: The Iterative Aes Architecture and The Fault Model Of Tmentioning
The present paper develops a new fault attack suitable against hardware designs of the Advanced Encryption Standard (AES) cryptosystem. The paper presents a two stage fault based attack of an AES implementation that assumes a random non-zero random byte fault at the input of the eighth round. The paper shows that the fault model is practical, does not assume the location of the byte fault in the state matrix and requires a brute force search of complexity 2 36 . The paper discusses the possibility of the attack on an FPGA implementation of AES by making sudden changes in the frequency of the input clock.
“…This 32-bit architecture performs encryption and decryption for various key sizes, but fixed block size (128-bit). The most area optimized reconfigurable AES-Rijndael implementation to date was demonstrated by Monjur et al [3]. This work developed a FSMD model based controller which is ideal for such iterative implementation of AES.…”
Section: Introductionmentioning
confidence: 97%
“…The advent of composite field GF((2 4 ) 2 ) arithmetic in S-box operation was first noted in the works of Rijmen [4] and Rudra et al [6]. Among the designers who tried to produce an area optimized implementation using composite field arithmetic, the works [3], [7], [8] are of importance. Feldhofer et al [7] implemented 128-bit AES on a grain of sand.…”
Section: Introductionmentioning
confidence: 98%
“…Over the recent years many FPGA [9], [10], [14], [16], [17], [21] and ASIC [3], [5], [6], [7], [8], [11], [18] implementations for Rijndael has been reported. Most of them have used lookup tables to implement S-Boxes.…”
This paper presents a single chip encryptor/decryptor core implementation of Advanced Encryption Standard (AES-Rijndael) cryptosystem. The suggested architecture is capable of handling all possible combinations of standard bit lengths (128,192,256) of data and key. The fully rolled innerpipelined architecture ensures lesser hardware complexity. The architecture does reutilize precomputed blocks, in the sense that the same hardware is shared during encryption and decryption as much as possible. The design has been implemented on Xilinx XCVe1000-8bg560 device. The performance of the architecture has been compared with existing results in the literature and has been found to be the most efficient (throughput/area) implementation of the AES algorithm.
“…The implementation of AES we target is an iterative one, as described in [1]. The literature shows that unrolled or pipelined designs of AES are unpopular because they do not allow a block cipher to operate in Output Feedback Mode (OFB) or Cipher Block Chaining (CBC) mode [17].…”
Abstract. In this paper we present a differential fault attack that can be applied to the AES using a single fault. We demonstrate that when a single random byte fault is induced at the input of the eighth round, the AES key can be deduced using a two stage algorithm. The first step has a statistical expectation of reducing the possible key hypotheses to 2 32 , and the second step to a mere 2 8 . Furthermore, we show that, with certain faults, this can be reduced to two key hypothesis.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.