2020
DOI: 10.35940/ijrte.e6475.018520
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Pipelined AES Encryption System using FPGA

Abstract: Nowadays, the data encryption became very important because of the usage of the data transmission in all the filed. The Advanced Encryption Standard (AES) that known as Rijndael algorithm is one of the most common encryption algorithms. The AES consists of 9 rounds in addition to the initial and final rounds that makes the AES consumes much time for encrypting the data. Of course the time consumption is considered one of the problems that face the information security. The more time the encryption system consu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Nowadays, the data encryption developed to be very essential for the reason of handling the data transmission in all the fields. The large time consumed by an encryption system to encrypt the data leads to greater probability for the hackers to crack into the structure 24 . Internet of things illustrates the prototype of internetworking electronic devices to be associated to the internet and correspond with one another to trade and accumulate data via a wireless medium.…”
Section: Data Protection Algorithms Implemented On Proposed Gmpls Opt...mentioning
confidence: 99%
“…Nowadays, the data encryption developed to be very essential for the reason of handling the data transmission in all the fields. The large time consumed by an encryption system to encrypt the data leads to greater probability for the hackers to crack into the structure 24 . Internet of things illustrates the prototype of internetworking electronic devices to be associated to the internet and correspond with one another to trade and accumulate data via a wireless medium.…”
Section: Data Protection Algorithms Implemented On Proposed Gmpls Opt...mentioning
confidence: 99%