2023
DOI: 10.1109/access.2023.3284142
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Implementation of High-Throughput S-Box in AES for Information Security

Abstract: The Advanced Encryption Standard (AES) is used for achieving quantum-resistant cryptography when a 256-bit key is applied. This paper presents a high-throughput, seven-stage hardware pipeline architecture for SubByte computations in the AES for information security applications. Composite field arithmetic-based calculations are employed for logic optimization. The proposed architecture includes dedicated multistage multiplication processes based on Galois field polynomials for constants, squaring, and variable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 22 publications
(63 reference statements)
0
2
0
Order By: Relevance
“…The integration of emerging devices with the latest technologies represents a transformative phase in the realm of electronics. This process involves seamlessly incorporating innovative components like memristors, spintronic devices, and quantum devices [333] into existing systems. One of the primary challenges lies in ensuring compatibility and establishing standardized interfaces for the smooth integration of these emerging technologies.…”
Section: B Conceptual Roadmapmentioning
confidence: 99%
See 1 more Smart Citation
“…The integration of emerging devices with the latest technologies represents a transformative phase in the realm of electronics. This process involves seamlessly incorporating innovative components like memristors, spintronic devices, and quantum devices [333] into existing systems. One of the primary challenges lies in ensuring compatibility and establishing standardized interfaces for the smooth integration of these emerging technologies.…”
Section: B Conceptual Roadmapmentioning
confidence: 99%
“…On one hand, the advent of powerful quantum computers raises concerns about their capability to break widely-used cryptographic algorithms, rendering current security protocols vulnerable [333]. On the other hand, quantum principles also offer potential solutions for enhancing hardware security.…”
Section: B Conceptual Roadmapmentioning
confidence: 99%