2020
DOI: 10.1109/tc.2019.2957355
|View full text |Cite
|
Sign up to set email alerts
|

High Throughput/Gate AES Hardware Architectures Based on Datapath Compression

Abstract: This article proposes highly efficient Advanced Encryption Standard (AES) hardware architectures that support encryption and both encryption and decryption. New operation-reordering and register-retiming techniques presented in this article allow us to unify the inversion circuits in SubBytes and InvSubBytes without any delay overhead. In addition, a new optimization technique for minimizing linear mappings, named multiplicative-offset, further enhances the hardware efficiency. We also present a shared key sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 34 publications
0
20
0
2
Order By: Relevance
“…The compression performance of the system is assessed by calculating the Peak Signal-to-Noise Ratio (PSNR) versus the Compression Ratio (CR). The CR is calculated as shown in (5). The PSNR is calculated as shown in (6a), (6b), and (6c) where MSE is the Mean Square Error, M×N is the dimensions of the image, f1(x,y) is the plain image, and f2(x,y) is the reconstructed image.…”
Section: The Compression-encryption Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The compression performance of the system is assessed by calculating the Peak Signal-to-Noise Ratio (PSNR) versus the Compression Ratio (CR). The CR is calculated as shown in (5). The PSNR is calculated as shown in (6a), (6b), and (6c) where MSE is the Mean Square Error, M×N is the dimensions of the image, f1(x,y) is the plain image, and f2(x,y) is the reconstructed image.…”
Section: The Compression-encryption Resultsmentioning
confidence: 99%
“…The Advanced Encryption Standard (AES) is an ISO/IEC 18033-3:2010 standard for symmetric block cipher. The AES is one of the most powerful encryption standards, and it has been used in a lot of protocols, such as the IEEE802.11 wireless Local Area Network (LAN) and the IEEE802.15.4 wireless sensor networks [5]. The AES encryption has been frequently used in the Cipher Block Chaining (CBC) mode, which needs a Pseudo Random Number Generator (PRNG) to generate the Initialization Vector (IV).…”
Section: B Image Encryptionmentioning
confidence: 99%
“…One of the strategies to minimize area without compromising performance is to re-use circuit blocks and to design shared datapaths for encryption and decryption [4], [22]. In this regard, [4] introduces an architecture for AES with shared encryption/decryption datapaths.…”
Section: B Related Workmentioning
confidence: 99%
“…We have performed detailed circuit-level, simulation-based evaluations of our proposed IMCRYPTO architecture. We consider figures of merit such as delay, area, power, throughput, area-delay-power product (ADPP), and throughput per area and compare them with state-of-the-art ASIC and IMC-based accelerators for AES encryption [4]- [7]. Results indicate minimum (maximum) throughput per area improvements of 3.3× (223.1×) and minimum (maximum) ADPP improvements of 1.2× (6,238.3×) for CMOS-based IMCRYPTO when compared to ASIC and IMC accelerators for AES-128 encryption of a 1MB plaintext.…”
Section: Introductionmentioning
confidence: 99%
“…Symmetric ciphers are often preferred in the communications of data and control codes since their encryption and decryption are attained at sufficiently high processing throughputs with a relatively smaller number of transistors. The advanced encryption standard (AES) [1] is the most popularly adopted and pursued for performance with integrated circuit (IC) technologies [2], [3] or even with field-programmable gate array (FPGA) devices [4], [5]. Also, a variety of lightweight ciphers has been developed [6] and evaluated in IC-chip Makoto Nagata and Takuji Miki are with the Graduate School of Science, Technology and Innovation, Kobe University, Kobe 657-8501, Japan (e-mail: nagata@cs.kobe-u.ac.jp).…”
Section: Introductionmentioning
confidence: 99%