2012
DOI: 10.4028/www.scientific.net/amr.468-471.1721
|View full text |Cite
|
Sign up to set email alerts
|

The Design and Implementation of a High-Speed Parallel AES Crypto-Chip

Abstract: This paper direct to security and real-time requirements in high-speed network transmission processing, based on SOPC technology, design a High throughput AES encryption/ decryption processing unit with pipelining. The design goal is to optimize the hardware structure and improve the throughput, S-box design and parallel processing structure. Compared with traditional AES crypto-chip has faster rate with encryption and less consumption of resources advantages. This design adopts VHDL hardware description langu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 2 publications
0
0
0
Order By: Relevance
“…Encryption process include byte substitution transformation, line shift change, column mixing transformation and different round keys or change, after Nr iteration, of which final round not do column mixing transformation. Decryption process is similar to the encryption process, all aspects of use the inverse transformation [4]. Encryption and decryption algorithms used in the same sub-key, each round require the participation of an extended key which is the same length as input packets, but the order is opposite.…”
Section: Aes Algorithms Aes(advanced Encryption Standardmentioning
confidence: 99%
“…Encryption process include byte substitution transformation, line shift change, column mixing transformation and different round keys or change, after Nr iteration, of which final round not do column mixing transformation. Decryption process is similar to the encryption process, all aspects of use the inverse transformation [4]. Encryption and decryption algorithms used in the same sub-key, each round require the participation of an extended key which is the same length as input packets, but the order is opposite.…”
Section: Aes Algorithms Aes(advanced Encryption Standardmentioning
confidence: 99%