Title :
Design CAROM Module Used in AES Structure for Sub-byte and Inv-sub-byte Transformation
Author :
Jui-Lin Lai ; Kuo-Hung Liao ; Yi-Te Lai ; Rong-Jian Chen
Author_Institution :
Dept. of Electron. Eng., Nat. United Univ., Miaoli, Taiwan
Abstract :
In the paper, the structure of information security system was implemented and to evaluate its performance for the securely data transmit in the network. The Advanced Encryption Standard (AES) with Rijndael algorithm is divided into two major block encryption and decryption which is operated for the iteration and the symmetric password key block cryptography with 128, 196, and 256-bit. The Content Addressable Read Only Memory (CAROM) is used to realize the Look-Up-Table approach of the Sub-Byte and Inv-Sub-Byte transformation function within the integrated operation module to execute the encryption and decryption operation in AES system is proposed to improve the execution time and complexity. The integrated modules are combined (shift Row, Sub Byte) and (AddRoundKey, Mix Column), respectively. As the simulation result show that the functions and performance of the proposed AES system with the integrated module and the ROM-base CAM circuit are successfully verified by the Verilog in the Xilinx FPGA development platform. The used logic element of CAM is effectively reduced than Look-Up-Table from read-only-memory. The execution time of the integrated AES system has a more high-speed operated for the data Enc/Dec function.
Keywords :
field programmable gate arrays; private key cryptography; public key cryptography; read-only storage; AES structure; CAROM module design; ROM-base CAM circuit; Rijndael algorithm; Verilog; Xilinx FPGA development platform; advanced encryption standard; block decryption; block encryption; content addressable read only memory; field programmable gate array; information security system; inv-sub-byte transformation; look-up-table approach; sub-byte transformation; symmetric password key block cryptography; Algorithm design and analysis; Computer aided manufacturing; Computer architecture; Encryption; Hardware; Simulation; AES; CAROM; Decryption; Encryption; Sub-Byte;
Conference_Titel :
Biometrics and Security Technologies (ISBAST), 2013 International Symposium on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-5010-7
DOI :
10.1109/ISBAST.2013.35