Implementation of AES Key Schedule Using Look-Ahead Technique

被引:0
|
作者
Rashmi R. Rachh
P. V. Ananda Mohan
B. S. Anami
机构
[1] Visvesvaraya Technological University,Department of Computer Science and Engineering
[2] Electronics Corporation of India Lmited,undefined
[3] KLE Institute of Technology,undefined
关键词
AES; Key schedule; Implementations of cryptosystems; Cryptography; Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
The commencement of decryption process of Advanced Encryption Standard (AES) algorithm is dependent on availability of the last round key. In this paper, we propose a look-ahead technique for increasing the speed of implementation of AES key schedule using which the last round key can be made available fast. The other round keys can also be computed in a parallel path using the proposed technique. Applications such as key search engines need to be agile to key changes for decrypting given encrypted messages using all the keys in the available key space so that fast decryption is possible. The FPGA implementation results using Xilinx XC5VLX85 are also provided.
引用
收藏
页码:3663 / 3670
页数:7
相关论文
共 50 条
  • [21] ATLAS: Look-Ahead Scheduling Using Workload Metrics
    Roitzsch, Michael
    Waechtler, Stefan
    Haertig, Hermann
    2013 IEEE 19TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS), 2013, : 1 - 10
  • [22] Using look-ahead protocol for mobile data broadcast
    Lam, KW
    Wong, CS
    Leung, W
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 342 - 345
  • [23] FAST IMPLEMENTATION OF GROUP CARRY LOOK-AHEAD IN A CMOS ADDER.
    Anon
    1842, (29):
  • [24] Cloud Aided Implementation of Energy Optimal Look-ahead Speed Control
    Soumelidis, Alexandros
    Gaspar, Peter
    Kisari, Adam
    Bakos, Adam
    Nemeth, Balazs
    Mihaly, Andras
    Hankovszki, Zoltan
    IFAC PAPERSONLINE, 2018, 51 (09): : 361 - 366
  • [25] A method to automate look-ahead schedule (LAS) generation for the finishing phase of construction projects
    Dong, Ning
    Fischer, Martin
    Haddad, Zuhair
    Levitt, Raymond
    AUTOMATION IN CONSTRUCTION, 2013, 35 : 157 - 173
  • [26] ASCA vs. SASCA A Closer Look at the AES Key Schedule
    Strieder, Emanuele
    Ilg, Manuel
    Heyszl, Johann
    Unterstein, Florian
    Streit, Silvan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2023, 2023, 13979 : 65 - 85
  • [27] A 50-YEAR LOOK-AHEAD
    COATES, JF
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 1995, 48 (01) : 103 - 105
  • [28] Look-ahead memory consistency model
    Wu, CC
    Pean, DL
    Chen, C
    1998 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 504 - 510
  • [29] PIPELINED CARRY LOOK-AHEAD ADDER
    CRAWLEY, DG
    AMARATUNGA, GAJ
    ELECTRONICS LETTERS, 1986, 22 (12) : 661 - 662
  • [30] VLSI Implementation of Reduced Resource Allocation for Modified Carry Look-Ahead Adder
    Saptalakar, Bairu K.
    Saptalakar, Shrinivas K.
    Navalagund, S. S.
    Latte, Mrityunjaya V.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 559 - 564