Figure 1 - uploaded by Anane Mohamed
Content may be subject to copyright.
illustrates the encryption /decryption rounds of the AES-128. The cipher maintains an internal 4×4 matrix of bytes referred to State, on which the operations are performed. Initially, State is filled with the input data block and exclusive-ORed with the encryption key.  

illustrates the encryption /decryption rounds of the AES-128. The cipher maintains an internal 4×4 matrix of bytes referred to State, on which the operations are performed. Initially, State is filled with the input data block and exclusive-ORed with the encryption key.  

Source publication
Conference Paper
Full-text available
AES (Advanced Encryption Standard) is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting data. In this paper, we present three hardware architectures for AES, namely Serial/Serial, Parallel /Serial and Parallel/Pipelined. These architectures can be used as IP (Intellectual Property) cores in hybrid cryptosyst...

Context in source publication

Context 1
... Architecture allows to the four 32-bits words to be performed together and rounds are executed in pipeline, which gives a higher encryption/decryption rate. The Parallel/Pipelined architecture is shown on figure 10. The pipeline concept is inspired of the mechanical engineering operation of an assembly line. ...

Similar publications

Article
Full-text available
This work presents the development of self-modifiable Intellectual Property (IP) modules for histogram calculation using the modelbased design technique provided by Xilinx System Generator. In this work, an analysis and a comparison among histogram calculation architectures are presented, selecting the best solution for the design flow used. Also,...
Conference Paper
Full-text available
Modern Integrated Circuits (ICs) employ several classes of countermeasures to mitigate physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless probing has been introduced, which can assist the attacker in circumventing the integrated countermeasures and probe the secret data on a chip. This attack can be mounted u...
Article
Full-text available
This letter presents the first ultra-lightweight transmitter based on electromagnetic emanation to send embedded intellectual properties (IP) identity (ID) quickly and discreetly. The proposed solution is based on a binary frequency shift keying (BFSK) transmitter that ensures an exceptionally high data rate. In addition, we present a coherent demo...
Article
Full-text available
During the last years, recursive systematic convolutional (RSC) encoders have found application in modern telecommunication systems to reduce the bit error rate (BER). In view of the necessity of increasing the throughput of such applications, several approaches using hardware implementations of RSC encoders were explored. In this paper, we propose...
Conference Paper
Full-text available
Over the past 10 years, the designers of intellectual properties (IP) have faced increasing threats including illegal copy or cloning, counterfeiting, reverse-engineering. This is now a critical issue for the microelectronics industry, mainly for fabless designers and FPGA designers. The design of a secure, efficient, lightweight protection scheme...

Citations

... The AES is a symmetric encryption algorithm, meaning the same key is used for both encrypting and decrypting data [24]. AES is a block cipher encryption algorithm that operates on fixed-size blocks of bits, with block sizes of 128, 192, or 256 bits [25]. ...
... The symmetric algorithm has a quick processing time because this algorithm performs the encryption and decryption process using the same 1 key and is small in size, but is insecure when exchanging keys. Unlike the asymmetric algorithm which uses 2 different keys and a large key size so that the processing time is long [2]. Combining two cryptographic algorithms is a solution for a better level of security and faster processing time [3]. ...
Article
Full-text available
Data security is very important as it is easy to exchange data today. Cryptographic techniques are needed as data security techniques. Combining two cryptographic algorithms is a solution for a better level of security. The Advanced Encryption Standard (AES) cryptographic algorithm requires low computational power and is the best symmetric algorithm. The LUC algorithm is an asymmetric algorithm that was developed from the RSA algorithm and has advantages in a better level of security and processing speed. In this research, two symmetric and asymmetric cryptographic algorithms will be combined in a hybrid scheme, namely the AES and LUC algorithms to improve data security. the AES algorithm will encrypt and decrypt messages, while the LUC algorithm performs encryption and decryption of the AES key. The results showed that the combination of the two AES and LUC algorithms was successful. However, the computational time needed by the two algorithms to perform the encryption and decryption process increases. The simulation results of the brute force attack performed show that the LUC algorithm can still be attacked. The greater the value of E (the public key of the LUC algorithm), the longer it takes for the brute force attack to be successful. The value of E is also directly proportional to the computational time required by the LUC. So it can be concluded that the AES algorithm is less precise when combined with the LUC algorithm.
... AES can be employed in software as well as hardware implementation. The software implementation of AES is a slow process and thus consumeslots of processing time and also requires regular updates [3]. Due to these reasons hardware implementation is widely used for real time applications [4]. ...
Article
Full-text available
Blockchain technology is used in the suggested solution to create a healthcare ecosystem that is decentralised, scalable, iterative, and accessible. This will allow patients to easily and securely exchange their medical records with doctors, hospitals, research organisations, and other stakeholders while giving them total control over the privacy of their medical data.The enhanced AES algorithm is implemented quickly in this work with a transformation-based s-box for increased security. The addition of the Affine transformation for vector multiplication is what gives S-box its performance. Then, it is examined using the appropriate software design on a Xilinx Virtex-5 FPGA device with the XC5VLX50 foundation software.The suggested enhanced AES algorithm accomplishes this and has an efficiency rate of 85.6%.
... ShiftRows is the permutation stage, and the remaining are three substitution stages that are byte Substitute, MixColumn, and AddRundKey [23] [24]. Figure 3 depicts the Advanced Encryption Standard algorithm's encryption and decryption procedures [25]. ...
Article
Full-text available
Over the years, the privacy of a biomedical signal processing is protected using the encryption techniques design and meta-heuristic algorithms which are significant domain and it will be more significant shortly. Present biomedical signal processing research contained security because of their critical role in any developing technology that contains applications of cryptography and health deployment. Furthermore, implementing public-key cryptography in biomedical signal processing sequence testing equipment needs a high level of skill. Whatever key is being broken with enough computing capabilities using brute-force attack. As a result, developing a biomedical signal processing cryptography model is critical for improving the connection between existing and emerging technology. Furthermore, public-key cryptography implementation for meta-heuristic-based bio medical signal processing sequence test equipment necessitates a high level of skill. The suggested novel technique can be used to develop a secure algorithm of artificial bee colony, which depend on the advanced encryption standard (AES). AES can be used to reduce the encryption time and to increase the protection capacity for health systems. The novel secure can protect the biomedical signal processing against plain text attacks.
... This process is to prevent falling into a local optima. Mutation changed the Genes of the offspring randomly [20]. Figure 3 shows Gentle introduction to Genetic Algorithm. ...
Article
Full-text available
Wireless sensor networks (WSNs) are formed of self-contained nodes of sensors that are connected to one base station or more. WSNs have several primary aims one of them is to transport network node's trustworthy information to another one. As WSNs expand, they become more vulnerable to attacks, necessitating the implementation of strong security systems. The identification of effective cryptography for WSNs is a significant problem because of the limited energy of the sensor nodes, compute capability, and storage resources. Advanced Encryption Standard (AES) is an encryption technique implemented in this paper with three meta-heuristic algorithms which are called Hybrid Genetic Firefly algorithm, Firefly algorithm, and Genetic algorithm to ensure that the data in the WSNs is kept confidential by providing enough degrees of security. We have used hybrid Genetic firefly as a searching operator whose goal is to improve the searchability of the baseline genetic algorithm. The suggested framework's performance that based on the algorithm of hybrid genetic firefly is rated by using Convergence Graphs of the Benchmark Functions. From the graphs we have conclude that hybrid genetic firefly with AES is best from other algorithms.
... ShiftRows is the permutation stage, and the remaining are three substitution stages that are byte Substitute, MixColumn, and AddRundKey [23] [24]. Figure 3 depicts the Advanced Encryption Standard algorithm's encryption and decryption procedures [25]. ...
... ShiftRows is the permutation stage, and the remaining are three substitution stages that are byte Substitute, MixColumn, and AddRundKey [23] [24]. Figure 3 depicts the Advanced Encryption Standard algorithm's encryption and decryption procedures [25]. ...
Article
Full-text available
Over the years, the privacy of a biomedical signal processing is protected using the encryption techniques design and meta-heuristic algorithms which are significant domain and it will be more significant shortly. Present biomedical signal processing research contained security because of their critical role in any developing technology that contains applications of cryptography and health deployment. Furthermore, implementing public-key cryptography in biomedical signal processing sequence testing equipment needs a high level of skill. Whatever key is being broken with enough computing capabilities using brute-force attack. As a result, developing a biomedical signal processing cryptography model is critical for improving the connection between existing and emerging technology. Furthermore, public-key cryptography implementation for meta-heuristic-based bio medical signal processing sequence test equipment necessitates a high level of skill. The suggested novel technique can be used to develop a secure algorithm of artificial bee colony, which depend on the advanced encryption standard (AES). AES can be used to reduce the encryption time and to increase the protection capacity for health systems. The novel secure can protect the biomedical signal processing against plain text attacks.
... This process is to prevent falling into a local optima. Mutation changed the Genes of the offspring randomly [20]. Figure 3 shows Gentle introduction to Genetic Algorithm. ...
Article
Full-text available
Wireless sensor networks (WSNs) are formed of self-contained nodes of sensors that are connected to one base station or more. WSNs have several primary aims one of them is to transport network node's trustworthy information to another one. As WSNs expand, they become more vulnerable to attacks, necessitating the implementation of strong security systems. The identification of effective cryptography for WSNs is a significant problem because of the limited energy of the sensor nodes, compute capability, and storage resources. Advanced Encryption Standard (AES) is an encryption technique implemented in this paper with three meta-heuristic algorithms which are called Hybrid Genetic Firefly algorithm, Firefly algorithm, and Genetic algorithm to ensure that the data in the WSNs is kept confidential by providing enough degrees of security. We have used hybrid Genetic firefly as a searching operator whose goal is to improve the searchability of the baseline genetic algorithm. The suggested framework's performance that based on the algorithm of hybrid genetic firefly is rated by using Convergence Graphs of the Benchmark Functions. From the graphs we have conclude that hybrid genetic firefly with AES is best from other algorithms.
... Step [20] o MixColumn Step: The output of the ShiftRow Step is transformed using a special mathematical function. By taking as input the four bytes of each column and outputs four completely new bytes finally to produce a new 16-bit matrix as shown in figure 5 [21]. It should be noted that this step is missing in the last round to maintain the symmetry between the encryption and decryption process. ...
... If not, a deadlock can be done before the Mix-Columns operation. Therefore, we must address at least one column after the Shift-Rows [3]. The suggested resolution is that the ShiftRows process must be executed out of the round. ...
Conference Paper
the use of embedded systems has grown widely recently. To ensure their security, cryptographic algorithms were involved to protect information's transfer against attacks. In this paper, a Serial-Serial AES for embedded system with optimized MixColumns and SubBytes transformations is designed. The proposed AES is interfaced as a custom hardware with the System designed around NIOS II processor via GPIOs (General-Purpose Input-Output). The NIOS II processor; is worn to assure the flexibility and facility of custom hardware interface. The Customizable AES is controlled through the NIOS II. The AES as custom hardware ameliorates the speed of data encryption, serves as accelerator, eases the considerable decrease in thermal power dissipation and therefore improves the performance of the whole of system.