• DocumentCode
    2553619
  • Title

    A High-Speed, Fully-Pipelined VLSI Architecture for Real-Time AES

  • Author

    Fayed, M. ; El-Kharashi, M. Watheq ; Gebali, F.

  • Author_Institution
    Univ. of Victoria, Victoria
  • fYear
    2006
  • fDate
    10-12 Dec. 2006
  • Firstpage
    1
  • Lastpage
    2
  • Abstract
    Nowadays, data encryption and decryption have become mandatory for any real-time communication applications. We propose a novel, area-speed efficient, high-speed architecture for the Advanced Encryption Standard hardware implementation. Our proposed architecture utilizes the composite field technique for SubBytes/InvSubBytes transformation instead of the traditionally-used look up table technique. As a result, the unbreakable delay of using look up tables in the traditional technique is eliminated. This, in turn, enables sub-pipelining implementation for further speeding up. Moreover, composite field arithmetic is employed to reduce the critical path delay. We propose a new algorithm to generate the optimum isomorphic mapping matrix, which reduces the critical path delay dramatically. In addition, an efficient key expansion architecture suitable for real-time applications is presented. Using the proposed architecture, a fully sub-pipelined implementation with 6 sub-stages in each round can achieve a throughput of 49.401 Gbps on a Xilinx XC2V6000FF1152-6 device in non-feedback mode, which is twice faster than the fastest Advanced Encryption Standard FPGA implementation known to date.
  • Keywords
    VLSI; cryptography; field programmable gate arrays; microprocessor chips; pipeline processing; Xilinx XC2V6000FF1152-6 device; bit rate 49.401 Gbit/s; composite field arithmetic; critical path delay; data decryption; data encryption; key expansion architecture; look up table technique; optimum isomorphic mapping matrix; pipelined VLSI architecture; real-time advanced encryption standard FPGA implementation; Application software; Arithmetic; Computer architecture; Cryptography; Data engineering; Delay; Electronic mail; Hardware; Throughput; Very large scale integration; Advanced Encryption Standard; Block Cipher; Composite Field; Multiplicative Inverse in GF(28); Private Key Cipher; Secret-key Cipher; Sub-pipelining; Symmetric-key Cipher;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information & Communications Technology, 2006. ICICT '06. ITI 4th International Conference on
  • Conference_Location
    Cairo
  • Print_ISBN
    0-7803-9770-3
  • Type

    conf

  • DOI
    10.1109/ITICT.2006.358286
  • Filename
    4196510