期刊文献+

AES算法中S-box和列混合单元的优化及FPGA实现 被引量:2

Optimization of S-box and MixColumn Blocks in AES Encryption Algorithm and FPGA Implementation
下载PDF
导出
摘要 由于AES算法的硬件实现较为复杂,在此提出一种优化算法中S-box和列混合单元的方法。其中S-box通过组合和有限域映射的方法进行优化,列混合单元使用算式重组的方法进行优化。这些优化设计通过组合逻辑实现,经过仿真并在Xilinx Spartan 3系列FPGA上进行综合验证,可以将结构简化,使AES电路面积得到优化,明显节约硬件资源。 AES encryption algorithm is an advanced encryption algorithm. Because the structure of it is complex,an optimization of the algorithm is presented. The implementation of S- box and MixColumn blocks in the AES encryption is optimized by the combinational logic method. The circuit design is successfully synthesized in the Xilinx Spartan 3 FPGA device and the area of AES circuit is finely optimized.
作者 夏克维 李冰
出处 《现代电子技术》 2009年第24期11-14,共4页 Modern Electronics Technique
关键词 AES算法 S-BOX 列混合 结构优化 FPGA实现 AES encryption algorithm S - box mix column optimization FPGA implementation
  • 相关文献

参考文献10

  • 1Sivakumar I C, Velmurugan A. High Speed VLSI Design CCMP AES Cipher for WLAN (IEEE 802.11i) [A]. IEEE Intermational Conference on Signal Processing,Communica tions and Networking[C]. 2007,9 : 398 - 403.
  • 2Hodjat A,Verbauwhede I. A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA[A]. Proc. 12th Annual IEEE Symp. on Field - Programmable Custom Computing Machines[C]. Napa,CA,USA, 2004,4 : 308 - 309.
  • 3Barker E,Bassham L,Burr W,et al. Report on the Development of the Advanced Encryption Standard (AES)[J]. Journal of Research of the National Institute of Stardards and Technology,2001,106(3) :511 - 577.
  • 4Chih - Hsu Yen, Bing - Fei Wu. Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard [J]. IEEE Trans. on Computers, 2006,55 (6) :720 - 731.
  • 5Daemen J, RijnMen V. The Rijndael Block Cipher( AES Proposal) [A]. First AES Candidate Conference[C]. 1998.
  • 6Ichikawa T, Kasuya T, Matsui M. Hardware Evaluation of the AES Finalists [A]. The Third Advanced Encryption Standard (AES3) Candidata Conference[C]. 2000.
  • 7Mcloone M, John V McCanny, High Performance Single- chip FPGA Rijndael Algorithm Implementation[M]. London : Springer - Verlag, 2001.
  • 8CAST. AES128 - P Programmable Advanced Encryption Standard Core. http://http://www. castinc, com/, 2005.
  • 9Helion. High Performance AES (Rijndael) Cores for Xilinx FPGA. http ://www. heliontech, com/, 2005.
  • 10Refik Sever, Ismailoglu A N, Tekmen Murat Yusuf, et al. A High Speed FPGA Implementation of the Rijndael Algorithm[A]. Euromicro Symposium on Digital System Design, Architectures, Methods and Tools[C]. 2004.

同被引文献19

  • 1Sarma S E,Weis S A,Engels D W.RFID systems and security and privacy implications[C]//Proc of the4th In-ternational Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer-Verlag,2003:454-469.
  • 2Weis S A,Sarma S E,Rivest R L,et al.Security and pri-vacy aspects of low-cost radio frequency identification systems[C]//Proc of the1st International Conference on Security in Pervasive Computing,2004:201-202.
  • 3Ohkubo M,Suzuki K,Kinoshita S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]//Proc of the2004Symposium on Cryptography and In-formation Security,Sendai,Japan,2004:719-724.
  • 4Henrici D,Muller P.Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[C]//Proc of the2nd IEEE Annual Conference on Pervasive Computing and Communica-tions Workshops,Washington,2004:149-153.
  • 5Rhee K,Kwak J,Kim S,et al.Challenge-response based RFID authentication protocol for distributed database en-vironment[C]//LNCS3450:Proc of the2nd International Conference on Security in Pervasive Computing(SPC2005).Berlin:Springer-Verlag,2005:70-84.
  • 6Yang J.Mutual authentication protocol for low-cost RFID[C]//Proc of Workshop on RFID and Lightweight Crypto,Graz,Austria,2005:17-24.
  • 7王新锋,刘建国,蒋旭,刘胜利.移动型RFID安全协议及其GNY逻辑分析[J].计算机应用,2008,28(9):2239-2241. 被引量:6
  • 8裴友林,杨善林.基于密钥矩阵的RFID安全协议[J].计算机工程,2008,34(19):170-173. 被引量:17
  • 9林贵彬,王永华,詹宜巨.一种基于随机序列的RFID安全协议[J].计算机工程,2008,34(20):151-153. 被引量:5
  • 10陈剑,张春,陈虹.低功耗RFID的公钥密码系统实现[J].半导体技术,2009,34(9):890-894. 被引量:7

引证文献2

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部