Multiple Lookup Table-Based AES Encryption Algorithm Implementation

被引:4
|
作者
Gong, Jin [1 ]
Liu, Wenyi [1 ]
Zhang, Huixin [1 ]
机构
[1] N Univ China, Key Lab Instrumentat Sci & Dynam Measurement, Minist Educ, Sci & Technol Elect Test & Measurement Lab, Taiyuan, Peoples R China
关键词
AES implementation; multiple lookup tables; VHDL;
D O I
10.1016/j.phpro.2012.03.166
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Anew AES (Advanced Encryption Standard) encryption algorithm implementation was proposed in this paper. It is based on five lookup tables, which are generated from S-box(the substitution table in AES). The obvious advantages are reducing the code-size, improving the implementation efficiency, and helping new learners to understand the AES encryption algorithm and GF(28) multiplication which are necessary to correctly implement AES[1]. This method can be applied on processors with word length 32 or above, FPGA and others. And correspondingly we can implement it by VHDL, Verilog, VB and other languages. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Garry Lee
引用
收藏
页码:842 / 847
页数:6
相关论文
共 50 条
  • [31] Microcontroller implementation of lookup table-based control functions with special emphasis on sequential control according to IEC 61131-3
    Lamar, Krisztian
    Zalotay, Peter
    INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 2015, 52 (02) : 111 - 130
  • [32] A Universal Lookup Table-Based Direct Torque Control for OW-PMSM Drives
    Wang, Mingze
    Sun, Dan
    Ke, Weihuang
    Nian, Heng
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2021, 36 (06) : 6188 - 6191
  • [33] DESIGN AND IMPLEMENTATION OF FEFET-BASED LOOKUP TABLE
    Li, Kai
    Xiong, Ying
    Tang, Minghua
    Qin, Ya
    Li, Zheng
    Zhou, Yichun
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [34] Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table-Based MPPT Algorithm to Overcome Wind and Grid Disturbances
    Ananth, D. V. N.
    Kumar, G. V. Nagesh
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 711 - 725
  • [35] Multiple reference images based on lookup-table color image fusion algorithm
    Jiang, Man
    Jin, Weiqi
    Zhou, Liwei
    Liu, Guangrong
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1031 - 1038
  • [36] A High Performance Hardware Implementation Image Encryption With AES Algorithm
    Farmani, Ali
    Jafari, Mohamad
    Miremadi, Seyed Sohrab
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
  • [37] The Implementation of AES-CMAC Authenticated Encryption Algorithm on FPGA
    Pirzada, Syed Jahanzeb Hussain
    Murtaza, Abid
    Hasan, Muhammad Noman
    Xu, Tongge
    Liu Jianwei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 193 - 197
  • [38] A Modified AES Based Algorithm for Image Encryption
    Zeghid, M.
    Machhout, M.
    Khriji, L.
    Baganne, A.
    Tourki, R.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 206 - +
  • [39] A Parallel AES Encryption Algorithm Based on PCA
    Das, Debasis
    Misra, Rajiv
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 238 - 246
  • [40] Improved inverse halftoning using vector and texture-lookup table-based learning approach
    Huang, Yong-Huai
    Chung, Kuo-Liang
    Dai, Bi-Ru
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (12) : 15573 - 15581