Design of a high throughput 128-bit AES (Rijndael Block Cipher)

Tanzilur Rahman*, Shengyi Pan, Qi Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

In this paper a hardware implementation of a high throughput 128- bits Advanced Encryption Standard (AES) algorithm on a single chip of Xilinx Spartan III XC3S1000 FPGA has been presented. The bus width of the architecture is 32 bit. Pipelining method has been used in this design in order to achieve a higher speed. SubBytes method has been implemented using both composite field method and fixed Rom for further analysis and comparison of performance. Through a perfect combination of different methods of SBox and key Expansion, a notable speed has been achieved in the range of 1.11 Gbps to 3.22 Gbps. An in depth analysis became possible as the whole architecture was tested in four combination (composite field and Rom for both sub bytes and key expansion). All the methods have been discussed with a proper statistical analysis and performance charts.

Original languageEnglish
Title of host publicationProceedings of the International MultiConference of Engineers and Computer Scientists 2010, IMECS 2010
Pages1217-1221
Number of pages5
StatePublished - 2010
Externally publishedYes
EventInternational MultiConference of Engineers and Computer Scientists 2010, IMECS 2010 - Kowloon, Hong Kong
Duration: 17 Mar 201019 Mar 2010

Publication series

NameProceedings of the International MultiConference of Engineers and Computer Scientists 2010, IMECS 2010

Conference

ConferenceInternational MultiConference of Engineers and Computer Scientists 2010, IMECS 2010
Country/TerritoryHong Kong
CityKowloon
Period17/03/1019/03/10

Keywords

  • AES
  • High throughput
  • MixColumn
  • Pipelining
  • SBox

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Fingerprint

Dive into the research topics of 'Design of a high throughput 128-bit AES (Rijndael Block Cipher)'. Together they form a unique fingerprint.

Cite this