Aes 256 Fpga
Aes 256 Fpga
Aes 256 Fpga
ICIIECS’15
E. Key Scheduling
The Round Keys are derived from the Cipher Key
by means of a key schedule. The number of Round
Keys necessary to encrypt one block of information
depends on the block length and key length as this
determines the number of rounds. For a block length
of 128 bits, 11 Round Keys are needed i.e. one for
initial round, 9 for standard rounds(sub bytes, shift
rows, mix column and add round key) and one for the
final round).
VII. CONCLUSION
REFERENCES:
[1] I. Verbauwhede, P. Schaumont, and H. Kuo, “Design and
Performance Testing of a 2.29 gb/s Rijndael Processor,” IEEE J.
Solid-State Circuits, vol. 38, no. 3, pp. 569-572, Mar. 2003.
[2] D. Mukhopadhyay and D. RoyChowdhury, “An Efficient end
to End Design of Rijndael Cryptosystem in 0:18m CMOS,” Proc.
18th Int’l Conf. VLSI Design, pp. 405-410, Jan. 2005.
[3] S. Morioka and A. Satoh, “A 10-gbps full-AES Crypto Design
with a Twisted BDD s-Box Architecture,” IEEE Trans. Very Large
Scale Integration Systems, vol. 12, no. 7, pp. 686-691, July 2004.
[4] A. Hodjat and I. Verbauwhede, “Area-Throughput Trade-Offs
for Fully Pipelined 30 to 70 Gbits/s AES Processors,” IEEE Trans.
Computers, vol. 55, no. 4, pp. 366-372, Apr. 2006.
[5] M. Biglari, E. Qasemi, B. Pourmohseni, "Maestro: A high
performance AES encryption/decryption system", Computer
Architecture and Digital Systems (CADS), 17th CSI International
Symposium, pp.145-148, 30-31 Oct. 2013.
[6] A. Hodjat and I. Verbauwhede, “A 21.54 gbits/s Fully
Pipelined AES Processor on FPGA,” Proc. IEEE 12th Ann. Symp.
Field Programmable Custom Computing Machines, pp. 308- 309,
Apr. 2004.