Area optimized in storage area network using Novel Mix column Transformation in Masked AES
Citation
Mrs.S.Anitha, Ms.M.Suganya"Area optimized in storage area network using Novel Mix column Transformation in Masked AES", International Journal of Engineering Trends and Technology (IJETT), V20(6),275-282 Feb 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Advanced Encryption Standard was implemented in cryptographic techniques like Data Encryption Standard and Triple Data Encryption Standard. Advanced Encryption Standard is more secure and faster than conventional techniques. Advanced Encryption Standard are used to map the input values from GF(28) to GF(24) at the beginning of the operation and map the result back from GF(24) to GF(28) at the end of the operation, which reduces area resources. But further area reduction is possible by implementing a novel technique in mix column.
References
[1] Design of “High Speed AES-128 using Novel Mix Column Transformation and Subbytes” by K.Sandyarani,Dr.p.Nirmal Kumar Journal of Computer Apllications Volume VII, Issue 2, 2014
[2] Incorparation of Reduced 09,0B,0D and 0E Structures Into Inverse MixColumns For AES-128 TechniquesJournal of Theoretical and Applied Information Technology 10th December 2014. Vol.70 No.1 © 2005 - 2014 JATIT & LLS. All rights reserved
[3] Design and Implementation a different Architecture of Mixcolumn in FPGA Department of Electronics and treatment of information university hassan ii mohammedia, Casablanca, Morocco
[4] The Advanced Encryption Standard(AES):The Successor of DES, Dr Reinhard Wobst
[5] Design of High Speed and Low area Masked AES using Complexity Reduced Mix-Column Architecture, IJCSEC-International Journal of Computer Science and Engineering Communications, Vol.2 Issue.3, May 2014. ISSN: 23478586,J.Balamurugan1,Dr.E.Logashanmugam2Research Scholar1, Professor and Head2, St.Peter’s University1, Sathyabama University2, TN, India
[6] A VHDL Implementation of the Advanced Encryption Standard-Rijndael Algorithm by Rajender Manteena,Wilfrido Moreno,Ph.D.James Leffew,ph.d.Wei Qian,Ph.d March 23,2004
[7]Image Cipher Technique for Covert and Low Bandwidth Channels Sangeeta Solanki1, A.K.Vats1, Shikha Maan1 (Corresponding Author: Sangeeta Solanki) School of computer engg & IT. Shobhit University, Meerut, U.P.
[8]FPGA implementations of advanced encryptionstandard: a survey shylashree.n1, nagarjun bhat2 and v. shridhar31research scholar (r.n.s.i.t),in e.c.e, at pesce, mandya, karnataka, india 2student, b.e (4th semester), dept of ece, rnsit 3professor, in e.c.e, at p.e.s.c.e, mandya, karnataka, india
[9]lightweight mix columns implementation for aes, computer systems department computer systems department information system department faculty of computer and information science ain shams university abbasiaa, cairo
[10] International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(3): 183-188 The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012) Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
[11]Evaluation of Countermeasures Implementations Based on Boolean Masking to Thwart Side-Channel Attacks Houssem Maghrebi, Jean-Luc Danger, Florent Flament, Sylvain Guilley, Laurent Sauvage D´epartement COMELEC Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Paris Cedex, France.
Key words
Data Encryption Standard (DES),Triple Data Encryption Standard (3DES.