0% found this document useful (0 votes)
33 views4 pages

FPGA Implementation of AES Algorithm

For more projects feel free to contact us info@nanocdac.com ; www.nanocdac.com Contact us : Mallikarjuna.V, 08297578555
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views4 pages

FPGA Implementation of AES Algorithm

For more projects feel free to contact us info@nanocdac.com ; www.nanocdac.com Contact us : Mallikarjuna.V, 08297578555
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

FPGA Implementation of AES Algorithm

AIM: The main aim of the project is to design and implement FPGA Implementation of AES Algorithm. ABSTRACT: The Advanced Encryption Standard can be programmed in software or built with pure hardware. However Field Programmable ate Arrays !FP As" offer a #uic$er% more customi&able solution. This research investigates the AES algorithm with regard to FP A and the 'ery High Speed (ntegrated )ircuit Hardware *escription language !'H*+". Software is used for simulation and optimi&ation of the synthesi&able 'H*+ code. All the transformations of both Encryptions and *ecryption are simulated using an iterative design approach in order to minimi&e the hardware consumption.

V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

BL C! "IAGRAM:

Fig, AES Encryption Process.

V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

Fig, AES *ecryption Process

LS:

-ilin. /.0(SE% 1odelsim 2.3c. APPLICATI # A"$A#TAGES: All the transformations of algorithm are simulated using an iterative design approach in order to minimi&e the hardware consumption.4 The throughput reaches the value of 5601bit7sec for both encryption and decryption process. REFERE#CES:

V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

1ar$o 1ali% Franc 8ova$ and Anton 9iasi&&o :Hardware (mplementation of AES Algorithm; <=ournal of E+E)T>()A+ E8 (8EE>(8 % 'ol. 62% 8o. /?@A% 026?02/. 9ehrou& A. Forou&an and *ebdeep 1u$hopadhyay :)ryptography and 8etwor$ Security; !0nd edition". F(PS @/B% :Advanced Encryption Standard !AES";% 8ovember 02. +.Thulasimani%;A Single )hip *esign and (mplementation of AES ?@0C7@/07062 Encryption Algorithms;? (nternational =ournal of Engineering Science and Technology% 'ol. 0!6"% @A60?@A6/. 8ation (nstitute of Standards and Technology !8(ST"% *ata Encryption Standard !*ES"% 8ational Technical (nformation Service% Sprinfgield% 'A 00@2.

V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy