kumar2016
kumar2016
Abstract—With the rapid increase in computing and simulation results are discussed in section IV. The paper is
communication devices the need for security services has become concluded in section V.
crucial in information transfer. Protecting the digital information
against security attacks is extremely important. Encipherment is II. ADVANCED ENCRYPTION STANDARD
the security mechanism that provides authenticity and
confidentiality. In this paper a highly secured design for offline A. Cryptography
speech communication is presented. The proposed design uses Cryptography is a practice and study of techniques for
Advanced Encryption Standard, a sophisticated cryptographic secure communication. The basic elements of a cryptographic
algorithm, which ensures that the transmitted data is protected algorithm are plaintext, key and cipher text. The data which is
from unauthorized disclosure. This design is implemented on present in its natural format is known as plaintext. A key is the
Field Programmable Gate Array for real time application of
sequence that controls the behavior of the algorithm. Cipher
offline speech encryption and decryption.
text is the data which is unreadable by anyone expect the
Keywords— Advanced Encryption Standard (AES), Field
intended recipients. Modern field of cryptography includes
Programmable Gate Array (FPGA), Universal Asynchronous symmetric key and asymmetric key cryptographic algorithms
Receiver Transmitter (UART). [2].
Symmetric key algorithms use same key for both
I. INTRODUCTION
encryption of plain text and decryption of cipher text. Across
Speech encryption has always been a very important part of the years, various comprehensive data encryption techniques
secured communication [1]. Digital transmission is much more have been developed. Some popular examples of symmetric
efficient than analog transmission and it is much easier for key algorithms include RC4 (Rivest Cipher 4), DES (Data
digital encryption techniques to achieve high degree of Encryption Standard), AES and triple DES [2]. AES cipher
security. Modern cryptographic algorithms have potential to also known as Rijndael cipher is the most advanced
provide security services like data confidentiality, data cryptographic algorithm approved by National Institute of
integrity, authentication, non-repudiation and access control. Standards and Technology (NIST) of the United States in
With the advent of reconfigurable devices like FPGAs, 2001 [3].
hardware implementation of complex algorithms has become B. AES Algorithm
quite easy which makes it possible to achieve significant
AES is a symmetric key block cipher existing in various
improvement in speed. AES is a cryptographic algorithm
key lengths of 128-bit, 192-bit and 256-bit. A block cipher
which needs large number of byte level and bit level
usually consists of two paired algorithms, one for encryption
operations. In the present work, the AES encryption/
at sender side and other for decryption at receiver side. As
decryption algorithm has been hardware implemented on
AES is a symmetric key cipher both sender and receiver share
FPGA for speech signal. For testing the hardware implemented
the same key which is also known as private key.
encryption/decryption engine, the sample speech was acquired
With the message P and the key K as input, the encryption
using a computer and MATLAB. The acquired speech file was
algorithm forms the cipher text C as mentioned in (1).
encrypted on a FPGA. The encrypted file was transmitted to
C = EK(P) (1)
another FPGA where it was decrypted and transferred to a
The notation as represented in (1) indicates that the cipher
computer where original speech was recovered using
text C is produced by using encryption algorithm E, as a
MATLAB.
function of the plaintext P, with the specific function
This paper is organized as follows. Section II gives a brief
determined by the value of the key K [4]. The intended
introduction AES algorithm. Section III describes the design
receiver in possession of the key is able to invert the
aspects of the AES hardware and serial communication
transformation and retrieve the plain text.
interface. The implementation of the design on FPGA and the
The inverse transformation that is performed using
Lokireddi Phani Kumar, School of VLSI Design and Embedded Systems, NIT decryption algorithm D as a function of the cipher text C [4] is
Kurukshetra, Kurukshetra, India ([email protected]) represented in (2).
P = DK(C) (2)
A. K. Gupta, School of VLSI Design and Embedded Systems, NIT
AES is an iterative cipher comprising computational
Kurukshetra, Kurukshetra, India ([email protected])
rounds for both encryption and decryption. For every
additional 32 bits in cipher key the number of rounds is
increased by one [5]. The number of rounds for various
lengths of AES ciphers are given in Table I. AES 128-bit 3) Mixing: In this transformation a bitwise XOR operation
cipher has been used in the proposed design. is applied between the neighboring bytes of the 128-bit block.
The mixing transformation is not performed in the last round.
TABLE I. AES STRUCTURE
4) Add-Round key: The most important transformation of
Classification Rounds the round is Add-Round key transformation. This
AES-128 10
transformation is a bitwise XOR operation between the
AES-192 12
AES-256 14 corresponding round key generated from key expansion
process and the 128-bit output of previous stage.
1498
IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India
process, the final stage is the post-round transformation. Post- transmit module, baud rate generator, receive data register and
round transformation is bitwise XOR operation between the transmit data register as shown in Fig.6.
cipher key and the output of the tenth round.
In asynchronous serial communication the receiving
device will not have any knowledge about the clock of the
source device. In general UART baud rates are much lower
than FPGA system clock. The internal clock frequency of
Spartan 3E FPGA system is 50 MHz and hence the baud rate
generator is used to divide the on board clock frequency into
lower rates to generate baud clock. The generated baud clock
is utilized to recover the received data as well as time the data
that is to be transmitted [7].
The voice which is recorded in computer using MATLAB
is shown in Fig.5. The voice is sampled at the rate of 8000
samples per second. The recorded voice is of one second
duration and so the total number of samples is 8000. The
amplitude level of each sample is digitized and is of 8-bit
length.
B. Serial Interface Design These digital values are transmitted using hyper-terminal
application of a host computer to FPGA board-1 for
Encryption and decryption process continues till the end of encryption via RS232 serial cable.
data transmission. The end to end data transfer is shown in
Fig.3.
Fig 4. Block Diagram of end to end Data transfer Fig 6. Block Diagram Architecture of Encryption System
UART (Universal Asynchronous Receiver Transmitter) As the transmission is asynchronous each data frame (8-
system was used for serial data transfer from computer to bit) is sent with start and stop bits. Receive module mainly
FPGA, FPGA to FPGA and FPGA to computer [6]. RS232 a consists of 8-bit serial in parallel out register. When the start
serial communication standard has been used for data transfer. bit is detected receive module synchronizes its baud clock
The speed of the RS232 link is determined by its baud rate. such that the edges align with the rate of the incoming data
The baud rate is the bit rate of the communication link in bits stream [7] and when the stop bit is detected the entire 8-bit
per second (bps) [9]. Both transmitting and receiving FPGA data frame is sent to receive data register. Receive data
boards must communicate at same baud rate [6]. The UART register which is of 128-bit length stores the data coming from
control module that is designed contains receive module, the receive module. When the receive data register is full, the
1499
IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India
1500
IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India
round transformations in order to reduce the critical path delay [3] “ADVANCED ENCRYPTION STANDARD,” Federal Information
and area issues. Processing Standards Publication 197, November 26, 2001.
[4] William Stallings, “Cryptography and Network Security Principles and
V. CONCLUSION Practice,” fourth edition, pearson publications, 2006.
[5] Joan Daemen and Vincent Rijman, AES proposal document, september
In this paper, a new hardware implementation has been 1999.
developed for real time application of offline speech [6] Rourab paul, Sangeet Saha, Suman Sau, Amlan Chakrabarti, “Real Time
encryption and decryption using AES algorithm. Cryptanalytic Communication between Multiple FPGA Systems in Multitasking
attacks are less efficient for longer keys and hence 128-bit Environment using RTOS,” IEEE transactions on Devices, Circuits and
AES used in this work is definitely more secure. Design Systems, pp.130-134, March 2012.
techniques used in implementation of AES are very simple but [7] Serial Communications document, Silicon Labs, Austin.
the algorithm is virtually indecipherable. Further optimization [8] Jan Axelson, “Serial port complete,” in Networks, 1998.
may need to be done for minimizing the required area on [9] Pong P. Chu, “FPGA Prototyping by VERILOG Examples,” Wiley
FPGA for high end applications. publications, 2008.
[10] Spartan-3E FPGA Family Data Sheet, Xilinx, july 19, 2013.
REFERENCES [11] Nalini C. Iyer, Anandmohan, “High Troughput, lowcost, Fully Pipelined
[1] Hussain Mohammad Dipu Kabir, Syed Bahauddin Alam, “Hardware Architecture for AES Crypto Chip,” IEEE transactions, september 2006.
Based Realtime, Fast and Highly Secured Speech Communication using [12] Hrushikesh S.Deshpande, Kailash J. Karande, Altaaf O. Mulani, “Area
FPGA,” IEEE transactions on Information Theory and Information Otimized Implementation of AES Algorithm on FPGA,” IEEE
Security, pp. 452-457, December 2010. transactions on Communications and Signal processing, pp. 10-14, April
[2] Behrouz A. Forouzan, “Cryptography and Network Security,” McGraw 2015.
Hill publications, 2010.
1501