SlideShare a Scribd company logo
VHDL IMPLEMENTATION
OF ENCRYPTION MODULE OF AES
Synopsis
for
Final year project of
B.Tech.
In
Electronics &Communication Engineering
Submitted to
Raj Kumar Goel Institute Of Technology, Ghaziabad
Under the guidance of:
KUNAL LALA
(Asst. Prof ,ECE Dept.)
Name of the Scholars
SHUBHAM CHAUHAN +918285856742
ROSHNI AWASTHI +919911917127
JAYANT YADAV +919911906063
GROUP NO…………….
CONTENTS
 ABSTRACT
 INTRODUCTION
 DIFFERENT MODULES OF AES ALGORITHM
 SOFTWARE & LANGUAGE USED
 PLANNING AND METHODOLOGY OF WORK
ABSTRACT
Security has become an increasingly important feature with the growth of electronic
communication. The Symmetric, or secret key algorithms, a cryptography method in
which the same key value is used in both the encryption and decryption calculations
are becoming more popular. The keys, in practice, represent a shared secret between
two or more users that can be used to maintain a private information link. Secret key
cryptography uses conventional algorithm that is Advanced Encryption Standard
(AES) algorithm. The AES algorithm is capable of using cryptographic keys of 128,
192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. This standard is
based on the RIJNDEAL algorithm. All the modules are compared with different
families of FPGA platforms. This methodology uses VHDL implementation the
modules in terms of Delay and Frequency.
INTRODUCTION
Nowadays cryptography has a main role in embedded systems design. In many
applications, the data requires a secured connection which is usually achieved by
cryptography. Cryptography is divided in two categories first is symmetric key
cryptography (sender and receiver shares the same key) and the second one is
asymmetric key cryptography. Here we are concerned about symmetric key
cryptography due to its use in military application, embedded system design, financial
and legal files, medical reports, and bank services via Internet, telephone
conversations, and e-commerce transactions etc. Many symmetric key cryptographic
algorithms were proposed, such as the Data Encryption Standard (DES), the Elliptic
Curve Cryptography (ECC), the Advanced Encryption Standard (AES) and other
algorithms. Here the hardware implementation of AES algorithm is presented to
increase the data transfer speed. Objective of the dissertation is to perform an efficient
method of implementing a AES algorithm with minimum delay and having high
performance in terms of delay while maintaining the proper functionality of the
system. The software used for the implementation of the algorithm is Xilinx 6.1 and
language used is VHDL (very high speed integrated circuit hardware description
language). Simulation of encryption process of the AES algorithm has been done
using the Xilinx software. Inputs will be converted into binary form and given as input
to the "Model-Sim Simulator" of XILINX.
DIFFERENT MODULE OF AES ALGORITHMS
The Data processing unit have four main modules or transformations in which
sub byte transform, shift rows, mix column and add round key are involved and
the Key Expansion unit generate the round key for the next round.
1. SUB BYTE TRANSFORM :-A byte-by-byte substitution during the forward
process .The corresponding substitution step used during decryption is called
INV Sub Bytes. This step consists of using a 16 × 16 lookup table to find
replacement byte for a given byte in the input state array. The entries in the
lookup table are created by using the notions of multiplicative inverses in GF
(2^8 ) and bit scrambling to destroy the bit-level correlations inside each byte.
2. SHIFT ROW TRANSFORM :-Cyclic shifts the rows of the State over
different offsets. The operation is almost the same in the decryption process
except for the fact that the shifting offsets have different values [2]. The goal of
this transformation is to scramble the byte order inside each 128-bit block.
3. MIX COLUMN TRANSFORM :-This process is for mixing up of the bytes in
each column separately during the forward process. The corresponding
transformation during decryption is denoted INV Mix Columns and stands for
inverse mix column transformation. The goal is here is to further scramble up
the 128-bit input block.
4. ADD ROUND KEY AND KEY EXPANSION:- In this operation, the round
key is applied to the State by simple bit by bit XOR. Basically Key Expansion
unit is used to generate the next round key as for three different key size, AES
consist of 10, 12 or 14 rounds. So after every round a new round key need to be
produced. So this unit produces that round key for each round. This unit also
utilize the concept of shifting the bytes and substitution of bytes which were
used in Data processing unit.The whole encryption unit is shown in Figure.
Figure. Encryption Module of AES
PLANNING & METHODOLOGY
 We have taken this project as it is mostly used nowadays and have a good
scope in future .
 We have planned to divide the work into sub groups and we decided to
complete theoretical part by the month December before the starting of
semester exams.
 We have already started our research work and land up to certain good results.
We need little more time to go through the topic thoroughly.
 And the practical implementation of the VHDL implementation is to be shown
in the next semester as the major project.

More Related Content

What's hot (20)

PDF
High Speed VLSI Architecture for AES-Galois/Counter Mode
IJERA Editor
 
PDF
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
PDF
Image encryption and decryption using aes algorithm
IAEME Publication
 
PDF
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
PDF
A03530107
inventionjournals
 
PDF
Narrow bicliques cryptanalysisoffullidea
Rifad Mohamed
 
PDF
Secure image encryption using aes
eSAT Publishing House
 
PPTX
Homomorphic encryption in cloud computing final
Santanu Das Saan
 
PDF
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
PDF
Homomorphic encryption on Blockchain Principles
Johann Höchtl
 
PDF
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
paperpublications3
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PPTX
Rc6 algorithm
Chethan Chetu
 
PDF
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Patel Dasharathbhai
 
PDF
Efficient ECC encryption for WSN’s
IDES Editor
 
PPTX
Homomorphic encryption
Namit Sinha
 
PPTX
Diffie hellman key algorithm
ShaishavShah8
 
PDF
Understanding Large Social Networks | IRE Major Project | Team 57
Raj Patel
 
DOCX
K means report
Gaurav Handa
 
PDF
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
High Speed VLSI Architecture for AES-Galois/Counter Mode
IJERA Editor
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
Image encryption and decryption using aes algorithm
IAEME Publication
 
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
Narrow bicliques cryptanalysisoffullidea
Rifad Mohamed
 
Secure image encryption using aes
eSAT Publishing House
 
Homomorphic encryption in cloud computing final
Santanu Das Saan
 
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Homomorphic encryption on Blockchain Principles
Johann Höchtl
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
paperpublications3
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Rc6 algorithm
Chethan Chetu
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Patel Dasharathbhai
 
Efficient ECC encryption for WSN’s
IDES Editor
 
Homomorphic encryption
Namit Sinha
 
Diffie hellman key algorithm
ShaishavShah8
 
Understanding Large Social Networks | IRE Major Project | Team 57
Raj Patel
 
K means report
Gaurav Handa
 
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 

Similar to VHDL Encryption (20)

PDF
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
PDF
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
PDF
Fpga implementation of encryption and decryption algorithm based on aes
eSAT Publishing House
 
PDF
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
PDF
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
PDF
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
PDF
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
PDF
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
PDF
A04660105
IOSR-JEN
 
PDF
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
PDF
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
PDF
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
PDF
G04701051058
ijceronline
 
PDF
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
PDF
Iisrt swathi priya(26 30)
IISRT
 
PPTX
1st review major project aes algorithm.pptx
Yavanika4
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Fpga implementation of encryption and decryption algorithm based on aes
eSAT Publishing House
 
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
A04660105
IOSR-JEN
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
paperpublications3
 
G04701051058
ijceronline
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Iisrt swathi priya(26 30)
IISRT
 
1st review major project aes algorithm.pptx
Yavanika4
 
Ad

More from Shubham Chauhan (12)

PPTX
LiFI TECHNOLOGY
Shubham Chauhan
 
PPTX
Mobile Communication
Shubham Chauhan
 
PPTX
NEAR FIELD COMMUNICATION
Shubham Chauhan
 
PPTX
OLED
Shubham Chauhan
 
PPTX
ULTRACAPACITOR
Shubham Chauhan
 
PPT
Radar & amp; stealth technology
Shubham Chauhan
 
PPT
Semi conductor
Shubham Chauhan
 
PPTX
Stealth technology
Shubham Chauhan
 
PPT
Wi-Fi
Shubham Chauhan
 
PPT
Bluetooth
Shubham Chauhan
 
PPTX
Blue Eyes
Shubham Chauhan
 
LiFI TECHNOLOGY
Shubham Chauhan
 
Mobile Communication
Shubham Chauhan
 
NEAR FIELD COMMUNICATION
Shubham Chauhan
 
ULTRACAPACITOR
Shubham Chauhan
 
Radar & amp; stealth technology
Shubham Chauhan
 
Semi conductor
Shubham Chauhan
 
Stealth technology
Shubham Chauhan
 
Bluetooth
Shubham Chauhan
 
Blue Eyes
Shubham Chauhan
 
Ad

Recently uploaded (20)

PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
July Patch Tuesday
Ivanti
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
July Patch Tuesday
Ivanti
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 

VHDL Encryption

  • 1. VHDL IMPLEMENTATION OF ENCRYPTION MODULE OF AES Synopsis for Final year project of B.Tech. In Electronics &Communication Engineering Submitted to Raj Kumar Goel Institute Of Technology, Ghaziabad Under the guidance of: KUNAL LALA (Asst. Prof ,ECE Dept.) Name of the Scholars SHUBHAM CHAUHAN +918285856742 ROSHNI AWASTHI +919911917127 JAYANT YADAV +919911906063 GROUP NO…………….
  • 2. CONTENTS  ABSTRACT  INTRODUCTION  DIFFERENT MODULES OF AES ALGORITHM  SOFTWARE & LANGUAGE USED  PLANNING AND METHODOLOGY OF WORK
  • 3. ABSTRACT Security has become an increasingly important feature with the growth of electronic communication. The Symmetric, or secret key algorithms, a cryptography method in which the same key value is used in both the encryption and decryption calculations are becoming more popular. The keys, in practice, represent a shared secret between two or more users that can be used to maintain a private information link. Secret key cryptography uses conventional algorithm that is Advanced Encryption Standard (AES) algorithm. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. This standard is based on the RIJNDEAL algorithm. All the modules are compared with different families of FPGA platforms. This methodology uses VHDL implementation the modules in terms of Delay and Frequency.
  • 4. INTRODUCTION Nowadays cryptography has a main role in embedded systems design. In many applications, the data requires a secured connection which is usually achieved by cryptography. Cryptography is divided in two categories first is symmetric key cryptography (sender and receiver shares the same key) and the second one is asymmetric key cryptography. Here we are concerned about symmetric key cryptography due to its use in military application, embedded system design, financial and legal files, medical reports, and bank services via Internet, telephone conversations, and e-commerce transactions etc. Many symmetric key cryptographic algorithms were proposed, such as the Data Encryption Standard (DES), the Elliptic Curve Cryptography (ECC), the Advanced Encryption Standard (AES) and other algorithms. Here the hardware implementation of AES algorithm is presented to increase the data transfer speed. Objective of the dissertation is to perform an efficient method of implementing a AES algorithm with minimum delay and having high performance in terms of delay while maintaining the proper functionality of the system. The software used for the implementation of the algorithm is Xilinx 6.1 and language used is VHDL (very high speed integrated circuit hardware description language). Simulation of encryption process of the AES algorithm has been done using the Xilinx software. Inputs will be converted into binary form and given as input to the "Model-Sim Simulator" of XILINX.
  • 5. DIFFERENT MODULE OF AES ALGORITHMS The Data processing unit have four main modules or transformations in which sub byte transform, shift rows, mix column and add round key are involved and the Key Expansion unit generate the round key for the next round. 1. SUB BYTE TRANSFORM :-A byte-by-byte substitution during the forward process .The corresponding substitution step used during decryption is called INV Sub Bytes. This step consists of using a 16 × 16 lookup table to find replacement byte for a given byte in the input state array. The entries in the lookup table are created by using the notions of multiplicative inverses in GF (2^8 ) and bit scrambling to destroy the bit-level correlations inside each byte. 2. SHIFT ROW TRANSFORM :-Cyclic shifts the rows of the State over different offsets. The operation is almost the same in the decryption process except for the fact that the shifting offsets have different values [2]. The goal of this transformation is to scramble the byte order inside each 128-bit block. 3. MIX COLUMN TRANSFORM :-This process is for mixing up of the bytes in each column separately during the forward process. The corresponding transformation during decryption is denoted INV Mix Columns and stands for inverse mix column transformation. The goal is here is to further scramble up the 128-bit input block. 4. ADD ROUND KEY AND KEY EXPANSION:- In this operation, the round key is applied to the State by simple bit by bit XOR. Basically Key Expansion unit is used to generate the next round key as for three different key size, AES consist of 10, 12 or 14 rounds. So after every round a new round key need to be produced. So this unit produces that round key for each round. This unit also utilize the concept of shifting the bytes and substitution of bytes which were used in Data processing unit.The whole encryption unit is shown in Figure.
  • 7. PLANNING & METHODOLOGY  We have taken this project as it is mostly used nowadays and have a good scope in future .  We have planned to divide the work into sub groups and we decided to complete theoretical part by the month December before the starting of semester exams.  We have already started our research work and land up to certain good results. We need little more time to go through the topic thoroughly.  And the practical implementation of the VHDL implementation is to be shown in the next semester as the major project.