An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The hardware implementation of such nonlinear parts however leads to an erroneous output due to the faults that occurs accidentally or intentionally. To overcome these faults a concurrent fault detection scheme must be adopted. In this paper, the composite field s box and inverse S box are divided into blocks and the predicted parities of these blocks are obtained. The faults are being injected in the sub byte input and the corresponding fault detection has been carried out. The comparison between the normal SBox and the composite field Sbox has been done using Xilinx 9.1 ISE and the corresponding simulation has been done using Modelsim software. The resulting area report reveals the better method for the efficient fault detection scheme of AES algorithm.
Authors and Affiliations
M. Hemalatha , S. Sridevi Sathya Priya , P. Karthigaikumar
AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING
Fingerprint is one of the most significant and traditional biometric trait and its uniqueness are exclusively determined by the local ridge characteristics and their relationships. However, in existing system,...
Comparative Study on Performance Analysis of High Resolution Direction of Arrival Estimation Algorithms
Abstract-Array processing involves manipulation of signals induced on various antenna elements. Its capabilities of steering nulls to reduce co channel interferences and pointing independent beams toward various mobi...
A Survey on Energy-Efficient protocol for Wireless Sensor Networks
Wireless Sensor Network has become one of the hot topics now a days although; it has been already applied in the use of many different areas. Such as the Home Automation, it is very common to find its use on the...
EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud
cloud, coming days is accustomed, more and more receptive data are being centralized into the cloud. In cloud, we make perceptive information habitually have to be ciphertext before outsourcing because of protectin...
Real Time Data Acquisition and Home Parameters Monitoring using LabVIEW
Home automation refers to a system that is used to control devices around the home. These devices can include doors, lights, surveillance systems, and consumer electronics. A smart home automation system has been develop...