Professional Documents
Culture Documents
Ali A. Jawad
attacking and
decryption of
the
the
AES
algorithm
with
regard
to
Field
The pipelined
INTRODUCTION
II.
ENCRYPTION PROCESS
The First International Conference of Electrical, Communication, Computer, Power and Control Engineering ICECCPCE'13/December17-18, 2013
AddRoundKey( )
ByteSub( )
ShiftRow( )
MixColwnn( )
AddRoundKey( )
7<
5d
56
"
A'
74
32
E4
2f
55
46
OS
9d
D6
2D
Db
04
58
47
82
A4
80
63
8b
6d
Of
E2
8,
07
17
1,
E8
Ed
IS
83
AS
F.
34
00
6,
C7
2,
0..
lb
EO
3,
'"
45
B7
1,
85
18
33
9f
86
4,
7,
93
54
8f
3,
36
AS
E1
8.
F6
03
28
9,
89
4f
7b
81
F7
24
8b
f'
C2
0,
72
C,
21
F2
3f
E3
14
2b
75
D4
Al
26
6b
53
79
Cf
FO
F,
A6
62
52
2,
DB
5.
5,
23
C8
Od
61
B,
F5
70
06
f5
A,
8d
"
27
f.
A3
A9
C5
3,
31
EO
D2
Cd
90
13
f'
F3
40
C.
5b
08
99
B8
5'
1,
C1
42
38
"
Fd
2.
"
7f
9,
SO
3d
35
Sf
97
Fl
Of
Ff
41
Bd
2d
25
57
ld
19
05
43
Dd
C,
B3
7d
8,
30
Fb
66
F8
07
80
39
F4
51
88
4d
49
Eb
Cb
44
65
Bl
Ad
E7
67
71
73
03
89
Ab
92
C9
78
29
00
16
A2
94
59
Ob
C4
95
6f
9b
"
3b
69
5,
E9
11
7,
68
48
98
A7
0,
02
C3
CO
D9
87
"
76
C6
D.
85
84
OJ
22
84
Ef
4.
37
82
Dl
96
12
AO
F9
If
77
60
86
'"
10
9!
4b
9.
ShiftRow( )
AddRoundKey( )
Cb
E9
0,
C4
71
23
87
Ff
2f
9b
F.
"
4,
Fb
07
F3
81
56
28
"
24
38
AS
36
30
8b
A4
25
F6
13
52
f.
6.
49
A2
5b
76
40
C.
9,
57
66
Al
2,
08
Ad
7<
06
39
Ob
95
"
f,
8,
B3
44
03
32
94
7b
54
84
IS
A6
9.
9d
8d
A7
"
34
O.
17
0.
B9
Ed
Fd
E3
B8
3,
45
92
86
65
5d
3f
02
A3
16
98
68
86
69
OJ
OS
8.
F8
6d
64
"
03
Bd
At
C1
D9
D4
Sf
"
Sf
"
2,
00
70
C2
SO
C3
OS
58
E4
F7
C9
5,
3d
46
00
Ab
DB
82
47
Ef
I.
E8
37
F9
E2
B7
42
0,
4.
22
74
96
80
"
C7
3,
C,
Cf
F2
97
Db
88
F,
D!
41
11
9!
3.
F4
5.
D2
C6
90
Cd
78
19
4f
63
'"
20
84
8f
73
04
lb
B,
lB
A4
Eb
E7
3b
35
89
C5
20
ld
75
AO
6,
43
EO
8,
4d
Of
9f
7.
f5
2d
6b
C8
85
8b
A9
7f
51
60
2b
FO
7,
Of
59
10
12
B1
67
El
E6
14
33
AS
Dd
7d
'"
21
55
07
72
31
CO
26
D6
77
8.
82
27
4b
f'
61
99
53
83
B5
6f
Od
48
BO
F5
2.
A,
F1
93
62
9,
79
If
Figure 2 [1].
50,0
50,1
50,2
50,3
51,0
51,1
51,2
51,3
52,0
52,1
53,0
53,1
New
5'0,0
5'0,1
5'0,2
5'0,3
5\.0
5\,1
5\.2
5\.3
5'2,1
5'2,2
5'2,3
for
0::::,
<Nb
Key(i)
50,0
50,1
50,2
50,3
51,0
51,1
51,2
51,3
52,0
52,1
52,2
52,3
53,0
53,1
53,2
53,3
1-+
ShiftRows -+
()
50,0
50,1
50,2
50,3
51,1
51,2
51,3
51,0
52,2
52,3
52,0
52,1
53,3
53,0
53,1
53,2
The First International Conference of Electrical, Communication, Computer, Power and Control Engineering ICECCPCE'13/December17-18, 2013
InvShiftRow( )
InvMixColumn( )
AddRoundKey( )
Examples
[i*Nb]
{03}.{bf}
bf=1011 1111
03=11 = 10 EB OI
Then:
W[O]
DECRYPTION PROCESS
but the bytes III the last three rows of the state are cyclically
right shifted. Hence, this transformation proceeds as follows:
for
O::S
r <4 and
O::S
c<Nb
IV.
The First International Conference of Electrical, Communication, Computer, Power and Control Engineering ICECCPCE'13/December17-18, 2013
V.
VI.
32%
Logic utilization
B.
%)
Combinational ALUTs
9,816/38,000 (26
Memory ALUTs
0/19,000 ( 0% )
12,624/38,000(33
%)
Total registers
12624
Total pins
385
0/384 (0%)
Total PLLs
0/4(0%)
Total DLLs
0/4(0%)
1 488 ( 79% )
Slack
Worst-case tsu
-0.333 ns 2.000 ns
Worst-case tco
Worst-case
th
Required T i me
1.119 ns 6.000 ns
-0.403 ns -2.000 ns
period
2.500 ns )
2.500 ns )
CLKI
15,504/38,000 (41
Memory ALUTs
0/19,000( 0 % )
Plaintext/Cipher
text 128 bit
56%
Combinational ALUTs
22,256
%)
1 38,000 (59%)
Total registers
22256
Total pins
385
778,240/5,455,872(14 % )
0/384(0%)
Total PLLs
0/4( 0%)
Total DLLs
0/4( 0%)
1 488 (79% )
En=1 or 0
r-....lI:...__
.
...... _ l _28
..,
CLK2
Secret
Key 128
bit
Key Schedule
Generation
Worst-case tco
Worst-case th
Slack
Required Time
3.000 ns
0.129ns 5.000 ns
0.081 ns -2.000 ns
1.443 ns 400.00 MHz ( period - 2.500 ns )
0.329ns 400.00 MHz ( period
2.500 ns
0.097 ns
The input plaintext, cipher key, round keys, round states, and
the final output cipher text of the encryption stage are
The First International Conference of Electrical, Communication, Computer, Power and Control Engineering ICECCPCE'13/December17-18, 2013
Edit
View
--- -----
Add
Format
Tools
----------------------------------------- -----
------------- -------------
-.,J
---------
Window
Edit
View
Add
Format
Tools
-- -------
Window
- -----
------
--
--
-----
The First International Conference of Electrical, Communication, Computer, Power and Control Engineering ICECCPCE'13/December17-18, 2013
I.
CONCLUSIONS
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]