High-throughput low-area design of AES using constant binary matrix-vector multiplication

Hokyoon Lee, Yoonah Paik, Jaeyung Jun, Youngsun Han, Seon Wook Kim

    Research output: Contribution to journalArticlepeer-review

    15 Citations (Scopus)

    Abstract

    In spite of many outstanding studies, the hardware implementation of Advanced Encryption Standard (AES) algorithm is still challenging because of recurrent computations in Galois Field GF(28). In this paper, in order to revolution up the hardware implementation, we propose a new design of SubBytes and MixColumns in AES using constant binary matrix-vector multiplications. By employing constant binary matrices reduced to AND and XOR operations, we could promote a synthesis compiler to optimize the design more efficiently. In addition, in order to achieve higher throughput, we propose a four-stage pipelined AES architecture. Evaluations show that the proposed method improves both in term of throughput and area complexity. Our proposed design of AES achieved 3.8 Gbps throughput with about 9.8k gates and 1k flip-flops which was the highest throughput and the lowest gate count at the same time, on 180 nm CMOS technology. By applying our proposed method to SubBytes, the area complexity decreased by 8.3% while the latency was reduced by 5.5%.

    Original languageEnglish
    Pages (from-to)360-368
    Number of pages9
    JournalMicroprocessors and Microsystems
    Volume47
    DOIs
    Publication statusPublished - 2016 Nov 1

    Bibliographical note

    Funding Information:
    This research was supported by a Korea University Grant.

    Publisher Copyright:
    © 2016 Elsevier B.V.

    Keywords

    • Advanced Encryption Standard (AES)
    • Matrix-vector multiplication
    • Pipelining

    ASJC Scopus subject areas

    • Software
    • Hardware and Architecture
    • Computer Networks and Communications
    • Artificial Intelligence

    Fingerprint

    Dive into the research topics of 'High-throughput low-area design of AES using constant binary matrix-vector multiplication'. Together they form a unique fingerprint.

    Cite this