Design a Finite Field Multiplier for Novel Cryptography
Keywords:
Advanced Encryption Standard, Cryptographic Systems.Abstract
The process to develop a federal information processing standard for the advanced encryption algorithm to replace the data encryption standard. In this paper, we proposed an efficient VLSI architecture for advanced encryption standard design methodology in order to provide a high-speed and effective cryptographic operation. High-performance and fast implementation of proposed multiplication is applied to cryptographic systems. The internal multiplier contains three stages of operations. They are pre-processing stage, carry generation stage, post-processing stage. The pre-processing stage concentrate on propagate and generate, carry generation stage focuses on carry generation and post-processing stage focuses on final result. In this paper, we propose efficient and high speed architectures to implement cryptography using proposed multiplier. Cryptography is the operation in wireless communication between transmissions and receiving of data, the secured data is communicated in an unsecured channel between transmitter and receiver with high security. At the transmitter side the original data is converted in to secured sequence and at the receiver side the secured sequence is converted in to original data sequence. Our proposed multiplier is used in that conversion and by using this converter we are designing a cryptography application.
References
- Shoaleh Hashemi Namin, Huapeng Wu, Senior Member, IEEE, and Majid Ahmadi, Fellow, IEEE “Low-Power Design for a Digit-Serial Polynomial Basis Finite Field Multiplier Using Factoring Technique” IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS,1063-8210 © 2016 IEEE
- Kean, "Cryptographically Enforced Pay-Per-Use Licensing of FPGA Design Intellectual Property", Proceedings International Workshop on IP Based Design 2002.
- , Soudan, W. Adi, and A. Hanoun, “Novel SecretKey IPR Protection in FPGA Environment,” Proceedings System-on- Chip Conference, September 2005.
- Kahng , A. B., Kirovski , D., Mantik, ., Potkonjak, M., and Wong, J. L., "Copy Detection for Intellectual Property Protection of VLSI Design." Proc. IEEE/ACM Intl. Conference on Computer-Aided Design, November 1999, pp. 600-604.
- Newbould, R. D., Carothers, J. D., Rodriguez, J. J., and HolmanW. T., “A Hierarchy Of Physical Design Watermarking Schemes For Intellectual Property Protection Of IC Designs,” Proceedings of the International Symposium on Circuits and Systems, 2002, Vol. IV, pp. 862 - 865
- Technical discussions with Rich Goldman, Vice President, Strategic Alliances, Synopsys. November 2005.
- Actel, “ProASIC3/E Security,” Application Note available at http://www.actel.com, cited on 14/4/2005.
- Kean, "Cryptographically Enforced Pay-Per-Use Licensing of FPGA Design Intellectual Property", Proceedings International Workshop on IP Based Design 2002.
- W. Adi , Fuzzy Modular Arithmetic for Cryptographic Schemes with Applications to Mobile Security EUROCOM 2000.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.