Optimized hardware implementation of the advanced encryption standard algorithm

Ahmed Fathy Abd Elfatah, Ibrahim F. Tarrad, Ali Ismail Awad, Hesham F.A. Hamed

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Data encryption has become a vital need for protecting the user data in most of communication areas. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications due to its reliability and flexibility. The AES algorithm faces two main challenges which included in both encryption/decryption speed, and the consumed implementation area. This paper presents an optimized implementation of the AES algorithm with respect to the consumed implementation area by combining both data and key expansion approaches. The optimized implementation of AES increases its applicability in the small sized devices such as mobile phones and smart cards. The experimental outcomes prove the superiority of the proposed optimization approach compared to the available approaches in the literature with acceptable frequency and throughput for low throughput applications.

Original languageEnglish
Title of host publicationProceedings - 2013 8th International Conference on Computer Engineering and Systems, ICCES 2013
Pages197-201
Number of pages5
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event2013 8th International Conference on Computer Engineering and Systems, ICCES 2013 - Cairo, Egypt
Duration: Nov 26 2013Nov 27 2013

Publication series

NameProceedings - 2013 8th International Conference on Computer Engineering and Systems, ICCES 2013

Conference

Conference2013 8th International Conference on Computer Engineering and Systems, ICCES 2013
Country/TerritoryEgypt
CityCairo
Period11/26/1311/27/13

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Optimized hardware implementation of the advanced encryption standard algorithm'. Together they form a unique fingerprint.

Cite this