FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

A Compact Hardware Design and Implementation on FPGA Based Hybrid of AES and Keccak SHA3-512 for Enhancing Data Security

Author(s): K Janshi Lakshmi and G Sreenivasulu

Publisher : FOREX Publication

Published : 15 march 2024

e-ISSN : 2347-470X

Page(s) : 195-202




K Janshi Lakshmi*, Research Scholar (Full Time), Department of Electronics and Communication Engineering, Sri Venkateswara University, Tirupati, AndhraPradesh, India; Email: jansikaramala@gmail.com

G Sreenivasulu, Professor, Department of Electronics and Communication Engineering, Sri Venkateswara University, Tirupati, AndhraPradesh, India; Email: gunapatieee@rediffmail.com

    [1] Advanced Encryption Standard, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, Standard FIPS-197,Nov. 2001.
    [2] SHA-3 Standard: Permutation-Based Hash Extendable-Output Functions, National Institute of Standards and Technology (NIST), Gaithers burg, MD, USA, Standard FIPS PUB 202, Aug. 2015. [CrossRef]
    [3] "Keccak Specification Summary", Keccak Team, [online] Available: https://keccak.team/keccak_specs_summary.html.
    [4] Sheng-Jung Yu, Yu-Chi Lee, Liang-Hsin Lin, “An Energy-Efficient Double Ratchet Cryptographic Processor With Backward Secrecy for IoT Devices”, IEEE Journal of Solid-State Circuits ( Volume: 58, Issue: 6, June 2023), https://doi.org/10.1109/JSSC.2022.3220838. [CrossRef]
    [5] Dur-e-Shahwar Kundi , Ayesha Khalid , Arshad Aziz, Chenghua Wang, Weiqiang Liu, “Resource-Shared Crypto-Coprocessor of AES Enc/Dec With SHA-3”, IEEE transactions on circuits and systems–i: regular papers, 1549-8328 © 2020 IEEE https://doi.org/10.1109/TCSI.2020.2997916. [CrossRef]
    [6] Jayanti Sharma , Deepali Koppad , “Low Power and Pipelined Secure hashing Algorithm3(SHA-3)”, 2016 IEEE Annual India Conference (INDICON) , 2016, Electronic ISSN: 2325-9418, https://doi.org/10.1109/INDICON.2016.7839059. [CrossRef]
    [7] Sara al-shara'a , Raid Khalid ibraheem , Oguz Bayat ,“Implementation of cryptanalysis based on FPGA hardware using AES with SHA-1” 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), ©2019 IEEE. https://doi.org/10.1109/SmartNets48225.2019.9069786. [CrossRef]
    [8] Noveline Aziz Fauziah, Eko Hari Rachmawanto et al, “Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application”, IEEE Transactions on Dependable and Secure Computing ( Volume: 16, Issue: 2, 01 March-April 2019), https://doi.org/10.1109/TDSC.2017.2687463. [CrossRef]
    [9] Huanyu Wang, Henian Li et al., “SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (Volume: 41, Issue: 3, March 2022), https://doi.org/10.1109/TCAD.2021.3063998. [CrossRef]
    [10] P. William, Abha Choubey, G. S. Chhabra, Riju Bhattacharya, K. Vengatesan, Siddhartha Choubey, “Assessment of Hybrid Cryptographic Algorithm for Secure Sharing of Textual and Pictorial Content”, 2022 International Conference on Electronics and Renewable Systems (ICEARS), © 2022 IEEE, https://doi.org/10.1109/ICEARS53579.2022.9751932. [CrossRef]
    [11] Wenjian Luo, Yamin Hu et al., “Authentication by Encrypted Negative Password”, IEEE Transactions on Information Forensics and Security ( Volume: 14, Issue: 1, January 2019), https://doi.org/10.1109/TIFS.2018.2844854. [CrossRef]
    [12] K. Janshi Lakshmi and G. Sreenivasulu, “Design and Implementation of S-Box Using Galois Field Approach Based on LUT and Logic Gates for AES-256”, Proceedings of the International Conference on Intelligent Computing, Communication and Information Security, Algorithms for Intelligent Systems, Springer Nature, July 2023, https://doi.org/10.1007/978-981-99-1373-2_10. [CrossRef]
    [13] Kazim Yumbul and Erkay Savas, “Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms”, The Computer Journal ( Volume: 58, Issue: 10, October 2015), IEEE, https://doi.org/10.1093/comjnl/bxu040. [CrossRef]
    [14] Jalel Ktari, Tarek Frikha, Mohamed Ali Yousfi,Mohamed Kadhem Belghith, Nessrine Sanei."Embedded Keccak implementation on FPGA", 2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems(DTS),2022 https://doi.org/10.1109/DTS55284.2022.9809847. [CrossRef]
    [15] Ling Ren, Christopher W. Fletcher, AlbertKwon, Marten van Dijk, Srinivas Devadas."Design and Implementation of the AscendSecure Processor",IEEE Transactions on Dependable and Secure Computing ( Volume: 16, Issue: 2, 01 March-April 2019)https://doi.org/10.1109/TDSC.2017.2687463. [CrossRef]

K Janshi Lakshmi and G Sreenivasulu (2024), A Compact Hardware Design and Implementation on FPGA Based Hybrid of AES and Keccak SHA3-512 for Enhancing Data Security. IJEER 12(1), 195-202. DOI: 10.37391/IJEER.120128.