An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The hardware implementation of such nonlinear parts however leads to an erroneous output due to the faults that occurs accidentally or intentionally. To overcome these faults a concurrent fault detection scheme must be adopted. In this paper, the composite field s box and inverse S box are divided into blocks and the predicted parities of these blocks are obtained. The faults are being injected in the sub byte input and the corresponding fault detection has been carried out. The comparison between the normal SBox and the composite field Sbox has been done using Xilinx 9.1 ISE and the corresponding simulation has been done using Modelsim software. The resulting area report reveals the better method for the efficient fault detection scheme of AES algorithm.
Authors and Affiliations
M. Hemalatha , S. Sridevi Sathya Priya , P. Karthigaikumar
A Survey on Intrusion Detection System in Data Mining
This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Ne...
BBO Comparison with other Nature Inspired Algorithms to Resolve Mixels
Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed...
Performance Analysis of AODV and DSDV in Simulation Based Map
In recent days Inter-Vehicle communication has fascinated many research communities and automotive industries .With the introduction of inter-vehicle communication it would be possible for vehicles to communicate...
Page Interest Estimation using Apriori Algorithm
The paper discusses about web usage mining involves the automatic discovery of user access patterns from one or more Web servers. The paper also confers about the procedure in which the web usage mining of the data se...
Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET
In this paper we investigate and implementing trust based route selection in mobile wireless ad hoc networks. A system that stores and updates trust values for nodes encountered in mobile ad hoc networks. Since a rout...