AES-128 Key Expansion Implemented on FPGAusing Two Approaches

Provided by: Creative Commons
Topic: Security
Format: PDF
In this paper, two approaches are used for the implementation of AES-128 key expansion. In one approach, look-up table is used for the sub word transformation while the combinational logic based on Galois field arithmetic is used in another. Both implementations have data path of 32 bits. Implementation with look-up table attains throughput of 8Gbps while occupying 793 slices and implementation with combinational logic for sub word attains throughput of 5.8Gbps with only 402 occupied slices.

Find By Topic