Design and SystemC Implementation of Chaos-Based Enhancements for the Advanced Encryption Standard

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

SystemC is a standard language that is widely used for the modeling and the verification of complex systems. It is a promising candidate in Electronic System Level which allows models to reach higher simulation speed. The Advanced Encryption Standard (AES) is one of the most known block ciphers. It is widely used in diverse applications in order to secure the sensitive data. It is considered to be secure even with some issues lie in the used key and the S-BOX. In this paper, a chaos-based enhancement for the AES algorithm is proposed. The SystemC tools were used to study the efficiency of the proposed architecture. In fact, the suggested enhancements are based on the chaos theory properties. They cope with the defaulting parameters of the AES algorithm and ensure a high security level as well as a satisfactory speed.

Original languageEnglish
Title of host publication27th International Conference on Computer Theory and Applications, ICCTA 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages50-56
Number of pages7
ISBN (Electronic)9781538637937
DOIs
StatePublished - 28 Oct 2017
Externally publishedYes
Event27th International Conference on Computer Theory and Applications, ICCTA 2017 - Alexandria, Egypt
Duration: 28 Oct 201730 Oct 2017

Publication series

Name27th International Conference on Computer Theory and Applications, ICCTA 2017 - Proceedings

Conference

Conference27th International Conference on Computer Theory and Applications, ICCTA 2017
Country/TerritoryEgypt
CityAlexandria
Period28/10/1730/10/17

Keywords

  • Advanced Encryption Standard
  • Chaos Generator
  • Hardware performance
  • Logistic Map
  • Security analysis

Fingerprint

Dive into the research topics of 'Design and SystemC Implementation of Chaos-Based Enhancements for the Advanced Encryption Standard'. Together they form a unique fingerprint.

Cite this