Next Article in Journal
Immunological Aspects of EBV and Oral Mucosa Interactions in Oral Lichen Planus
Previous Article in Journal
Methods to Reproduce In-Plane Deformability of Orthotropic Floors in the Finite Element Models of Buildings
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Maintaining Secure Level on Symmetric Encryption under Quantum Attack

1
Department of Computer Science and Information Engineering, National Taipei University, New Taipei City 237, Taiwan
2
Department of Computer Science, Tunghai University, Taichung City 407, Taiwan
3
Research Center for Smart Sustainable Circular Economy, Tunghai University, Taichung City 407, Taiwan
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(11), 6734; https://doi.org/10.3390/app13116734
Submission received: 25 April 2023 / Revised: 23 May 2023 / Accepted: 24 May 2023 / Published: 31 May 2023

Abstract

:
Quantum computing is currently being researched in many countries, and if implemented in the near future, it may pose a threat to existing encryption standards. In the quantum computer environment, asymmetric encryption can be solved by Shor’s Algorithm in polynomial time, and the difficulty of breaking symmetric encryption using brute force is reduced from N times to square root N times by Grover’s Algorithm. We take the Advanced Encryption Standard as the theme and increase the key length from the original standard 192 bits and 256 bits to 384 bits and 512 bits, respectively, in order to maintain the security level of AES 192/256 under the environment of quantum computing, so we propose the key schedule of AES 384/512, and write the software in C++ on FPGA. The experimental results show that our scheme can achieve Level III and Level V security levels in a quantum computer attack environment. In addition to increasing the length of the key, we use the LUT method in the process of writing SubBytes to replace the array and speed up the computation to optimize the execution speed. In addition, the proposed scheme is still based on 128-bit computing blocks, rather than computing blocks in larger blocks.

1. Introduction

Recent years have seen the continued progress of data communication and application. Therefore, security systems [1] and equipment to protect personal information [2,3] and its transmission channels are indispensable. One of the most important technologies is data encryption, which is mainly used to protect information.
Symmetric and asymmetric cryptosystems are the most widely used in data encryption and symmetric encryption techniques such as the Data Encryption Standard (DES), Triple DES, and the Advanced Encryption Standard (AES) [4]. The sender and receiver use the same key to achieve data encryption and decryption. Among them, the AES published by the National Institute of Standards and Technology (NIST) in 2001 is the most outstanding among symmetric encryption technologies. AES uses SubBytes, ShiftRows, MixColumns, and AddRoundKey, which are the four main transformation equations, to form the main structure.
However, with the development of science and technology, at the same time, the technology of quantum computing is also constantly improving. The asymmetric encryption algorithm can be solved by Shor’s algorithm [5] in polynomial time in a quantum computer environment, and its security is equivalent to direct disintegration. The difficulty of the brute force cracking of the symmetric encryption algorithm will be diminished by Grover’s Algorithm [6] from N times to square root N times, and its security will also be reduced a lot. Although both algorithms will be affected by quantum computers, the AES, which is a member of symmetric encryption, will be less affected. Only the security level of the original key length will be cut in half; that is, the highest security level of AES 256 will become as low as AES 128.
In order to ensure that the AES [7] maintains the original security level in the quantum computer environment, we decided to expand according to Rijndael’s theory and try to increase the encryption key to maintain the original security strength. We use Field Programmable Gate Array (FPGA) to achieve verification, and the overall algorithm acceleration and optimization to achieve the effect of hardware accelerated computing.
We propose the AES algorithm for countering quantum computing to improve the security of the algorithm. The following are the main contributions of this paper:
  • To follow the framework of the original AES algorithm, and extend the key length to 384 bits and 512 bits in order to resist the threat introduced by quantum computers, and do an avalanche test on C++ software to prove the security of the AES 384 bits and 512 bits key.
  • Improve the speed of AES encryption and decryption, write the AES algorithm into FPGA by using hardware description language, make use of its instruction parallelization characteristics, make parallel calculations, accelerate the encryption and decryption calculation, and achieve a hardware acceleration effect.
  • Use different calculation structures and increase the amount of calculation per unit of time by adding registers, and use the space-for-time method for optimization.
In Section 2, a literature review on the state of quantum computing, AES, etc. will be undertaken. In Section 3, the basic architecture and calculation method proposed in this paper will be described. In Section 4, it is described how to implement the proposed method on FPGA, which involves implementation performance comparison and simulation implementation screen. Finally, the conclusion of this work is stated in Section 5.

2. Literature Review

2.1. Quantum Computer

Quantum computing is a method that uses a quantum as the basic computing [8] unit and operates with quantum algorithms. As long as a quantum reaches the quantum superposition state and the quantum entanglement state at the same time, it becomes a qubit, providing a calculation. The reading and writing of qubits can be done using laser or microwave techniques. The current mainstream quantum computing methods are divided into five types: silicon-based spin qubits, ion traps, diamond nitrogen vacancy centers, topological qubits, and superconducting rings. In 2021, IBM released Eagle with 127 bits, and it is expected for this to increase to 433 bits in 2022.
The difference between a quantum computer and a conventional computer is that quantum computers exploit the properties of quantum entanglement and superposition. Because of this unique property, computers made of qubits can process large amounts of data in parallel.
However, the computing power of current quantum computers is not sufficiently strong [9,10], therefore there are still has many problems to overcome.

2.2. Advanced Encryption Standard

This algorithm is a NIST-approved symmetric encryption block encryption method, also known as the Rijndael algorithm. In 1997, NIST announced that it would choose a better algorithm to replace the DES algorithm that was widely used at that time. The biggest disadvantage of DES is that the key is only 56 bits, which is relatively small, and it is more and more vulnerable to attack. In 2001, the Rijndael algorithm was selected as the AES [4], because the Rijndael encryption method can support a wider range of block and key lengths.
AES is encrypted and decrypted in units of blocks, each block is fixed at 128 bits, and the key has three lengths of 128 bits, 192 bits, and 256 bits to choose from. According to the key length, the encryption rounds are also divided into 10, 12, and 14 rounds. The AES encryption workflow of each round includes the following four steps: AddRoundKey, SubBytes, ShiftRows, and MixColumns.
AddRoundKey: Each byte in the matrix is XORed with the round key, and each sub-key is generated by the key generation scheme.
SubBytes: Each byte is replaced with the corresponding byte using a lookup table through a non-linear replacement function.
ShiftRows: A circular shift is applied to each row in the matrix.
MixColumns: In order to fully mix the operations of each column in the matrix, this step uses a linear transformation to mix the four bytes within each row. The MixColumns step in the last encryption loop is omitted and replaced with another AddRoundKey.
After 10 to 14 rounds of repeated calculations, the complexity of the brute force cracking method can reach up to 2 256 times, which ensures the security strength of the AES on traditional computers.

2.3. Finite Field

Also called the Galois field, it is based on the Galois finite field theorem [11]; if it a positive prime number and a positive integer, then there is a finite field containing elements, and the structure of the finite fields with elements is absolutely isomorphic.
Finite fields are widely used in modern coding, theoretical computer science, combinatorics, and cryptography. The AES algorithm proposed in this paper uses the Galois field for calculation, and the finite field calculation is divided into two types.
The first type is finite field addition, where adding a finite field is a simplification of a polynomial modulo, and its eigenvalues ensure that the result of the computation stays in the finite field. AES uses the Galois field, and its eigenvalue is 2, so the addition needs to be modulo 2, which can be simplified to the XOR equivalent to the logical operation. The second type is finite field multiplication, and like finite field addition, when the result of multiplying two polynomials may be larger than nth power, the value will exceed the range of finite field, so the finite field multiplication also needs to go through the modulo operations. The modulus used by finite field multiplication must be an integrable polynomial, while the AES algorithm uses AND, which is equivalent to the logical operation.

2.4. Avalanche Effect

This term was first used by Horst Feistel [12], and the origin of the concept can be traced back to the dissemination by Claude Shannon. The term diffusion refers to the redundancy of plain text in cryptography to spread the effects of a single key to as many ciphertexts as possible and avoid the possibility of deciphering the input from the output using brute force methods.
The avalanche effect is designed to do the same, and is considered an important metric in cryptographic security to ensure that text or keys cannot be corrupted by statistical analysis.
The Strict Avalanche Criterion [13] was proposed by Webster and Tavares as a formalization of the avalanche effect. If the encryption method meets the strict avalanche criteria, when any input bit is inverted, there is a 50% chance that each bit of the output will change.

2.5. Parallel Computing

Parallel computing refers to the use of multiple computing resources to improve the efficiency of data processing, and parallel computing can be broadly divided into spatial and temporal parallelism. Time parallelism refers to pipelining, which is splitting instructions into multiple steps so that they can be processed in parallel to speed up instruction execution; spatial parallelism involves the use of multiple computing resources at the same time to improve computation speed. In this case, we programmed the AES C++ code into a hardware description language [14] in a pipelined manner so that it can be executed on FPGAs to achieve hardware acceleration.

2.6. Field Programmable Gate Array (FPGA)

A Field Programmable Gate Array (FPGA) [14] is a logic circuit written in a hardware description language and is an actual parallel architecture. Generally speaking, FPGA is slower than ASIC and is not suitable for designing very complex circuit structures. At the same time, the power consumed by FPGA is larger than that of ASIC. However, the biggest advantage of FPGAs is that they can be manufactured quickly, and the internal logic can be modified repeatedly, making debugging costs lower. In addition, FPGAs can perform a task at exactly the same speed over and over again, making them suitable for developing low-latency specialized chips.

2.7. Abidalrahman Moh’d Proposed AES-512 Bits Method

Abidalrahman Moh’d et al. [15] proposed the AES enhanced algorithm for quantum computing, and the length of the original encrypted key was increased from 256 bits to 512 bits. In order to be able to decrypt it, the original length of 128 bits was changed to 512 bits on the FPGA, but there are several disadvantages involved with this method.
First, unlike the original AES architecture, the security cannot be compared. Second, since each block expands in length, the overall space complexity is greatly increased. Third, since the block length is at least 512 bits, security from Level-1 to Level-3 cannot be achieved.

3. System Architecture

3.1. AES Algorithm Parameters

The AES algorithm has the following three parameters:
  • The number of encrypted blocks (Nb): The input plaintext, in 32 bits, is 1 word, because the AES plaintext block is fixed at 128 bits, which is the state matrix composed of four words.
  • Number of key segments (Nk): The length of the key is 32 bits for one word, and is divided into four words, six words, and eight words according to the key length of 128 bits, 192 bits, and 256 bits.
  • Number of encryption rounds (Nr): This is the number of iterations required for encryption and decryption, which is related to the key length. The number of rounds from short to long key length is 10, 12 and 14 rounds, respectively. The relationship between the number of encryption rounds and the number of key segments can be calculated as follows:
    N r = 6 + N k
The above parameters, according to the different key lengths, can be organized as shown in Table 1:

3.2. AES-384, AES-512 Concept and Software Implementation

In order to maintain the security level of AES in a quantum computer environment, it is necessary to extend the length of the original key, and this paper proposes two versions of AES-384 and AES-512 with an extended key. The proposed new schedule must conform to the security framework of the Rijndael algorithm, so we extend it based on the original framework [16]. The differences between the two new key schedules and the original architecture are only the number of cryptographic rounds and the key expansion steps, except for the key length.
Both AES-384 and AES-512 execute only AddRoundKey in the first round, and execute SubBytes, ShiftRows, MixColumns and AddroundKey in the second round to the N r 1 round In the final round, it executes SubBytes, ShiftRows and AddRoundKey. We then calculate the number of needed rounds by the formula: N r = 6 + b i t s   o f   k e y / 32 . The results are shown in Table 2.
Turning now to the key expansion, the first step is calculating the needed words by using the formula i = N b ( N r + 1 ) . Note whether the number of subkeys is correct. The results of the calculations are presented in Table 3 sketch pictures of key expansions according to calculations. The figures make it easy to understand the work. Figure 1 and Figure 2 illustrate the process of key expansion for AES-384 and AES-512.
From Table 4 and Table 5, we know that AES-384/512 is extended by the original architecture, so the original encryption standard will not be changed, thus affecting security. The benefit of designing AES-384 and AES-512 by extending from the original standard is that the use of this method can reduce the risk posed to AES-192 and AES-256.

4. Programming and Testing

4.1. Experimental Environment

The development kit used was a Xilinx Vivado 2020.2 for coding and simulation, while the hardware system was a Zynq 7000 series: SoC XC7Z7100 FPGA development board. Table 6 summarizes the number of hardware objects used to implement AES-384/512.
According to the original theory, in AES-384, the number of Slices should be approximately 4900 and 6500; the number of Slices FF should be about 2900 and 3800; the number of four-input LUTs should be about 9100 and 12,100; the number of bonded IOBs should be about 500 and 660, but because of the implementation, we will not need the unit or reuse the unit, so it will be less than that indicated by the theory.

4.2. Software Testing

This section shows the results of the software implementation using AES-128 [17]. This test uses the standard S-box, Inverse S-box, Mixcolumns and InvMixColumns from NIST AES, and the explicit text is “Learn to walk before you run”. The following chart includes the complete contents of the S-box and Mixcolums, as well as the initial key and the result of each round key expansion.
Table 7 [7] is the 10-round expanded key generated by the secret key, and Table 8 [4] is the S-box of the AES software test.

4.3. Software Avalanche Test

In order to ensure the security of AES-384 and AES-512, two scheduled avalanche tests will be conducted in this section. First, the former will be shown and explained, and the latter will only include the execution process [18].
The avalanche test of AES-384 uses two strings with a difference of only one character. Table 9 presents the input and output of two plaintexts.
Finally, Table 10 shows the results of two kinds of plaintext encryption, including hexadecimal and binary demonstrations. This test has a total of 128 bits, and the two strings of very similar plaintexts have changed by 64 bits, which is exactly 50%, which meets the conditions of the avalanche test.
Next is the AES-512 avalanche test process and results, and the test data used in AES-512. Table 11 shows the input information of two different plaintext encryptions. Table 12 shows the two kinds of plaintext output results. According to the actual measurement of the encryption results, the two gaps between the latter accounted for 53.9% of the total number of bits which also passed the avalanche test.

4.4. Hardware Description Language Simulation

This section will show the AES-384 and AES-512 hardware description language [19,20,21,22] simulation process, mainly AES-384/512 for explanation, only with AES-384/512 attached to each process of the demonstration diagram [23,24,25], and not attached versions of AES-128, AES-192, or AES-384. The test content is “Learn to walk before you run”.
Figure 3 shows the complete information and results of the AES-384 encryption and decryption, including the parameters used in AES, standard S-box [26,27,28,29], inverse S-box, Mixcolumns and InvMixColumns, as well as the input plaintext, encrypted ciphertext, key expansion, and ETC.
Figure 4 shows the results of each round of AES-384 key expansion, and it can be seen that the value of each round key and the simulated time delay are step by step. Each round needs to wait for the execution result provided by the previous round, and it proceeds to the next round immediately after some results are outputted.
Figure 5 shows a series of AES-512 encryption and decryption simulations and results. The most obvious difference between AES-512 and AES-384 is that AES-512 performs more rounds, and Figure 6 shows the results of each round of the AES-512 key expansion.
Although this section does not attach the simulation process of AES-128, AES-192 and AES-256, Figure 7 illustrates the execution results of all versions from AES-128 to AES-512, which proves that we have integrated the five keys of the hardware description of AES (the language of the length version).

4.5. Compatibility of Rijndael

Table 13 compares the proposed AES-384 and AES-512 with the original AES function of the paper [15].
The experimental results include three methods: the method proposed in this article, the method of Rijndael, and [15]. The proposed method and the Rijndael method can reach FIPS security levels I, III, and V under normal computer attacks, while [15] is a special architecture with a minimum key length of 512 bits, such that it cannot support any level other than level V. Under the FIPS security level of a quantum computer attack, the proposed method can still maintain level I, III, and V, while Rijndael can only maintain level I, and [15] can only maintain level V.
Finally, the authors’ scheme obtains the calculation function of AES-128/192/256/384/512 bits, Rijndael obtains the calculation function of AES-128/192/256 bits, and [15] only obtains the calculation function of AES-512 bits.

4.6. Parallel Computing Performance

Figure 8 demonstrates the time comparison of the general calculation of AES-384 and the parallel calculation of AES-384, while Figure 9 shows the time comparison of the general calculation of AES-512 and the parallel calculation of AES-512 under CTR mode.
From the above results, it can be seen that in the original normal calculation, when the file size is 1762 bits, the execution time of AES-384 is 18.74 ms, and the execution time of AES-512 is 23.14 ms. With the addition of parallel calculations, it can be accelerated to 0.008927 ms and 0.009378 ms; when the file size is 56384 bits, the execution time of AES-384 is 554.50 ms, and the execution time of AES-512 is 682.62 ms. After a parallel calculation, it can be completed within 0.008239 ms and 0.010082 ms. We know from the experimental results that we can speed up this process by parallelizing the overall computing speed.

5. Conclusions

In order to make AES resistant to the threat of the quantum computer environment, this project implemented the key scheduling extension. In addition to software implementation, we hope to speed up the calculation speed of encryption and decryption. Therefore, we also implemented the hardware description language of AES-384 and AES-512 so that they can run smoothly on FPGA and achieve the effect of hardware acceleration.
In addition to basic hardware acceleration, we have also been working hard to optimize the hardware description language. By increasing the memory and cutting smaller input segments, parallel computing can be more complete, and the amount of computation per unit time can be increased.
Given the final experimental results shown in Table 12, our proposed method successfully integrates the original AES-128, AES-192, and AES-256 architectures with the newly arranged AES-384 and AES-512 in both hardware and software. This integration allows for the utilization of the complete set of advanced encryption algorithms. The standard still maintains the Level III and Level V levels in the secure quantum computer attack environment, and there is no need to change the original encryption architecture of Rijndael, as [10] did, which successfully achieves the purpose of this research project.

Author Contributions

Conceptualization, H.-J.S.; Methodology, H.-J.S.; Software, Y.-R.T. and W.-C.L.; Validation, H.-J.S., C.-T.Y. and W.-C.L.; Formal analysis, C.-T.Y.; Investigation, C.-M.L.; Data curation, Y.-R.T.; Writing—original draft, H.-J.S. and Y.-R.T.; Writing—review & editing, C.-T.Y.; Supervision, C.-M.L.; Project administration, C.-M.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Institutional Review Board Statement

Not Available.

Informed Consent Statement

Not Available.

Data Availability Statement

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Amin, M.; Al-Obeidat, F.; Tubaishat, A.; Shah, B.; Anwar, S.; Tanveer, T.A. Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques. Comput. Electr. Eng. 2023, 108, 108702. [Google Scholar] [CrossRef]
  2. Tariq, N.; Asim, M.; Al-Obeidat, F.; Zubair Farooqi, M.; Baker, T.; Hammoudeh, M.; Ghafir, I. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors 2019, 14, 1788. [Google Scholar] [CrossRef] [PubMed]
  3. Al-Obeidat, F.; Hani, A.B.; Adedugbe, O.; Majdalawieh, M.; Benkhelifa, E. The Socio-economic Impacts of Social Media Privacy and Security Challenges. In Proceedings of the Frontiers in Cyber Security, Tianjin, China, 4 November 2020; pp. 553–563. [Google Scholar]
  4. Bhatia, V.; Ramkumar, K.R. An Efficient Quantum Computing technique for cracking RSA using Shor’s Algorithm. In Proceedings of the IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 30–31 October 2020. [Google Scholar]
  5. Grover, L.K. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, New York, NY, USA, 22–24 May 1996. [Google Scholar]
  6. Grassl, M.; Langenberg, B.; Roetteler, M.; Steinwandt, R. Applying Grover’s algorithm to AES: Quantum resource estimates. In Proceedings of the International Conference on Post-Quantum Cryptography, Fukuoka, Japan, 24–26 February 2016. [Google Scholar]
  7. NIST. Announcing the Advanced Encryption Standard (AES); Federal Information Processing Standards Publication: Gaithersburg, MD, USA, 2001; pp. 5–26. [Google Scholar]
  8. Jose, L.H.; Guido, P.; Christof, E.; Mario, P. Quantum Computing. IEEE Softw. 2021, 38, 7–15. [Google Scholar]
  9. Mattsson, J.P.; Smeets, B.; Thormarker, E. Quantum-Resistant Cryptography. arXiv 2021, arXiv:2112.00399. [Google Scholar]
  10. Al-Ghamdi, A.B.; Al-Sulami, A.; Aljahdali, A.O. On the security and confidentiality of quantum key distribution. Secur. Priv. 2020, 3, e111. [Google Scholar] [CrossRef]
  11. Balupala, H.K.; Rahul, K.; Yachareni, S. Galois Field Arithmetic Operations using Xilinx FPGAs in Cryptography. In Proceedings of the IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, Canada, 14 May 2021. [Google Scholar]
  12. Feistel, H. Cryptography and Computer Privacy. Sci. Am. 1973, 228, 15–23. [Google Scholar] [CrossRef]
  13. Webster, A.F.; Tavares, S.E. On the Design of S-Boxes. In Advances in Cryptology—CRYPTO ‘85 Proceedings; Springer: Berlin/Heidelberg, Germany, 1985; pp. 523–534. [Google Scholar]
  14. Khose, P.N.; Raut, V.G. Implementation of AES algorithm on FPGA for low area consumption. In Proceedings of the International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015. [Google Scholar]
  15. Moh’d, A.; Jararweh, Y.; Tawalbeh, L.A. AES 512: 512-bit Advanced Encryption Standard algorithm design and evaluation. In Proceedings of the International Conference on Information Assurance and Security (IAS), Melacca, Malaysia, 5–8 December 2011. [Google Scholar]
  16. D’souza, F.J.; Panchal, D. Advanced encryption standard (AES) security enhancement using hybrid approach. In Proceedings of the International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 5–6 May 2017. [Google Scholar]
  17. Hu, F.; Ni, F. Software Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition. In Proceedings of the 2022 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 7–8 December 2022. [Google Scholar]
  18. Sanap, S.D.; More, V. Performance Analysis of Encryption Techniques Based on Avalanche effect and Strict Avalanche Criterion. In Proceedings of the International Conference on Signal Processing and Communication, Coimbatore, India, 13–14 May 2021. [Google Scholar]
  19. Sunil, J.; Suhas, H.S.; Sumanth, B.K.; Santhameena, S. Implementation of AES Algorithm on FPGA and on software. In Proceedings of the IEEE International Conference for Innovation in Technology (INOCON), Bangluru, India, 6–8 November 2020. [Google Scholar]
  20. Singh, K.; Dod, S. An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm. Comput. Sci. 2016. [Google Scholar] [CrossRef]
  21. Kumar, K.; Singh, V.; Mishra, G.; Babu, B.R.; Tripathi, N.; Kumar, P. Power-Efficient Secured Hardware Design of AES Algorithm on High Performance FPGA. In Proceedings of the 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India, 14–16 December 2022. [Google Scholar]
  22. Rahim, U.; Siddiqui, M.F.; Javed, M.A.; Nafi, N. Architectural Implementation of AES based 5G Security Protocol on FPGA. In Proceedings of the 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), Wellington, New Zealand, 30 November–2 December 2022. [Google Scholar]
  23. Shet, G.G.; Jamuna, V.; Shravani, S.; Nayana, H.G.; Kumar, P. Implementation of AES Algorithm Using Verilog. JNNCE J. Eng. Manag. 2020, 4, 1. [Google Scholar] [CrossRef]
  24. Soumya, V.H.; Neelagar, M.B.; Kumaraswamy, K.V. Designing of AES Algorithm using Verilog. In Proceedings of the International Conference for Convergence in Technology (I2CT), Mangalore, India, 27–28 October 2018. [Google Scholar]
  25. Srinivas, N.S.; Akramuddin, M.D. FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption. In Proceedings of the International Conference on Electrical Electronics and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016. [Google Scholar]
  26. Shah, S.S.; Raja, G. FPGA implementation of chaotic based AES image encryption algorithm. In Proceedings of the IEEE International Conference on Signal and Image Processing Applications (ICSIPA), Kuala Lumpur, Malaysia, 19–21 October 2015. [Google Scholar]
  27. Joshi, A.; Dakhole, P.K.; Thatere, A. Implementation of S-Box for Advanced Encryption Standard. In Proceedings of the IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, India, 20 March 2015. [Google Scholar]
  28. Nadjia, A.; Mohamed, A. Efficient implementation of AES S-box in LUT-6 FPGAs. In Proceedings of the International Conference on Electrical Engineering (ICEE), Boumerdes, Algeria, 13–15 December 2015. [Google Scholar]
  29. Pammu, A.A.; Chong, K.S.; Ne, K.Z.; Gwee, B.H. High Secured Low Power Multiplexer-LUT Based AES S-Box Implementation. In Proceedings of the International Conference on Information Systems Engineering (ICISE), Los Angeles, CA, USA, 20–22 April 2016. [Google Scholar]
Figure 1. AES 384 key expansion.
Figure 1. AES 384 key expansion.
Applsci 13 06734 g001
Figure 2. AES 512 key expansion.
Figure 2. AES 512 key expansion.
Applsci 13 06734 g002
Figure 3. AES-384 encrypted and decrypted simulation.
Figure 3. AES-384 encrypted and decrypted simulation.
Applsci 13 06734 g003
Figure 4. AES-384 key expansion simulation.
Figure 4. AES-384 key expansion simulation.
Applsci 13 06734 g004
Figure 5. AES-512 encrypted and decrypted simulation.
Figure 5. AES-512 encrypted and decrypted simulation.
Applsci 13 06734 g005
Figure 6. AES-512 key expansion simulation.
Figure 6. AES-512 key expansion simulation.
Applsci 13 06734 g006
Figure 7. AES All versions simulation result.
Figure 7. AES All versions simulation result.
Applsci 13 06734 g007
Figure 8. Execution time of normal AES-384 and parallel AES-384.
Figure 8. Execution time of normal AES-384 and parallel AES-384.
Applsci 13 06734 g008
Figure 9. Execution time of normal AES-512 and parallel AES-512.
Figure 9. Execution time of normal AES-512 and parallel AES-512.
Applsci 13 06734 g009
Table 1. Important AES parameters.
Table 1. Important AES parameters.
Key Length
(Bits)
Number of Encrypted Segments
(Nb)
Number of Key Segments
(Nk)
Number of Encrypted Rounds
(Nr)
1284410
1924612
2564814
Table 2. Number of rounds for AES 384/512.
Table 2. Number of rounds for AES 384/512.
VersionRound
38418
51222
Table 3. Number of keys and words for AES 384/512.
Table 3. Number of keys and words for AES 384/512.
VersionNrWords
3841876
5122292
Table 4. AES 384 key expansion rule.
Table 4. AES 384 key expansion rule.
Block NumberRule
i   m o d   12 = 0 W i = S u b ( R o t ( W i 1 ) )
i   m o d   12 0 W i = W i 1 + W i 12
i   m o d   12 0   &   i   m o d   8 0   &   i   m o d   4 = 0 W i = S u b W i 1 + W i 12
i   m o d   12 0   &   i   m o d   8 = 0 W i = S u b W i 1 + W i 12
Table 5. Key expansion of AES 512.
Table 5. Key expansion of AES 512.
Block NumberRule
i   m o d   16 = 0 W i = S u b R o t W i 1 + R c o m i 16 + W i 16
i   m o d   16 0 W i = W i 1 + W i 16
i   m o d   16 0   &   i   m o d   12 0   &   i   m o d   8 0   &   i   m o d   4 = 0 W i = S u b W i 1 + W i 16
i   m o d   16 0   &   i   m o d   12 0 & i   m o d   8 = 0 W i = S u b W i 1 + W i 16
i   m o d   16 0 & i   m o d   12 = 0 W i = S u b W i 1 + W i 16
Table 6. The number of hardware objects used to implement AES-384/512.
Table 6. The number of hardware objects used to implement AES-384/512.
Items of Hardware ObjectsAES-384 BitsAES-512 Bits
Number of Slices48796371
Number of Slices FF27913791
Number of four-input LUTs899711,211
Number of bonded IOBs471594
Table 7. S-box matrix.
Table 7. S-box matrix.
000102030405060708090a0b0c0d0e0f
00637c777bf26b6fc53001672bfed7ab76
10ca82c97dfa5947f0add4a2Af9ca472c0
20b7fd9326363ff7cc34a5e5f171d83115
3004c723c31896059a071280e2eb27b275
4009832c1a1b6e5aa0523bd6b329e32f84
5053d100ed20fcb15b6acbbe394a4c58cf
60d0efaafb434d338545f9027f503c9fa8
7051a3408f929d38f5bcb6da2110fff3d2
80cd0c13ec5f974417c4a77e3d645d1973
9060814fdc222a908846eeb814de5e0bdb
a0e0323a0a4906245cc2d3ac629195e479
b0e7c8376d8dd54ea96c56f4ea657aae08
c0ba78252e1ca6b4c6e8dd741f4bbd8b8a
d0703eb5664803f60e613557b986c11d9e
e0e1f8981169d98e949b1e87e9ce5528df
f08ca1890dbfe6426841992d0fb054bb16
Table 8. 10 round expanded key.
Table 8. 10 round expanded key.
Original Key2b7e151628aed2a6abf7158809cf4f3c
Round 1 keya0fafe1788542cb123a339392a6c7605
Round 2 keyf2c295f27a96b9435935807a7359f67f
Round 3 key3d80477d4716fe3e1e237e446d7a883b
Round 4 keyef44a541a8525b7fb671253bdb0badee
Round 5 keyd4d1c6f87c839d87caf2b8bc11f915bc
Round 6 key6d88a37a110b3efddbf98641ca0093fd
Round 7 key4e54f7Be5f5fc9f384a64fb24ea6dc4f
Round 8 keyead27321b58dbad2312bf5607f8d292f
Round 9 keyac7766f319fadc2128d12941575c096e
Round 10 keyd014f9a8c9ee2589e13f0cc8b6630ca6
Table 9. AES-384 input plaintext.
Table 9. AES-384 input plaintext.
Plaintext 1Plaintext 2
Text CharactersHelloworld123456Helloworld123450
ASCII48656c6c6f776f7248656c6c6f776f72
6c643132333435366c64313233343530
Original key
(384 bits)
2b7e151628ae d2a6abf71588
09cf4f3c7e15 1628aed2a6ab
f7158809cf4f 3c2b2b7e1516
28aed2a6abf7 158809cf4f3c
Table 10. AES-384 output plaintext.
Table 10. AES-384 output plaintext.
Plaintext 1Plaintext 2
Output ASCII8c099351a63e928ef2990496693136b1
d699ba2fae536fb6559813b14a77339b
Table 11. AES-512 input plaintext.
Table 11. AES-512 input plaintext.
Plaintext 1Plaintext 2
Text CharactersThatisagoodidea8Thatisagoodidea5
ASCII54686174697361675468617469736167
6f6f6469646561386f6f646964656135
Original key (384 bits)2b7e151628aed2a6abf71588
09cf4f3c7e151628aed2a6ab
f7158809cf4f3c2b2b7e1516
28aed2a6abf7158809cf4f3c
7e151628aed2a6abf7158809
2b7e151628aed2a6abf71588
09cf4f3c7e151628aed2a6ab
cf4f3c2b
Table 12. AES-512 output plaintext.
Table 12. AES-512 output plaintext.
Plaintext 1Plaintext 2
Output ASCII2fc4aed4f694248fc31a8313c301f1fb
a49364fbf1288002aa7f1c469f982320
Table 13. Compatibility comparison.
Table 13. Compatibility comparison.
ProposedRijndaelAbidalrahman Moh’d [15]
Security levelI, III, VI, III, VX
Security Level under quantum calculationI, III, VIV
AES-128OOX
AES-192OOX
AES-256OOX
AES-384OXX
AES-512OXO
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shiu, H.-J.; Yang, C.-T.; Tsai, Y.-R.; Lin, W.-C.; Lai, C.-M. Maintaining Secure Level on Symmetric Encryption under Quantum Attack. Appl. Sci. 2023, 13, 6734. https://doi.org/10.3390/app13116734

AMA Style

Shiu H-J, Yang C-T, Tsai Y-R, Lin W-C, Lai C-M. Maintaining Secure Level on Symmetric Encryption under Quantum Attack. Applied Sciences. 2023; 13(11):6734. https://doi.org/10.3390/app13116734

Chicago/Turabian Style

Shiu, Hung-Jr, Chao-Tung Yang, Yun-Ru Tsai, Wei-Chung Lin, and Chun-Ming Lai. 2023. "Maintaining Secure Level on Symmetric Encryption under Quantum Attack" Applied Sciences 13, no. 11: 6734. https://doi.org/10.3390/app13116734

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop