Ind
o
n
es
ian Jou
r
n
al
o
f
E
le
ctric
a
l E
n
g
in
ee
r
ing
and
C
o
mp
u
t
er
S
c
ienc
e
V
ol
. 8
,
No.
3,
Dec
em
be
r
20
17
, p
p
.
7
0
9
~
7
1
1
DO
I: 1
0.
11
5
91
/
i
j
ee
c
s
.v
8
.
i
3
.
pp
7
0
9
-
7
1
1
709
Rec
ei
v
ed
J
un
e
29
,
20
1
7
; R
ev
i
s
ed
A
ug
us
t 1
5
,
20
1
7
;
A
c
c
ep
ted
S
e
pte
mb
er
23
,
20
1
7
RTL
M
od
ell
ing
f
or th
e
Cip
her
Bl
o
c
k C
hain
i
ng
M
od
e
(CBC
) f
or Dat
a
Securi
t
y
M
ee
n
ak
shi
RK
*
,
A
A
r
iv
az
h
agan
A
M
ET
Un
i
v
e
rs
i
ty
,
Che
n
n
a
i
Th
e
d
e
m
a
n
d
o
f
s
a
t
e
l
l
i
te
c
o
m
m
u
n
i
c
a
t
i
o
n
,
th
e
s
e
c
u
ri
t
y
a
l
g
o
ri
th
m
s
a
re
to
b
e
d
e
s
i
g
n
e
d
i
n
th
e
b
o
a
rd
.
Th
e
i
n
fo
rm
a
t
i
o
n
fro
m
th
e
s
a
t
e
l
l
i
t
e
t
o
th
e
g
r
o
u
n
d
i
s
r
e
q
u
i
r
e
d
th
e
d
a
ta
s
e
c
u
ri
ty
wit
h
th
e
c
r
y
p
to
g
ra
p
h
i
c
a
l
g
o
r
i
th
m
s
.
Ad
v
a
n
c
e
d
e
n
c
r
y
p
t
i
o
n
s
ta
n
d
a
rd
(AES)
i
s
o
n
e
o
f
t
h
e
p
r
o
m
i
s
i
n
g
c
ry
p
to
g
ra
p
h
i
c
a
l
g
o
ri
th
m
s
fo
r
th
e
te
rre
s
tr
i
a
l
c
o
m
m
u
n
i
c
a
ti
o
n
.
In
t
h
i
s
p
a
p
e
r,
th
e
e
n
c
r
y
p
ti
o
n
a
n
d
d
e
c
ry
p
ti
o
n
i
s
m
a
i
n
l
y
fo
c
u
s
e
d
o
n
th
e
c
i
p
h
e
r
b
l
o
c
k
c
h
a
i
n
i
n
g
(CBC
)
m
o
d
e
fo
r
a
c
h
i
e
v
i
n
g
th
e
h
i
g
h
s
e
c
u
re
d
d
a
t
a
tr
a
n
s
m
i
s
s
i
o
n
.
Fo
r
e
ff
i
c
i
e
n
t
d
a
ta
tra
n
s
m
i
s
s
i
o
n
,
th
e
AES
a
l
g
o
ri
th
m
i
s
i
m
p
l
e
m
e
n
te
d
b
y
u
s
i
n
g
C
BC
m
o
d
e
.
Th
e
p
ro
p
o
s
e
d
work
i
s
d
e
s
i
g
n
e
d
b
y
u
s
i
n
g
RTL
m
o
d
e
l
i
n
g
a
n
d
a
l
s
o
t
h
e
m
i
n
i
m
u
m
n
u
m
b
e
r
s
o
f
l
o
g
i
c
a
l
e
l
e
m
e
n
ts
a
re
u
s
e
d
f
o
r
i
m
p
l
e
m
e
n
ta
ti
o
n
.
Key
w
ords
:
Ad
v
a
n
c
e
d
En
c
r
y
p
ti
o
n
Sta
n
d
a
rd
,
Cip
h
e
r
b
l
o
c
k
c
h
a
i
n
i
n
g
,
d
a
ta
s
e
c
u
r
i
ty
,
Reg
i
s
t
e
r
tra
n
s
fe
r
l
e
v
e
l
,
Dat
a
t
ra
n
s
m
i
s
s
i
o
n
Copy
righ
t
©
2
0
1
7
I
ns
titu
t
e
o
f
Adv
a
nc
e
d
Eng
i
ne
e
ring
a
nd
Sc
ie
nc
e
.
All
righ
t
s
re
s
e
rve
d.
1.
Rev
iew
O
f
ciph
er
Bloc
k
Ch
ainin
g
M
o
d
es
T
he
de
s
i
gn
i
s
c
ap
a
bl
e
of
m
ai
nt
ai
ni
n
g
thr
ou
g
hp
ut
du
r
i
n
g
k
e
y
c
h
an
g
es
gi
v
e
n
a
m
ax
i
m
u
m
of
on
e
c
ha
ng
e
e
v
er
y
1
20
c
y
c
l
es
.
A
no
th
er
de
s
i
g
n
ha
s
a
throug
hp
ut
of
28
.5
G
bp
s
an
d
s
up
po
r
ts
k
e
y
c
h
an
g
es
e
v
er
y
c
y
c
l
e.
T
he
f
l
oo
r
p
l
an
ni
n
g
an
d
a
pi
p
el
i
ne
d
k
e
y
ex
pa
n
de
r
wer
e
d
ev
el
o
pe
d
tog
et
he
r
wi
th
m
od
i
f
i
c
ati
on
s
to
th
e
m
i
x
c
ol
um
ns
an
d
c
o
m
po
s
i
te
f
i
el
d
i
m
pl
em
en
tat
i
o
n
of
S
u
b
B
y
t
es
op
erat
i
o
n.
A
E
S
s
ec
ure
c
ha
nn
e
l
of
an
y
f
ee
db
ac
k
m
od
e i
nc
l
ud
i
ng
c
i
ph
er bl
oc
k
c
ha
i
ni
n
g.
Chr
i
s
t
y
M
A
et
al
.,
[3
]
de
s
c
r
i
b
ed
the
s
ec
urit
y
da
t
a
tr
a
ns
m
i
s
s
i
o
n
al
go
r
i
thm
i
n
c
r
y
pt
og
r
ap
h
y
i
s
ad
v
an
c
e
d
en
c
r
y
pt
i
o
n
a
l
go
r
i
thm
.
T
he
pa
s
s
tr
an
s
i
s
tor
l
og
i
c
i
s
us
e
d
f
or
the
m
i
ni
m
al
po
wer
c
o
ns
um
pti
on
a
n
d
ac
hi
e
v
es
th
e
l
es
s
nu
m
be
r
of
tr
an
s
i
s
tor
c
ou
nts
.
Us
i
ng
a
s
i
m
pl
e
ex
c
l
us
i
v
e
O
R
ga
t
e
tha
t
i
s
X
O
R
ga
te
pa
s
s
tr
an
s
i
s
tor
l
og
i
c
i
s
us
ed
to
m
i
ni
m
i
z
e
t
he
p
o
w
e
r
.
T
he
po
wer
c
on
s
um
pti
on
of
m
i
x
c
ol
u
m
n
i
s
r
ed
uc
ed
i
n
A
E
S
.
X
O
R
ga
tes
are
c
on
s
tr
uc
ted
b
y
us
i
ng
s
i
x
pa
s
s
tr
an
s
i
s
tors
w
h
i
c
h
r
ed
uc
e
the
nu
m
be
r
of
l
arge
tr
an
s
i
s
tor
c
ou
nts
.
T
he
s
tr
ea
m
c
i
ph
er
al
g
orit
hm
ba
s
ed
on
m
od
i
f
i
ed
A
E
S
b
l
oc
k
c
i
ph
er
c
on
c
ep
t
t
o
ac
hi
e
v
e
hi
g
h
c
om
pl
ex
i
t
y
i
n
e
nc
r
y
pt
i
on
an
d
d
ec
r
y
pt
i
on
proc
es
s
es
.
T
he
s
tr
e
a
m
c
i
ph
er
us
es
thr
ee
f
un
c
ti
o
ns
,
two
of
the
m
are
m
o
di
f
i
ed
s
ub
b
y
t
e
an
d
on
e
i
s
m
od
i
f
i
ed
m
i
x
c
ol
u
m
n
tr
an
s
f
or
m
ati
on
of
A
E
S
al
g
orit
hm
w
i
th
a
n
a
dd
i
ti
o
n
to
the
p
erm
uta
ti
on
f
un
c
t
i
on
.
T
i
n
y
b
l
oc
k
s
of
s
i
z
es
(
2
*
2,
4*
4,
6*
6
…
)
h
av
e
be
en
i
m
pl
em
en
ted
i
n
t
h
e
a
l
go
r
i
thm
.
Ne
w
c
r
y
p
tog
r
ap
h
y
a
l
g
orit
hm
wi
th
f
or
ef
f
ec
ti
v
e
d
ata
c
om
m
un
i
c
ati
on
i
s
d
i
s
c
us
s
ed
i
n
[5]
.
G
en
er
ati
ng
a
d
i
g
i
ta
l
s
i
gn
at
ure
b
as
ed
on
n
e
w
c
r
y
pt
og
r
a
ph
i
c
s
c
h
em
e
f
or
us
er
au
the
nti
c
ati
o
n
an
d
s
ec
urit
y
.
T
he
n
e
w
m
e
s
s
ag
e
di
ge
s
t
al
g
orit
hm
i
s
to
prov
i
de
hi
gh
s
ec
urit
y
,
to
tr
a
ns
f
er
da
ta
b
y
c
om
bi
na
ti
on
of
di
gi
ta
l
s
i
g
na
t
ure
al
g
orit
hm
an
d
s
y
m
m
etri
c
k
e
y
c
r
y
pto
graph
y
a
l
go
r
i
th
m
i
s
de
s
c
r
i
be
d
i
n
[6]
.
P
r
e
v
en
ti
o
n
of
Co
-
op
erat
i
v
e
B
l
ac
k
Hol
e
at
ta
c
k
i
n
Ma
n
et
on
DS
R
pr
oto
c
ol
us
i
n
g
Cr
y
p
tog
r
ap
h
i
c
A
l
go
r
i
thm
i
s
pres
en
te
d i
n [
7
].
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N:
2
50
2
-
4
75
2
IJE
E
CS
V
ol
.
8
,
N
o.
1
,
D
e
c
e
m
b
e
r
2017
:
7
0
9
–
7
1
1
710
F
i
gu
r
e
1
.
C
i
ph
er B
l
oc
k
Cha
i
ni
n
g M
o
de
S
tr
uc
ture
2.
S
i
mu
latio
n
Re
sult
s
F
i
gu
r
e
2.
S
i
m
ul
ati
on
R
es
ul
t
f
or the
E
nc
r
y
pt
i
on
F
i
gu
r
e
3.
S
i
m
ul
ati
on
R
es
ul
t
f
or the
Dec
r
y
p
ti
on
Evaluation Warning : The document was created with Spire.PDF for Python.
IJE
E
CS
IS
S
N:
2
50
2
-
4
75
2
RT
L
M
o
de
l
l
i
ng
for th
e C
i
ph
er
B
l
oc
k
Cha
i
ni
ng
Mo
d
e (C
B
C)
fo
r
D
ata
S
ec
ur
i
ty
(
M
ee
na
k
s
hi
R
K
)
711
3
. S
ynt
h
es
is
Res
u
lt
s
A
n
al
ys
is
In
order
t
o
ac
h
i
e
v
e
th
e
h
i
gh
s
ec
ured
da
t
a
tr
an
s
m
i
s
s
i
on
,
the
C
i
ph
er
bl
oc
k
c
ha
i
ni
n
g
m
od
e
i
s
to
be
i
m
pl
em
en
ted
i
ns
tea
d
of
the
c
ou
nte
r
m
od
e.
B
y
us
i
ng
c
o
un
ter
m
od
e
i
s
i
nc
r
e
as
i
ng
t
he
LUT
c
ou
nts
an
d
t
he
p
o
w
er
ut
i
l
i
z
at
i
on
s
.
T
he
CB
C
m
od
e
i
s
i
m
pl
e
m
en
ted
i
n
the
e
nc
r
y
pti
on
a
nd
de
c
r
y
pt
i
o
n
to
ac
h
i
e
v
e
the
hi
gh
ef
f
i
c
i
en
c
y
l
e
v
e
l
i
n
t
erm
s
of
V
LS
I
de
s
i
gn
en
v
i
r
on
m
en
t.
T
he
s
y
nth
es
i
s
r
es
ul
ts
are c
arr
i
e
d o
ut
b
y
us
i
ng
t
he
X
i
l
i
nx
IS
E
de
s
i
gn
s
u
i
t
e.
F
i
gu
r
e
4
.
S
y
n
the
s
i
s
r
es
ul
ts
f
or the
Lo
ok
-
Up
-
T
ab
l
es
ut
i
l
i
z
at
i
on
s
4
.
Co
n
clus
ion
T
he
propos
e
d
C
i
ph
er
b
l
oc
k
c
ha
i
ni
ng
(
CB
C)
m
od
e
ba
s
ed
en
c
r
y
pt
i
on
an
d
d
ec
r
y
p
ti
on
i
s
i
m
prov
i
ng
the
area
ut
i
l
i
z
at
i
on
s
c
om
pa
r
e
tha
n
t
he
tr
ad
i
t
i
o
na
l
m
eth
od
.
T
he
pro
po
s
ed
wor
k
i
s
de
s
i
g
ne
d
b
y
us
i
ng
V
eri
l
og
HDL
l
a
ng
u
ag
e
.
T
he
s
i
m
ul
a
ti
on
i
s
ev
a
l
u
ate
d
b
y
s
u
i
ng
the
Mo
de
l
s
i
m
X
E
an
d
th
e
s
y
nt
he
s
i
s
r
es
u
l
t
s
are ge
n
erate
d b
y
us
i
ng
th
e X
i
l
i
nx
I
S
E
.
Ref
er
en
ce
s
[1]
Hig
h
Sp
e
e
d
L
o
w
Cos
t
I
m
p
l
e
m
e
n
t
a
ti
o
n
o
f
Ad
v
a
n
c
e
d
E
n
c
r
y
p
ti
o
n
St
a
n
d
a
r
d
o
n
FPGA
.
I
n
te
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
tro
n
i
c
s
&
T
e
l
e
c
o
m
m
u
n
i
c
a
t
i
o
n
a
n
d
I
n
s
tr
u
m
e
n
t
a
ti
o
n
En
g
i
n
e
e
r
i
n
g
(
IJ
ETI
E)
.
2
0
1
0
.
[2]
Sc
a
l
a
b
l
e
1
2
8
-
b
i
t
AES
-
CM
Cr
y
p
to
-
Core
Rec
o
n
fi
g
u
ra
b
l
e
Im
p
l
e
m
e
n
ta
ti
o
n
fo
r
Se
c
u
r
e
Com
m
u
n
i
c
a
ti
o
n
s
.
IEEE
c
o
n
f
e
re
n
c
e
o
n
2
0
1
0
.
[3]
Im
p
l
e
m
e
n
ta
t
i
o
n
a
n
d
Pe
rfo
r
m
a
n
c
e
An
a
l
y
s
i
s
o
fAES
-
1
2
8
C
BCal
g
o
ri
th
m
i
n
W
S
Ns
.
Hy
e
o
p
g
e
o
n
L
e
e
,
Ky
o
u
n
g
h
w
a
L
e
e
,
Y
o
n
g
t
a
e
Sh
i
n
Dep
a
rt
m
e
n
to
f
Co
m
p
u
ti
n
g
t,
S
o
o
n
g
s
i
l
U
n
i
v
e
rs
i
ty
,
Ko
re
a
.
[4]
Hig
h
-
Sp
e
e
d
VL
SI
Arc
h
i
te
c
tu
r
e
s
fo
r
th
e
AES
Al
g
o
ri
t
h
m
.
E
EE
Tra
n
s
a
c
ti
o
n
s
o
n
Ve
ry
L
a
rg
e
Sc
a
l
e
In
te
g
ra
ti
o
n
(VL
SI)
S
y
s
t
e
m
s
.
2
0
0
4
;
12
(
9
)
.
[5]
G
a
n
e
s
h
K
u
m
a
r
K,
Ari
v
a
z
h
a
g
a
n
D.
Ne
w
c
ry
p
to
g
ra
p
h
y
a
l
g
o
ri
th
m
w
i
th
f
o
r
e
ff
e
c
ti
v
e
d
a
ta
c
o
m
m
u
n
i
c
a
t
i
o
n
.
In
d
i
a
n
J
o
u
rn
a
l
o
f
Sc
i
e
n
c
e
a
n
d
Te
c
h
n
o
l
o
g
y
.
2
0
1
6
;
9
(
4
8
)
:
1
0
8
9
7
0
.
[6]
G
a
n
e
s
h
k
u
m
a
r
K
a
n
d
Ari
v
a
z
h
a
g
a
n
D.
G
e
n
e
ra
ti
n
g
a
d
i
g
i
t
a
l
s
i
g
n
a
tu
re
b
a
s
e
d
o
n
n
e
w
c
ry
p
to
g
ra
p
h
i
c
s
c
h
e
m
e
fo
r
u
s
e
r
a
u
th
e
n
ti
c
a
ti
o
n
a
n
d
s
e
c
u
ri
ty
.
I
n
d
i
a
n
J
o
u
rn
a
l
o
f
Sc
i
e
n
c
e
a
n
d
Te
c
h
n
o
l
o
g
y
.
2
0
1
4
;
7
(S
6
)
:
1
-
5.
[7]
Ve
n
n
i
l
a
G
,
Ari
v
a
z
h
a
g
a
n
D
&
M
a
n
i
c
k
a
s
a
n
k
a
ri
N.
Pre
v
e
n
ti
o
n
o
f
Co
-
o
p
e
ra
t
i
v
e
Bl
a
c
k
Hol
e
a
tt
a
c
k
i
n
M
a
n
e
t
o
n
DSR
p
ro
to
c
o
l
u
s
i
n
g
Cry
p
to
g
ra
p
h
i
c
Al
g
o
ri
th
m
.
I
n
te
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
En
g
i
n
e
e
ri
n
g
a
n
d
Te
c
h
n
o
l
o
g
y
(
IJ
ET).
2
0
1
4
;
6
(
5
)
:
2401.
Evaluation Warning : The document was created with Spire.PDF for Python.