Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
9
, No
.
2
,
Febr
ua
ry
201
8
,
pp.
361
~
364
IS
S
N:
25
02
-
4752
, DO
I: 10
.11
591/
ijeecs
.
v9.i
2
.
pp
361
-
364
361
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
Improve
ment
o
f Dat
a Secu
rity
Usi
ng Mi
xcolumn
Singh P
oja Ram
esh
1
,
S
anth
osh Ku
mar
Sin
gh
2
1
Resea
r
ch
Sc
ho
l
ar,
AM
E
T
Unive
rsit
y
,
Ch
enna
i
2
As
sistant
Profe
ss
or,
Ta
gor
e
Col
le
ge
of
Sc
ie
nc
e &
Com
m
erc
e, Mum
bai
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Oct
21
, 201
7
Re
vised
Dec
2
7
, 2
01
7
Accepte
d
Ja
n
1
2
, 2
01
8
Advanc
ed
Enc
r
y
pt
ion
Stand
ard
is
the
se
cur
i
t
y
base
d
a
lgori
th
m
used
to
prote
c
t
the
d
ata
from
the
att
ac
ker
s.
In
thi
s
pape
r,
Opt
imiz
ed
Inve
rse
MixColum
n
tra
nsform
at
ion
has
bee
n
designe
d
with
the
hel
p
of
Xtime
m
ult
ipl
icati
on
p
roc
ess.
Xtime
m
ult
ipl
icati
on
p
erf
orm
s
the
m
ult
iplication
func
ti
on
for
‘m
X
m
’
dat
a;
resul
ts
will
be
m
-
bit
dat
a
.
Further
the
complexit
y
of
Xtime
m
ult
iplication
pro
ce
s
s
has
bee
n
ide
nt
ifie
d
and
re
-
d
esigned
with
th
e
hel
p
of
eff
e
ct
i
ve
CS
E
techni
ques.
Deve
loped
Reduc
ed
Xti
m
e
base
d
opti
m
iz
ed
Inv
er
se
MixColum
n
tra
nsform
at
ion
p
rovide
be
tt
er
p
e
rform
anc
es
tha
n
tra
di
ti
ona
l X
ti
m
e
base
d
Inv
erse
MixColum
n
m
ult
ipl
i
cation.
Ke
yw
or
d
s
:
AES
Mi
xco
lum
n
Xti
m
e
Copyright
©
201
8
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Singh
Poja Ra
m
esh,
Re
search
Sc
hola
r,
AMET
Un
i
versi
ty
,
Chen
nai
.
1.
INTROD
U
CTION
Data
secu
rity
i
s
on
e
of
th
e
ke
y
featur
es
in
a
ny
com
m
un
ic
at
ion
syst
em
.
T
he
secu
rity
pro
vid
in
g
to
the
syst
e
m
is
do
ne
by
us
i
ng
s
om
e
so
ftwa
re.
I
t
w
as
de
velo
pe
d
by
us
in
g
al
gorithm
[1
]
.
I
n
pre
vious
da
ys
Data
Encr
y
ption
Stand
a
r
d
(
DES)
is
the
al
gorith
m
to
pr
ovide
s
ecur
it
y.
DE
S
a
lgorit
hm
pr
ov
i
de
s
sec
ur
it
y
but
it
has
so
m
e
dr
aw
bac
k
to
giv
e
f
ull
secur
it
y
to
the
s
yst
e
m
.
DES
pr
ocess
only
64
-
bit
at
a
tim
e.
It
can
no
t
proces
s
la
rg
e
nu
m
ber
of
within
a
si
ng
le
ti
m
e
[2]
.
To
ov
erco
m
e
the
drawb
ac
k
by
int
rod
uce
a
ne
w
al
gorithm
na
m
ed
as
Adva
nced
Enc
ryptio
n
sta
nd
a
rd
(AES)
.
It
overc
om
es
the
dr
a
w
back
of
DES
al
gorith
m
.
Be
cause
it
has
la
r
ge
nu
m
ber
of
ste
ps
to
pro
vid
e
the
secu
rity
to
the
syst
e
m
[Mang
a
rd,
S.
e
t
al
.,
2005]
.
F
inall
y,
try
to
r
e
m
ov
e
correla
ti
on
b
et
ween
the sec
re
t keys and
the p
owe
r
consum
ption
[3
]
. The m
ul
t
ipli
cat
ive
m
asking
is real
iz
ed
by
us
in
g
ei
ther
st
and
a
r
d
CM
OS
cel
l
(w
hich
ha
s
to
be
ve
rifie
d
as
glit
ch
f
ree
and
DPA
resi
sta
nt
bu
t
it
requires
a
par
ti
al
aut
om
atic
desig
n
l
ow)
or
t
he
gate
le
ve
l
(which
has
to
be
pro
ved
as
insecu
re
in
te
r
m
s
of
glit
ch
at
t
acks).
Divisive
Hiera
rch
ic
al
Bi
sect
ing
Mi
n
–
Ma
x
Cl
us
te
rin
g
Algorithm
is
descr
ibe
d
in
[
4].
Boo
le
a
n
m
asking
is
reali
zed
t
o
be
at
the
al
gorith
m
ic
le
vel
an
d
is
i
m
m
un
e
to
DPA
a
nd
glit
ch
at
ta
cks
.
B
oole
an
m
asking
had
a
n
adv
a
ntage
,
it
is
easy
to
i
m
ple
m
ent.
It
does
not
req
uire
a
ny
extra
s
pecific
ha
rdwar
e
.
Bo
ole
an
Ma
sk
i
ng
is
a
fine
cand
i
date to
apply
A
E
S in
Sto
rag
e
Area
Networks [
G
olic, J
.D
.et al
,
20
07
]
.
2.
PROP
OSE
D MET
HO
DOL
OGY
Com
par
ed
to
Mi
x
-
Col
um
n
trans
f
or
m
at
ion
,
Inv
Mi
x
-
C
olum
n
transfor
m
a
ti
on
has
m
ultip
li
cat
ion
of
long
wor
d
le
ng
th. Desi
gn
of
m
od
ifie
d
m
ix
-
colum
n
is re
presented
in fig
ure
belo
w.
The
ci
rc
uit
diagr
am
fo
r
m
od
ifie
d
Mi
x
-
C
olum
n
is
sh
own
in
F
ig
ur
e
1(a),
F
ig
ure
1
(
b)
,
F
ig
ure
1(c)
a
nd
F
ig
ure
1(
d)
res
pecti
vely
,
in
th
e
propose
d
diagr
am
us
es
le
ss
nu
m
ber
of
gates
to
pe
rf
or
m
t
he
ope
rati
on
s
.
Th
e
AES
is
a
sym
m
et
ric
key
cryptogra
ph
y,
i
n
wh
ic
h
bot
h
the
se
nd
e
r
a
nd
the
receive
r
us
e
a
sin
gle
ke
y
for
encr
y
ption
a
nd
decr
ypti
on.
A
ES
process
t
he
data
with
the
bit
le
ng
th
up
t
o
128,
19
2,
25
6
bits
pe
r
proc
ess.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vol
.
9
,
No.
2
,
Fe
br
uary
201
8
:
36
1
–
36
4
362
Each
bit
le
ng
t
h
has
di
ff
e
r
ent
ro
un
ds
to
pro
cess.
128
-
bit
da
ta
le
ng
th
us
es
10
r
ounds
to
com
plete
the
pr
oces
s
.
192
-
bit data
use
s 12
r
ounds to
p
r
ocess
t
he
co
m
ple
te
acti
on
. L
ikewise
256
-
bits uses 1
4
r
ounds t
o
com
plete
the
entire
proces
s.
AES
c
on
ta
in
f
our
ste
ps
t
o
process
the
desig
n,
.
S
-
box,
S
hif
t
ro
w
,
m
ix
-
colum
n,
Add
r
ound
key
,
these are t
he
ste
ps
to pr
ocess t
he
com
plete
secur
it
y al
gorith
m
. I
t pr
oc
ess t
he
bit by
us
in
g 4x4 m
at
rix
, each
cell
con
ta
in
8
-
bit
to
proces
s
the
data.
Like
wise
each
cel
l
12
8
-
bit
into
16
gro
up
s
a
nd
proces
s
each
gro
up
i
n
each
cel
l.
In
f
uture
t
he
process
ca
n
be
im
pr
oved
by
us
in
g
2x2
m
at
rix,
i
n
eac
h
c
el
l
process
24
-
bit
data
t
o
redu
ce
th
e
com
pu
ta
ti
on
al
tim
e d
ur
in
g
t
he
tim
e o
f op
e
rati
on.
Fig
ure
1
.
Dia
gra
m
s f
or
Op
ti
m
i
zed
Xti
m
e Mult
ipli
cat
ion
3.
SIMULATI
O
N RESULTS
AND DIS
C
USSION
The
m
od
ifie
d
Mi
x
-
Col
um
n
was
de
sig
ned
Ver
il
og
H
DL
.
The
sim
ulati
on
resu
lt
s
are
validat
ed
usi
ng
Mod
el
-
sim
6.
3C
,
and
synt
he
sis
resu
lt
s
are
evaluated
by
us
in
g
Xili
nx
10.
1i
desig
n
to
ol.
In
m
od
ifie
d
Mi
x
-
Colum
n
desig
n
is
re
duced
t
he
gate
co
un
ts
with
the
Xtim
e
m
ult
ip
li
cat
io
n.
F
urt
he
r,
m
od
ifie
d
Mi
x
-
C
ol
um
n
Transf
or
m
at
ion
is
a
te
ch
niqu
e
us
e
d
t
o
im
pr
ov
e
the
pe
rform
ance
of
the
a
lgorit
hm
.Th
e
s
i
m
ulati
on
res
ul
ts
for
<<3
T
9
Equ
b
[
7
:
0
]
b
[
7
:
5
]
x
[
7
:
0
]
8
bit
8
bit
8 bit
b
[7
:
0
]
8
bit
8
bit
8
bit
<<2
T
b
E
q
u
b
[
7
:
5
]
x
[
7
:
0
]
<<1
b[7:0]
8
bit
8 bit
8 bit
<<
1
T
d
Equ
b[7:5]
x[7:0]
<<
2
b
[
7
:
0
]
8
bit
8
bit
8
b
i
t
<<1
T
e
E
q
u
b
[7
:
5
]
<<
1
<<1
x
[
7
:
0
]
(a)
(b
)
(
c
)
(
d
)
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Impr
ovem
e
nt
of
D
at
a Secu
rit
y U
sin
g Mi
xcol
umn
(
Si
ngh Po
ja R
am
es
h)
363
AES
e
nc
ryptio
n
by
us
i
ng
O
pt
i
m
iz
ed
Mi
xCo
lum
n
desig
n
is
il
lustrat
ed
i
n
F
ig
ure
2
a
nd
t
he
sim
ulati
on
resu
lt
s
for AE
S
dec
ryption by
us
i
ng
Op
ti
m
iz
ed
Mi
xC
olu
m
n
desig
n i
s il
lustrate
d
i
n
F
ig
ure
3.
Fig
ure
2. Sim
ulati
on
Result
f
or A
E
S E
ncr
y
pt
ion
by usi
ng
Op
ti
m
iz
ed
Mi
x
-
Colum
n
Fig
ure
3. Sim
ulati
on
Result
f
or A
E
S
Decr
y
ption by
us
i
ng
Op
ti
m
iz
ed
Mi
x
-
Colum
n
Table
1
.
C
om
par
io
n of
Existi
ng and
Pro
po
s
ed AES
Mi
xcol
um
n
Ty
p
e
Slices
LUT
Delay(n
s)
Po
wer(
m
w)
Exis
tin
g
AE
S
1
0
7
4
6
2
0
7
6
0
7
.55
0
7
.76
5
Prop
o
sed
AE
S
1
0
5
4
1
2
0
0
6
4
7
.53
1
6
.72
2
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vol
.
9
,
No.
2
,
Fe
br
uary
201
8
:
36
1
–
36
4
364
Fig
ure
4. Per
f
orm
ance A
naly
s
is of E
xisti
ng
a
nd Pro
posed
AES
4.
CONCL
US
I
O
N
In
this
pa
per
,
the
pro
posed
t
echn
i
qu
e
was
desig
ne
d
us
i
ng
thr
ough
Very
Larg
e
Scal
e
In
te
grat
io
n
(V
L
SI)
Syst
em
design
.
T
he
arr
an
gem
ent
of
Xtim
e
m
ulti
plica
ti
on
is
m
od
ifie
d
without
any
cha
ng
e
s
in
op
e
rati
on
f
or
r
edu
ci
ng
t
he
lo
gic
gate
co
un
t
s.In
the
pro
pos
ed
te
ch
nique
r
e
du
ce
d
the
gate
counts
in
the
m
ix
-
colum
n
proces
s.
Propose
d
A
ES
encr
y
ptio
n
pro
vid
es
1.9
%
reducti
on
in
s
li
ces
cou
nts
a
nd
3.3%
reducti
on
i
n
LUTs
co
unts.S
i
m
i
la
rly
delay
i
s
reduced
w
he
n
com
par
ed
to
the
existi
ng
AES
ency
ptio
n.
Wh
e
n
com
par
ed
to
existi
ng
AES
encr
y
pt
ion
a
nd
Decr
ypti
on
usi
ng
Xtim
e
m
ul
ti
plica
ti
on
bas
ed
m
ix
-
Colum
n,
the
pro
po
se
d
AE
S
decr
y
ption bas
ed Op
ti
m
iz
ed
m
ix
-
Colum
n
gi
ves
a
b
et
te
r pe
r
form
ance.
REFERE
NCE
S
[1]
A.
Agarwal
,
“
V
LSI
Im
ple
m
ent
at
ion
of
Advanc
e
d
Enc
r
y
p
ti
on
Standa
rd
using
Rij
ndael
Algorit
h
m
,
”
Inte
rnation
al
Journal
of
Appli
cat
ion
or Innov
a
ti
on
in
Eng
ineeri
ng
and
Manag
e
ment
(
IJA
IEM
)
,
v
ol
/i
ss
ue:
2
(
4
)
,
2
013.
[2]
N.
Ahm
ad,
et
al.
,
“
Design
of
AE
S
S
-
Box
u
sing
combinat
ional
logi
c
opti
m
izati
on
,
”
IEE
E
Symposi
um
on
Industrial
El
e
ct
ronics
&
A
ppli
cations (
ISIE
A)
,
pp.
696
-
699,
2010.
[3]
M.
G.
Alam,
et
al.
,
“
Eff
e
ct
of
gl
it
ch
es
aga
inst
Masked
AES
S
-
bo
x
implementa
ti
o
n
and
count
erme
asure
,
”
I
ET
Inf.
Sec
urit
y
,
v
ol
/
issue:
3
(
1
)
,
pp
.
34
–
44,
2009
.
[4]
T.
Johns
on
and
S.
K.
Singh,
“
Divisive
Hi
era
rch
i
ca
l
Bisecting
Mi
n
–
Max
Cluste
rin
g
Al
gorit
hm
,”
i
n
Proceedi
ngs
o
f
the
In
te
rnationa
l
Confe
ren
ce on D
ata
Engi
n
ee
rin
g
and
Comm
uni
cat
ion
Technol
o
gy
,
pp
.
579
-
592
,
2017
.
0
5000
1000
0
1500
0
2000
0
2500
0
LUT
s
Slices
De
l
ay
(m
s)
Pow
er
Exis
ting
AES
Pr
oposed
AES
Evaluation Warning : The document was created with Spire.PDF for Python.