Design of High Speed Advanced Encryption Standard using PPA and PPM
Gajula Lakshminarayana1, Anupama A. Deshpande2, Moparthy Gurunadha Babu3

1Gajula Lakshminarayana, PHD. Scholar, Shri Jagdishprasad Jhabarmal Tibrewala University, Jhunjhunu, Churela, Rajasthan-333001.
2Dr. Anupama A. Deshpande, Professor, Department of EEE, Shri Jagdishprasad Jhabarmal Tibrewala University, Jhunjhunu, Churela, Rajasthan-333001.
3Dr. Moparthy Gurunadha Babu, Professor & Dean, Department of ECE, CMR Institute of Technology, Hyderabad. Telangana, India.

Manuscript received on 30 June 2019 | Revised Manuscript received on 10 July 2019 | Manuscript published on 30 July 2019 | PP: 2679-2684 | Volume-8 Issue-9, July 2019 | Retrieval Number: I8989078919/19©BEIESP | DOI: 10.35940/ijitee.I8989.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Basically, internet security plays crucial role in past three decades. So in worldwide Advanced Encryption Standard (AES) algorithm is used. AES consists of symmetric block cipher blocks. In this paper we proposed the simplified AES algorithm (S-DES) using parallel prefix adder (PPA) and parallel prefix multiplier (PPM). This parallel prefix adder and parallel prefix multiplier will generate a product formed by multiplying the multiplicand. This algorithm possess specific structure to encrypt and decrypt delicate information and is connected in equipment and programming everywhere throughout the world. It is amazingly hard to programmers to get the genuine information while encoding the AES calculation. The fundamental goal of this algorithm is to build up a model that is executed for correspondence reason, and to test the created model regarding precision reason. The encryption procedure comprises the mix of different traditional methods, for example, substitution, improvement and change encoding strategies. At last the key extension module will comprise the quantity of iterative preparing rounds so as to expand its resistance against unapproved assaults.
Keywords: Cryptography, Simplified Advanced
Encryption Standard, Encryption.

Scope of the Article: Low-power design