if the processor is suitable for a large-scale production
and an integration with IoT devices.
Simulation and test results show that the proposed
AES encryption accelerator improves the security
and reliability of data transmission for IoT devices.
The advantages of this architecture are that it
provides high-level speed on both encryption and key
management and that it consumes low power with
small amount of resources. This makes the candidate
approach a viable solution for future IoT applications
which require tight strong security and resource
constraints.
2 LITERATURE SURVEY
Muir, Count, Accountant’] ='Research on WLAN
Application of SM2, SM3&SM4 Algorithm in
Transformer Substation Wang Tong; Cui Wen Peng;
Li Tong; Wang Liang; Li Hao; Chi Ying Ying 2019
3rd International Conference on Electronic
Information Technology and Computer Engineering
(EITCE) ‘In the wave of the growth of artificial
intelligence (AI), intelligent terminal devices appear,
such as power system edge-computing intelligent
terminal. The new terminal with local decision of the
present invention can locally process the collected
data, meanwhile, only key information report is used
for reporting, which can also reduce the requirement
of network bandwidth, can make the existing wireless
communication more business scenarios meet the
demand. For the traditional substation, it requires a
high bandwidth of the network to gather the amount
of terminal data in time. Hub data not transferable via
wireless. The smart transformer substation can
transmit the wireless with the intelligent terminal
data. However, the IEEE802. 11ah, Lora, NBIoT
and Wifi is dynamic. Simultaneously, data is included
in social security, the same song of civilization that
is social development and progress. In the
characteristic of “security and controllability” for
information system, the China Cryptographic
Administration published SM2, SM3 and SM4 and
other encryption and decryption algorithms. In this
paper, we propose a framework for working over the
IEEE802. 11 ah standards, Considering the LAN
application of transformer substation, the
combination of the TSS in the LAN of SM2, SM3 and
SM4 We highlighted the identity authentication, the
key distribution and data encryption and decryption.
System scheme constructions are provided for the
three phases and we present the analysis of the
respectively security and system overhead. The
research of SM2, SM3, SM4 algorithm in
Transformer Substation LAN will further enhance
and implement the intelligent terminal of Substation,
and the intelligent level of substation.
Masked 128-bit AES in 22nm CMOS: area and
energy efficiency. Yuan-His, et al, 2019 AES is the
encryption standard. This popular is nothing but the
most popular scheme available for today for the
encryption in the hardware acting as the software.
AES is well protected against linear and differential
cryptanalysis. It is in any case local side channel
attack secure with side channel algorithm depending
on how it is implemented. For instance, it is shown in
that the secret key can be recovered by measuring the
power of the implementation and statistically analyse
a few traces of the same implementation. In this
article, we present a high-performance hardware
design of 128-bit AES with DPA countermeasure.
And This fake-out design ships in TSMC 22nm. The
design is highly efficient, low power and small
silicon area. It will operate up to 400+Mhz properly
= 5.12Gbps. The overall footprint area of the AES
block is 0.0169 mm 2. Its power usage is 9.77pJ/bit
or 1.25nJ/block.
RISC-V MCU based on VLSI with multi-stage
pipelining. Mao-Hsu Yen, et al, 2023 Hoping to make
instruction scheduling more efficient by further
studying the scheduling of instructions for
minimizing the latency, which is of use to the
RV32IM Instruction Set Architecture (ISA) of RISC-
V and the design of variable-length pipeline. and the
in-order dispatch, out-of-order writeback are used in
the MCU. Since the processing times of the MCU
instructions are not uniform, it yields too high
average processing time for the long instructions in
case a 5-stage pipeline is applied uniformly to the
design. According with that, we also introduced a
flexible-pipeline design based on the Hummingbird
E200 architecture, to allow the MCU to select a
different pipeline length at the time of operation of
each instruction. Through the dispatch method of the
proposed pipeline structure, instructions were no
longer required to operate at every stage of the
pipeline that did not concern them, hence speeding up
the instruction completion time. For the pipeline
structure design, we use the multiplication/the
division is realized in the execution stage of 27 MCU
(Each pipeline stage completed in the shorter time the
pipeline may be broken). Was this OOWB model
(under proposed MCU) is one which followed the
out-of-order write-back scheme of allowing the
instructions, which had a single data dependency (i.e.
whatever is to be written by them), they could then be
written-back in order without waiting for each other
and the system throughput got a boost. The proposed