Searching the space of tower field implementations of the 𝔽<SUB align="right">2<SUP align="right">8</SUP> inverter - with applications to AES, Camellia and SM4

北京 中国 中国科学院 计算机科学 钥匙(锁) 信息安全 计算机安全 政治学 法学
作者
Zihao Wei,Siwei Sun,Lei Hu,Min Wei,René Peralta
出处
期刊:International Journal of Information and Computer Security [Inderscience Enterprises Ltd.]
卷期号:20 (1/2): 1-1
标识
DOI:10.1504/ijics.2023.127999
摘要

No AccessSearching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4Zihao Wei, Siwei Sun, Lei Hu, Man Wei and René PeraltaZihao WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Siwei SunState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Lei HuState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Man WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China and René PeraltaComputer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPublished Online:December 21, 2022pp 1-26https://doi.org/10.1504/IJICS.2023.127999PDF ToolsAdd to FavouritesDownload CitationsTrack Citations Share this article on social mediaShareShare onFacebookTwitterLinkedInReddit AboutAbstractThe tower field implementation of the 𝔽28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardised block ciphers such as AES, Camellia, and SM4, but also the underlying structure many side-channel attack resistant AES implementations rely on. In this work, we conduct an exhaustive study of the tower field representations of the 𝔽28 inverter with normal bases by applying several state-of-the-art combinatorial logic minimisation techniques. As a result, we achieve improved implementations of the AES, Camellia and SM4 S-boxes in terms of area footprint. Surprisingly, we are still able to improve the currently known most compact implementation of the AES S-box from CHES 2018 by 5.5 GE, beating the record again. For Camellia and SM4, the improvements are even more significant. The Verilog codes of our implementations of the AES, Camellia and SM4 S-boxes are openly available.Keywordstower field, inverter, S-box, AES, Camellia, SM4 Next article FiguresReferencesRelatedDetails Volume 20Issue 1-22023 ISSN: 1744-1765eISSN: 1744-1773 HistoryPublished onlineDecember 21, 2022 Copyright © 2023 Inderscience Enterprises Ltd.Keywordstower fieldinverterS-boxAESCamelliaSM4Authors and AffiliationsZihao Wei1 Siwei Sun2 Lei Hu3 Man Wei4 René Peralta5 1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China4. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China5. Computer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPDF download

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
现实的曼安完成签到 ,获得积分10
刚刚
整齐的惮完成签到 ,获得积分10
1秒前
稳重母鸡完成签到 ,获得积分10
3秒前
7秒前
大轩完成签到 ,获得积分10
7秒前
量子星尘发布了新的文献求助10
10秒前
gincle完成签到,获得积分10
10秒前
无极2023完成签到 ,获得积分10
10秒前
luffy完成签到 ,获得积分0
16秒前
阿童木完成签到 ,获得积分10
16秒前
量子星尘发布了新的文献求助10
24秒前
李健的小迷弟应助然大宝采纳,获得10
24秒前
量子星尘发布了新的文献求助10
26秒前
洋溢完成签到,获得积分10
26秒前
是盐的学术号吖完成签到 ,获得积分10
27秒前
zxx完成签到 ,获得积分10
28秒前
kanong完成签到,获得积分0
33秒前
gxzsdf完成签到 ,获得积分10
36秒前
zm完成签到 ,获得积分10
37秒前
付其喜完成签到 ,获得积分10
39秒前
玺青一生完成签到 ,获得积分10
39秒前
40秒前
量子星尘发布了新的文献求助10
45秒前
屈煜彬完成签到 ,获得积分10
46秒前
务实的一斩完成签到 ,获得积分10
49秒前
量子星尘发布了新的文献求助10
49秒前
司空以蕊完成签到 ,获得积分10
52秒前
54秒前
藏锋完成签到 ,获得积分10
55秒前
单小芫完成签到 ,获得积分10
56秒前
然大宝发布了新的文献求助10
59秒前
oleskarabach发布了新的文献求助10
1分钟前
科研通AI6应助zhang采纳,获得10
1分钟前
1分钟前
Cala洛~完成签到 ,获得积分10
1分钟前
幼儿园扛把子完成签到 ,获得积分10
1分钟前
量子星尘发布了新的文献求助10
1分钟前
壳聚糖完成签到 ,获得积分10
1分钟前
量子星尘发布了新的文献求助10
1分钟前
纸条条完成签到 ,获得积分10
1分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Digitizing Enlightenment: Digital Humanities and the Transformation of Eighteenth-Century Studies 1000
Translanguaging in Action in English-Medium Classrooms: A Resource Book for Teachers 700
Real World Research, 5th Edition 680
Qualitative Data Analysis with NVivo By Jenine Beekhuyzen, Pat Bazeley · 2024 660
Handbook of Migration, International Relations and Security in Asia 555
Between high and low : a chronology of the early Hellenistic period 500
热门求助领域 (近24小时)
化学 材料科学 生物 医学 工程类 计算机科学 有机化学 物理 生物化学 纳米技术 复合材料 内科学 化学工程 人工智能 催化作用 遗传学 数学 基因 量子力学 物理化学
热门帖子
关注 科研通微信公众号,转发送积分 5671500
求助须知:如何正确求助?哪些是违规求助? 4918822
关于积分的说明 15134852
捐赠科研通 4830227
什么是DOI,文献DOI怎么找? 2586973
邀请新用户注册赠送积分活动 1540582
关于科研通互助平台的介绍 1498856