2021
DOI: 10.1002/cta.3041
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight 8‐bit S‐box and combined S‐box/S‐box−1 for cryptographic applications

Abstract: In this paper, a lightweight 8-bit S-box and combined S-box/S-box À1 with a security level equal to the AES S-box is presented. From the viewpoint of hardware implementation, the S-box has better hardware and timing complexities.The structure is based on an efficient field inversion and a low-cost affine transformation. The field multiplications over F 2 4 in the inversion circuit are implemented by resource sharing to reduces logic gates. The original equations of the inversion over F 2 4 are optimally rewrit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…A review of the existing literature on the subject shows several works where a study is conducted to detect and fix vulnerabilities using affine transformations [41], [42]. However, the works do not go beyond the correction of their proposed S-Boxes.…”
Section: A State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…A review of the existing literature on the subject shows several works where a study is conducted to detect and fix vulnerabilities using affine transformations [41], [42]. However, the works do not go beyond the correction of their proposed S-Boxes.…”
Section: A State Of the Artmentioning
confidence: 99%
“…By applying this operation, up to 255 different S-Boxes can be obtained from the original. Since this operation is defined as an affine transformation [41], it is not expected to have negative effects on the cryptographic properties of the S-Box. Section III presents the results obtained by applying a cryptanalysis to the S-Boxes that are generated using this operation.…”
Section: B Operation 2: Bitwise Exclusive Logic Disjunction (Xor)mentioning
confidence: 99%
“…But, for the hackers, decrypting the ciphertext is a challenging task. Therefore, more and more research focus on the S-Box to enhance security strength, as mentioned by [20], [21], and [22], which proposed different S-Box with reliable security but lower computational complexity compared to the one used in AES. However, AES is the standard of the U.S. National Institute of Standards and Technology (NIST), as mentioned by [23].…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, Rashidi [19] proposed a method to generate an S-box based on inversion and affine transformation, which exhibited better hardware implementation compared to the AES S-box with similar cryptographic properties. In 2023, in order to achieve a lower area and higher security for the inversion of the S-box in [19] over a finite field, Rashidi rewrote the original equation of inversion to optimize the S-box [20]. And Rashidi [21] also constructed two 8-bit S-boxes with lower hardware resources and lower critical path delay (CPD).…”
Section: Related Workmentioning
confidence: 99%