Using Normal Bases for Compact Hardware Implementations of the AES S-Box

Svetla Nikova, Vincent Rijmen, Martin Schläffer

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    19 Citations (Scopus)
    9 Downloads (Pure)

    Abstract

    The substitution box (S-box) of the Advanced Encryption Standard (AES) is based on the multiplicative inversion $\inverse(x) = x^{-1}$ in GF(256) and followed by an affine transformation in GF(2). The S-box is the most expansive building block of any hardware implementation of the AES, and the multiplicative inversion is the most costly step of the S-box transformation. There exist many publications about hardware implementations of the S-box and the smallest known implementations are based on normal bases. In this paper, we introduce a new method to implement the multiplicative inversion over GF(256) based on normal bases that have not been considered before in the context of AES implementations.
    Original languageEnglish
    Title of host publicationSecurity and Cryptography for Networks
    Subtitle of host publication6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings
    EditorsRafail Ostrovsky, Roberto De Prisco, Ivan Visconti
    Place of PublicationLondon
    PublisherSpringer
    Pages236-245
    Number of pages10
    ISBN (Electronic)978-3-540-85855-3
    ISBN (Print)978-3-540-85854-6
    DOIs
    Publication statusPublished - 10 Sept 2008
    Event6th International Conference on Security in Communication Networks, SCN 2008 - Amalfi, Italy
    Duration: 10 Sept 200812 Sept 2008
    Conference number: 6

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume5229
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference6th International Conference on Security in Communication Networks, SCN 2008
    Abbreviated titleSCN
    Country/TerritoryItaly
    CityAmalfi
    Period10/09/0812/09/08

    Keywords

    • SCS-Cybersecurity
    • EWI-13886
    • IR-62504
    • METIS-263697

    Fingerprint

    Dive into the research topics of 'Using Normal Bases for Compact Hardware Implementations of the AES S-Box'. Together they form a unique fingerprint.

    Cite this