Optimizing the AES S-Box using SAT

نویسندگان

  • Carsten Fuhs
  • Peter Schneider-Kamp
چکیده

In this paper we describe the implementation of a technique for minimizing XOR circuits used in cryptographic algorithms. More precisely, we present our work from [4] for encoding this synthesis problem to SAT with a focus on the case study of optimizing an important component of the Advanced Encryption Standard (AES) [8]. In addition to these previously published contributions, we report on novel encouraging experimental results that allow us to actually prove optimality of the results obtained. The AES algorithm consists of the (repeated) application of four steps. The main step for introducing non-linearity is the SubBytes step that is based on a so-called S-box. This S-box is a transformation based on multiplicative inverses in GF(2) combined with an invertible affine transformation. This step can be decomposed into two linear parts and a minimal non-linear part. We focus on the optimization of the linear parts, in particular the first one (called the “top matrix” in [2]). In this paper, we assume that we have n inputs x1, . . . , xn and m outputs y1, . . . , ym. Then the linear function to be computed can be specified by m equations of the form y` = a`,1 · x1 ⊕ a`,2 · x2 ⊕ . . . ⊕ a`,n · xn for 1 ≤ ` ≤ m. We call each equation a linear form. Note that each a`,j is a constant from GF(2) = {0, 1}, each xj is a variable over GF(2), and ⊕ and · denote standard addition and multiplication on GF(2). Our goal is to come up with an algorithm that computes these linear forms given x1, . . . , xn as inputs. More specifically, we would like to express this algorithm via a linear straightline program (or, for brevity, just program). Here, every line of the program has the shape u := e · v ⊕ f · w with e, f ∈ GF(2) and v, w variables. Some lines of the program will contain the output, i.e., assign the value of one of the desired linear forms to a variable. The length of a program is the number of lines the program contains. A program is optimal if there is no shorter program that computes the same linear forms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

متن کامل

Optimizing S-Box Implementations for Several Criteria Using SAT Solvers

We explore the feasibility of applying SAT solvers to optimizing implementations of small functions such as S-boxes for multiple optimization criteria, e.g., the number of nonlinear gates and the number of gates. We provide optimized implementations for the S-boxes used in Ascon, ICEPOLE, Joltik/Piccolo, Keccak/Ketje/Keyak, LAC, Minalpher, PRIMATEs, Prøst, and RECTANGLE, most of which are candi...

متن کامل

A More Compact AES

We explore ways to reduce the number of bit operations required to implement AES. One way involves optimizing the composite field approach for entire rounds of AES. Another way is integrating the Galois multiplications of MixColumns with the linear transformations of the S-box. Combined with careful optimizations, these reduce the number of bit operations to encrypt one block by 9.0%, compared ...

متن کامل

AES S-Box Construction using One Dimensional Cellular Automata Rules

S-Box is the only non-linear component in Advanced Encryption Standard(AES) which determine its strength. The Look-Up Table based S-Box of conventional AES occupies large storage space, reduced throughput and consumes more power. This article presents the design of an S-Box based on Reversible Cellular Automata function that reduces the implementation cost. Further, Cellular Automata functions ...

متن کامل

Security Enhancement Algorithms for Data Transmission in 4G Networks

In this paper, the design and evaluation of security enhancement for data transmission in 4G networks is presented. An enhanced encryption method with AES algorithm is used here. Enhancement is done by applying dynamic S-box to Round structured AES. The static S-box is made dynamic using cipher key. The inverse S-box is also modified accordingly. Complexity is increased using Round structure to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010