A circuit area optimization of MK-3 S-box

Author:

Li Yanjun,Zhang Weiguo,Lin YipingORCID,Zou Jian,Liu Jian

Abstract

AbstractIn MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified the irreducible polynomials over $$\mathbb {F}_{2^n}$$ F 2 n into three kinds. Then we compared the logic gates required for multiplication over the finite field constructed by the three types of irreducible polynomials. According to the comparison result, we constructed the composite fields, $$\mathbb {F}_{(2^4)^2}$$ F ( 2 4 ) 2 and $$\mathbb {F}_{(2^8)^2}$$ F ( 2 8 ) 2 . Based on the isomorphism of finite fields, the operations over $$\mathbb {F}_{2^{16}}$$ F 2 16 can be conducted over $$\mathbb {F}_{(2^8)^2}$$ F ( 2 8 ) 2 . Similarly, elements over $$\mathbb {F}_{2^8}$$ F 2 8 can be mapped to the corresponding elements over $$\mathbb {F}_{(2^4)^2}$$ F ( 2 4 ) 2 . Next, the SAT solver was used to optimize the operations over smaller field $$\mathbb {F}_{2^4}$$ F 2 4 . At last, the architecture of the optimized MK-3 S-box was worked out. Compared with the implementation proposed by the original designer, the circuit area of the MK-3 S-box in this paper is reduced by at least 55.9%.

Funder

Open Project of Henan Key Laboratory of Network Cryptography Technology

the Advanced Discipline Construction Project of Beijing Universities

Publisher

Springer Science and Business Media LLC

Reference24 articles.

1. Boyar J, Matthews P, Peralta R (2008) On the shortest linear straight-line program for computing linear forms. Math Found Comput Sci 2008:168–179

2. Boyar Joan, Matthews Philip, Peralta René (2013) Logic minimization techniques with applications to cryptology. J Cryptol 26:280–312

3. Boyar J, Peralta R (2010) A new combinational logic minimization technique with applications to cryptology. Exp Algorithm, pp 178–189

4. Canright D (2005) A very compact S-Box for AES. Cryptographic hardware and embedded systems—CHES 2005, pp 441–455

5. Daemen J, Rijmen V (1998) The block Cipher Rijndael. Smart card research and advanced application conference

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3