Composite field GF(((22)2)2) AES S-Box with direct computation in GF(24) inversion

M. M. Wong*, M. L. Dennis Wong, I. Hijazin, Asoke K. Nandi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Composite field arithmetic (CFA) has been widely used in designing combinatorial logic circuits for the S-Box function in the Advanced Encryption Standard (AES) in order to mitigate the performance bottleneck in VLSI implementation. In this work, we first categorize all of the possible composite field AES S-box constructions into four main architectures based on their field representations and the chosen algebraic properties. Each category is then investigated thoroughly. Next, we show that by computing the F(24) inversion directly in the composite field F(((22)2) 2), we can further reduce the total area gate count as well as the critical path gate count. The architecture that leads to the maximum reduction in both total area coverage and critical path gate count through the exploitation of direct computation in F(24) inversion is found and reported. Our best architecture has a total area gate count of 35 AND gates and 117 XOR gates and critical path gate count of 3 AND gates and 20 XOR gates.

Original languageEnglish
Title of host publication2011 7th International Conference on Information Technology in Asia
ISBN (Electronic)9781612841304
DOIs
Publication statusPublished - 2011
Event2011 7th International Conference on Information Technology in Asia - Kuching, Sarawak, Malaysia
Duration: 12 Jul 201113 Jul 2011

Conference

Conference2011 7th International Conference on Information Technology in Asia
Abbreviated titleCITA '11
Country/TerritoryMalaysia
CityKuching, Sarawak
Period12/07/1113/07/11

Keywords

  • Advanced Encryption Standard (AES)
  • composite field arithmetic (CFA)
  • direct computation in F(2) inversion
  • multiplicative inverse

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Composite field GF(((22)2)2) AES S-Box with direct computation in GF(24) inversion'. Together they form a unique fingerprint.

Cite this