Bitsliced Implementation of Non-Algebraic 8×8 Cryptographic S-Boxes Using ×86-64 Processor SIMD Instructions
نویسندگان
چکیده
The article is devoted to software bitsliced implementation of randomly generated $8\times 8$ S-Box block ciphers, focused on the use logical SIMD instructions from SSE, AVX and AVX-512 extensions in ×86-64 processors. A heuristic algorithm for minimizing non-algebraic S-Boxes three bases proposed: universal—based AND, OR, XOR, NOT, which allows any 8/16/32/ 64-bit processors; extended—based AND-NOT, ternary—based ternary logic instructions, processors with support. On average, representations these require 400/380/200 respectively. performance implementations cipher “Kalyna” using SSE/AVX/ Intel Xeon Skylake-SP processor was measured. fast alternative—non-bitsliced approach bytesliced SubBytes operation based AVX-512VBMI extension, resistant timing cache attacks—is proposed.
منابع مشابه
Radix-4 FFT implementation using SIMD multimedia instructions
In this paper, a fast radix-4 complex FFT implementation using 4-parallel SIMD instructions is presented. Four radix-4 butterflies are calculated in parallel at all stages by loading consecutive 4 elements into a register. At the last stage, every 4 elements is packed into a register and calculated in parallel. This regular data flow enables higher parallelism and an overhead reduction in data ...
متن کاملThe Design of Cryptographic S-Boxes Using CSPs
We use the Constraint Satisfaction Problem (CSP) framework to model and solve the problem of designing substitution functions for substitutionpermutation (SP) networks as proposed by Shannon for the architecture of ciphers. Many ciphers are designed using the SP pattern, and differ mainly by two parametrized functions: substitution and permutation. The most difficult of the two is the substitut...
متن کاملA Guideline for Designing Cryptographic S-boxes
S-box’s provide the core non-linearity of block ciphers. An s-box must exhibit certain properties in order to support the overall security of a given block cipher. AES is one of the most widely used symmetric algorithms. With growing awareness of cryptographic backdoors, some organizations have expressed an interest in modifying their AES implementations in order to provide a private version of...
متن کاملFPGA Implementation of a 64-Bit RISC Processor Using VHDL
In this paper, the Field Programmable Gate Array (FPGA) based 64-bit RISC processor with built-inself test (BIST) feature implemented using VHDL and was, in turn, verified on Xilinx ISE simulator. The VHDL code supports FPGA, System-On-Chip (SOC), and Spartan 3E kit. This paper also presents the architecture, data path and instruction set (IS) of the RISC processor. The 64-bit processors, on th...
متن کاملResistance of S-Boxes against Algebraic Attacks
We develop several tools to derive linear independent multivariate equations from algebraic S-boxes. By applying them to maximally nonlinear power functions with the inverse exponents, Gold exponents, or Kasami exponents, we estimate their resistance against algebraic attacks. As a result, we show that S-boxes with Gold exponents have very weak resistance and S-boxes with Kasami exponents have ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2023
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2022.3223782