Variations to S-box and MixColumn Transformations of AES

ثبت نشده
چکیده

Variations to S-box and MixColumn transformations of Rijndael are discussed in this paper. These variations are designed over the Galois field GF(2) generated by the primitive polynomial x + x + x + x + 1. The proposed S-box is constructed by computing the powers of a primitive root in F257 and taking the multiplicative inverse of the resulting entries as in Rijndael’s algorithm. The new MixColumn transformation has self-inverse and uses the coefficients 01, 02, and 03. Hence it improves the performance of the inverse cipher and also reduces the complexity of the system that supports the inverse cipher. As a trade-off this transformation has relatively low relevant diffusion power.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

FPGA Implementation of Reconfigurable Parameters AES Algorithm

In this paper, a novel method of using customized (AES) variable parameters is introduced. This method depends on a continuous parameters reconfiguration and a customization of each internal block. The customization depends on varying the four transformations (polynomial and affine transformations for S-Box (SB), ShiftRows (SR) transformation, and MixColumn (MC) transformation). Internal AES bl...

متن کامل

Architectural Optimization of Aes Transformations and Keyexpansion

Advanced Encryption Standard (AES), is a cryptographic algorithm used for data protection. Designing an efficient hardware architecture for AES with small hardware resource usage is a challenge. Many works are going on for the efficient implementation of AES. The cost and power consumption of the AES can be reduced considerably by optimizing the architecture of AES. AES uses different data tran...

متن کامل

CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES

Secure data transmission is very important in any communication systems. Network Security provides many techniques for efficient data transmission through unprotected network. Cryptography provides a method for securing the transmission of information by the process of encryption. Encryption converts the message in to unreadable form (Cipher Text) . Decryption converts this Cipher Text back to ...

متن کامل

CS 519 / ECE 599 : Advanced Network Security ( Fall 2014 ) Instructor : Dr . Attila A Yavuz

Instructor: Dr. Attila A Yavuz Homework 1 (10/29/2014) ANSWER KEY 1) [8 total] (2) What is the basic design technique, which is frequently used to construct modern symmetric ciphers? Substitution Permutation Networks (SPN) (2) What are the main security properties achieved via this designed technique? Confusion by substitution and diffusion by permutation (4) Given the example of AES, which fun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005