Hardware implementation of one class of 8-bit permutations
Prikladnaya Diskretnaya Matematika. Supplement, no. 12 (2019), pp. 134-137.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper studies the issues of implementation of one class of S-Boxes on FPGA and ASIC and compares them with the implementation of arbitrary mappings $V_8 \to V_8$. The way of implementation of arbitrary S-Box is studied. It's shown that any S-Box over $V_8$ can be implemented using 40 LUTs (812 GE). For one class of S-Boxes over $V_8$ with high cryptographic properties, the possibility of their implementation using 19 LUTs (147 GE) is shown.
Keywords: S-Box, FPGA, ASIC.
Mots-clés : permutation
@article{PDMA_2019_12_a38,
     author = {D. B. Fomin and D. I. Trifonov},
     title = {Hardware implementation of one class of 8-bit permutations},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {134--137},
     publisher = {mathdoc},
     number = {12},
     year = {2019},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2019_12_a38/}
}
TY  - JOUR
AU  - D. B. Fomin
AU  - D. I. Trifonov
TI  - Hardware implementation of one class of 8-bit permutations
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2019
SP  - 134
EP  - 137
IS  - 12
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2019_12_a38/
LA  - ru
ID  - PDMA_2019_12_a38
ER  - 
%0 Journal Article
%A D. B. Fomin
%A D. I. Trifonov
%T Hardware implementation of one class of 8-bit permutations
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2019
%P 134-137
%N 12
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2019_12_a38/
%G ru
%F PDMA_2019_12_a38
D. B. Fomin; D. I. Trifonov. Hardware implementation of one class of 8-bit permutations. Prikladnaya Diskretnaya Matematika. Supplement, no. 12 (2019), pp. 134-137. http://geodesic.mathdoc.fr/item/PDMA_2019_12_a38/

[1] Shannon C., “Communication theory of secrecy systems”, Bell System Technical J., 1949, no. 28, 656–715 | DOI | MR | Zbl

[2] Rebeiro C., Selvakumar D., Devi A. S. L., “Bitslice implementation of AES”, Cryptology and Network Security, 2006, 203–212 | DOI | Zbl

[3] Boss E., Grosso V., Tim Güneysu T., et al., “Strong 8-bit sboxes with efficient masking in hardware”, J. Cryptographic Engineering, 7:2 (2017), 149–165 | DOI

[4] Kutzner S., Nguyen P. H., and Poschmann A., “Enabling 3-share threshold implementations for all 4-bit s-boxes”, LNCS, 8565, 2013, 91–108 | MR

[5] Canteaut A., Duval S., Leurent G., Construction of lightweight s-boxes using Feistel and MISTY structures (full version), Cryptology ePrint Archive, No 2015(711), 2015 | MR

[6] Lim C. H., CRYPTON: A New 128-bit Block Cipher — Specification and Analysis, , 1998 http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.5771

[7] Gérard B., Grosso V., Naya-Plasencia M., Standaert F.-X., “Block ciphers that are easier to mask: How far can we go?”, LNCS, 8086, 2013, 383–399 | Zbl

[8] Matsui M., “New block encryption algorithm MISTY”, LNCS, 1267, 1997, 54–68 | Zbl

[9] Grosso V., Leurent G., Standaert F.-X., Varici K., “Ls-designs: Bitslice encryption for efficient masked software implementations”, LNCS, 8540, 2014, 18–37

[10] Standaert F.-X., Piret G., Rouvroy G., et al., “ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware”, LNCS, 3017 (2004), 279–299 | Zbl

[11] Rijmen V., Barreto P., The Khazad Legacy-Level Block Cipher, , 2018 https://www.researchgate.net/publication/228924670_The_Khazad_legacy-level_block_cipher

[12] Lim C.-H., “A revised version of Crypton — Crypton v1.0”, LNCS, 1636, 1999, 31–45 | MR | Zbl

[13] Stallings W., “The Whirlpool secure hash function”, Cryptologia, 30:1 (2006), 55–67 | DOI | Zbl

[14] Perrin L., Udovenko A., Biryukov A., Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem (full version), Cryptology ePrint Archive, No 2016(539), 2016 | MR

[15] De la Cruz Jiménez R. A., On some methods for constructing almost optimal s-boxes and their resilience against side-channel attacks, Cryptology ePrint Archive, No 2018(618), 2018

[16] Fomin D., “New classes of 8-bit permutations based on a butterfly structure”, CTCrypt'18, 2018 https://ctcrypt.ru/files/files/2018/09_Fomin.pdf | MR

[17] Fomin D., “On the way of constructing $2n$-bit permutations from $n$-bit ones”, CTCrypt'19, 2019 (to appear)

[18] Fomin D. B., “O podkhodakh k postroeniyu nizkoresursnykh nelineinykh preobrazovanii”, Obozrenie prikladnoi i promyshlennoi matematiki, 25:4 (2018), 379–381