Words of Wisdom:

"just because someone has more guy friends than girl friends, doesn't make them a mut - m + sl." - Ytiema

S-Box Implementations

  • Date Submitted: 11/28/2012 07:26 AM
  • Flesch-Kincaid Score: 46.7 
  • Words: 2404
  • Essay Grade: no grades
  • Report this Essay
A Low Power Design for Sbox Cryptographic Primitive of
Advanced Encryption Standard for Mobile End-Users

George N. Selimis*, Athanasios P. Kakarountas, Apostolos P. Fournaris,
Athanasios Milidonis, and Odysseas Koufopavlou

Department of Electrical and Computer Engineering, University of Patras, Greece, 26110

(Received: 16 June 2007; Accepted: 15 October 2007)

Most known Sbox Advanced Encryption Standard implementations aim at minimizing chip covered area or achieving high throughput, and usually power consumption is a secondary metric of their cost. However, the need for low power applications with strict chip covered area constrains is great especially in mobile devices. In this paper low power architectures in limited area resources are proposed for Sbox, the basic cryptographic primitive of AES. Those architectures support encryption and decryption operation modes. In our proposed implementations, retaining a small chip covered area cost, hardware techniques for low power design, such as re-ordering of the components, introduction of redundant hardware (ideal delay line), reducing the driving strength – fan out, and
insertion of registers in highly unbalanced points of the circuit are applied. Therefore, our implementations do not only reduce power consumption by a large degree, but they also have good area properties and offer an advantageous power-delay-area product in comparison with other known Sbox implementations. These properties give to our system the advantage to support low power mobile devices in low area system environments.


National Institute of   Standards and Technology (NISC)   felt the need to replace the Encryption standards that are widely used as protection, privacy and security tool in mobile phones, portable computers and ATM. The need to change the encryption standard was felt because the old Encryption, DES, was very hard to grasp because the company ,IBM, that owned this standard tried to hide its...


Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments