Home Computer Science Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
The SubBytes operation is a nonlinear function which replaces one byte by a different predefined byte, given
where b-1 is the г'-th bit of the multiplicative inverse of the input byte b . For efficiency purposes, the SubBytes function is often replaced by an equivalent 256- byte lookup table, designated as SBox. Alternatives to the implementation of this byte substitution considering composite fields also exist [3, 24, 26].
The ShiftRows operation, as the name implies, is a permutation of the 2nd, 3rd and 4th rows of the State matrix, 1,2, and 3 positions to the left, respectively. The inverse operation used in decryption, InvShiftRows, is the direct undoing of the former shifting, with the permutations of the same rows 1, 2, and 3 positions to the right. The 1st row of the State matrix does not suffer any changes in either one of these operations. Both operations are depicted in Fig. 1.2.
Fig. 1.2 AES ShiftRows and InvShiftRows operations
Table 1.1 Byte-by-byte GF(28) multiplication
|< Prev||CONTENTS||Next >|