{"title":"一种快速高效S-Box实现指令的设计","authors":"Meifeng Li, Guanzhong Dai, Hang Liu, Wei Hu","doi":"10.1109/CIS.2007.103","DOIUrl":null,"url":null,"abstract":"With the development of cipher instruction set extension, design of s-box instruction has received more and more attention. An s-box instruction named SboxPer is designed in this paper for fast and efficient implementation of s-boxes in common symmetric-key ciphers. By introducing PLUT, this instruction improves the efficiency of table lookup. Half-byte permutation is performed after the table lookup operation, which leads to the result that no additional instruction is needed to obtain the final result of S-box operation. Results of performance estimate show that this instruction can improve the execution speed of s- box lookup in symmetric-key ciphers significantly and occupies little memory space.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Design of an Instruction for Fast and Efficient S-Box Implementation\",\"authors\":\"Meifeng Li, Guanzhong Dai, Hang Liu, Wei Hu\",\"doi\":\"10.1109/CIS.2007.103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of cipher instruction set extension, design of s-box instruction has received more and more attention. An s-box instruction named SboxPer is designed in this paper for fast and efficient implementation of s-boxes in common symmetric-key ciphers. By introducing PLUT, this instruction improves the efficiency of table lookup. Half-byte permutation is performed after the table lookup operation, which leads to the result that no additional instruction is needed to obtain the final result of S-box operation. Results of performance estimate show that this instruction can improve the execution speed of s- box lookup in symmetric-key ciphers significantly and occupies little memory space.\",\"PeriodicalId\":127238,\"journal\":{\"name\":\"2007 International Conference on Computational Intelligence and Security (CIS 2007)\",\"volume\":\"92 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Computational Intelligence and Security (CIS 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2007.103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2007.103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of an Instruction for Fast and Efficient S-Box Implementation
With the development of cipher instruction set extension, design of s-box instruction has received more and more attention. An s-box instruction named SboxPer is designed in this paper for fast and efficient implementation of s-boxes in common symmetric-key ciphers. By introducing PLUT, this instruction improves the efficiency of table lookup. Half-byte permutation is performed after the table lookup operation, which leads to the result that no additional instruction is needed to obtain the final result of S-box operation. Results of performance estimate show that this instruction can improve the execution speed of s- box lookup in symmetric-key ciphers significantly and occupies little memory space.