S-Box Design

Speaker:  Chuck Easttom – Plano, TX, United States
Topic(s):  Networks and Communications

Abstract

Symmetric ciphers are widely used to provide secure communications and data storage.  The ubiquitous nature of the symmetric cipher, indicates that its underlying structure is worth study.  Block ciphers are the most common form of symmetric cipher. Within all block ciphers will be exclusive or operations and transpositions, but these operations do not provide non-linearity for the cipher. S-box’s (substitution boxes) provide the core non-linearity of block ciphers.  An s-box must exhibit certain properties in order to support the overall security of a given block cipher. AES is one of the most widely used symmetric algorithms. With growing awareness of cryptographic backdoors, some organizations have expressed an interest in modifying their AES implementations in order to provide a private version of AES for use only within their own organization. This lecture briefly summarizes s-box structure and implementation, as well as the criteria for an acceptable s-box. Then three different methodologies for effectively altering the AES s-box are explored.

About this Lecture

Number of Slides:  25
Duration:  60 minutes
Languages Available:  English
Last Updated: 

Request this Lecture

To request this particular lecture, please complete this online form.

Request a Tour

To request a tour with this speaker, please complete this online form.

All requests will be sent to ACM headquarters for review.