Mini-AES is mini version of Advanced Encryption Standard created by Raphael Chung as a testbed for crypanalysts studensts. This cipher immitates rijndael in such simple way. It inherits rijndael characteristics.
There are several things to consider while learning Mini-AES, such multiplication along GF(24), substitution, key scheduling, matrix multiplication, and block XOR. This post will gradually upadeted to give information about Mini-AES in hardware.
First, Mini-AES multiplication in GF(24) is characterized by polynomial m(x) = x4 + x + 1. In hardware multiplication by 2 and multiplication by 3 are defined by circuits below
Multiplication by 2
Multiplication by 3
The Mix-Column of Mini-AES is defined by circuit below
While Mini-AES substitution as well as its inverse are defined by table below
To derive the functions that define SBOX table, map the table above into K-Map, look for similarity and derive the function one by one. The picture below is the mapping result in K-Map. Cells that marked green, blue and red share common function, while cells that marked orange are unique.
The chart above is characterized by equations below:
To be continue..😀