Modifications of bijective S-Boxes with linear structures

نویسندگان

چکیده

Abstract Various systematic modifications of vectorial Boolean functions have been used for finding new previously unknown classes S-boxes with good or even optimal differential uniformity and nonlinearity. In this paper, a general modification method is given that preserves the bijectivity property function in case inverse admits linear structure. A known construction such based on bijective Gold odd dimension special method.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Performance Characterization of Block Cipher Structures Using S-boxes and Linear Mappings

In this paper, we present a new framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, a novel performance metric is introduced and applied to nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings. Within each cip...

متن کامل

Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis

In this letter, we study the marginal density of the XOR distribution table, and the linear approximation table entries of regular substitution boxes (s-boxes). Based on this, we show that the fraction of good s-boxes (with regard to immunity against linear and differential cryptanalysis) increases dramatically with the number of input variables. Introduction Differential cryptanalysis [1], and...

متن کامل

Asymmetric cryptography with S-Boxes

In [12], T. Matsumoto and H. Imai designed an asymmetric cryptosystem, called C∗, for authentication, encryption and signature. This C∗ scheme was broken in [13] due to unexpected algebraic properties. In this paper, we study some new “candidate” asymmetric cryptosystems based on the idea of hiding one or two rounds of small S-box computations with secret functions of degree one or two. The pub...

متن کامل

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function

We consider ciphertext-only attack on symmetric block ciphers based on the Feistel network with secret S-boxes installed as an additional parameter, like in Soviet GOST 28147-89. In case when Sboxes are generated by authorized agency and cannot be verified by end-user of the cipher (e.g., in case of special equipment for encryption), application of non-bijective S-boxes allows significantly dec...

متن کامل

non-linear study of various slit shear walls in steel structures

seismic retrofit strategies have been developed in the past few decades following the introduction of new seismic provisions and the availability of advanced materials and methods. it can be observed that new approaches to deal with more lateral forces are more innovative and more energy absorbent. in line with this, there is a growing trend toward the use of steel shear walls as a system with ...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography and Communications

سال: 2023

ISSN: ['1936-2455', '1936-2447']

DOI: https://doi.org/10.1007/s12095-023-00631-9