Modifications of bijective S-Boxes with linear structures
نویسندگان
چکیده
Abstract Various systematic modifications of vectorial Boolean functions have been used for finding new previously unknown classes S-boxes with good or even optimal differential uniformity and nonlinearity. In this paper, a general modification method is given that preserves the bijectivity property function in case inverse admits linear structure. A known construction such based on bijective Gold odd dimension special method.
منابع مشابه
Software Performance Characterization of Block Cipher Structures Using S-boxes and Linear Mappings
In this paper, we present a new framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, a novel performance metric is introduced and applied to nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings. Within each cip...
متن کاملResistance of Balanced s-Boxes to Linear and Differential Cryptanalysis
In this letter, we study the marginal density of the XOR distribution table, and the linear approximation table entries of regular substitution boxes (s-boxes). Based on this, we show that the fraction of good s-boxes (with regard to immunity against linear and differential cryptanalysis) increases dramatically with the number of input variables. Introduction Differential cryptanalysis [1], and...
متن کاملAsymmetric cryptography with S-Boxes
In [12], T. Matsumoto and H. Imai designed an asymmetric cryptosystem, called C∗, for authentication, encryption and signature. This C∗ scheme was broken in [13] due to unexpected algebraic properties. In this paper, we study some new “candidate” asymmetric cryptosystems based on the idea of hiding one or two rounds of small S-box computations with secret functions of degree one or two. The pub...
متن کاملCryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function
We consider ciphertext-only attack on symmetric block ciphers based on the Feistel network with secret S-boxes installed as an additional parameter, like in Soviet GOST 28147-89. In case when Sboxes are generated by authorized agency and cannot be verified by end-user of the cipher (e.g., in case of special equipment for encryption), application of non-bijective S-boxes allows significantly dec...
متن کاملnon-linear study of various slit shear walls in steel structures
seismic retrofit strategies have been developed in the past few decades following the introduction of new seismic provisions and the availability of advanced materials and methods. it can be observed that new approaches to deal with more lateral forces are more innovative and more energy absorbent. in line with this, there is a growing trend toward the use of steel shear walls as a system with ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography and Communications
سال: 2023
ISSN: ['1936-2455', '1936-2447']
DOI: https://doi.org/10.1007/s12095-023-00631-9