Differential Distributions for Twofish S-Boxes

نویسنده

  • Sean Murphy
چکیده

This paper gives some results concerning the the probability distribtuins for simultaneous di erentials across the same Two sh S-Box. 1 A Single Di erential for an S-Box Consider a Two sh S-Box [1] S-Box. For a given Two sh S-box (16-bit) subkey k, this de nes a function Sk : Z 8 2 ! Z 2 . The di erential count for Sk for input di erence a and output di erence b (a! b) is de ned by Nk(a; b) = #fx 2 Z 8 2 jSk(x) Sk(x a) b = 0g [a; b 2 Z 8 2 ]: The probability of the di erential a ! b is given by 2 8Nk(a; b). Clearly, Nk(a; 0) = Nk(0; b) = 0 for a; b 6= 0 with Nk(0; 0) = 2 . We consider Nk(a; b) when a; b 6= 0. Consider the quotient space Ua = Z 8 2 =f0; ag, and de ne Wx 2 Ua to be the coset fx; x ag. We can now de ne F : Ua ! Z 8 2 by F (Wx) = Sk(x) Sk(x a) b: It is reasonable to regard F as a random function mapping uniformly into an 8-bit space, so the indicator function IWx for the event F (Wx) = 0 takes the value 1 with probability 2 8 and 0 with probability 1 2 . Furthermore, to a very good approximation, IWx are independent random variables. Thus, summing over all 2 elements of Ua, we obtain X Wx2Ua IWx Bin(2 ; 2 ) Poi(1=2):

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characteristics of Key-Dependent S-Boxes: the Case of Twofish

In this paper we analyze and discuss the cryptographic robustness of key-dependent substitution boxes (KDSBs); these can be found in some symmetric-key algorithms such as Khufu, Blowfish, and the AES finalist Twofish. We analyze KDSBs in the framework of composite permutations, completing the theory developed by O’Connor. Under the basic assumption that KDSBs are built choosing permutations ran...

متن کامل

Further Observations on the Key Schedule of Twofish

Twofish is a 128-bit block cipher submitted as an AES candidate [SKW+98]. Mirza and Murphy [MM99] recently noted two interesting properties in the Twofish key schedule for 128-bit keys: there is a non-uniform distribution of 128-bit whitening keys, and the 64-bit round subkeys are non-uniformly distributed over each subset of keys that fixes the S-boxes. This paper extends these results and exp...

متن کامل

Algebraic Side-Channel Attack on Twofish

While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic s...

متن کامل

Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes

Threshold Implementation (TI) is an elegant and promising lightweight countermeasure for hardware implementations to resist first order Differential Power Analysis (DPA) in the presence of glitches. Unfortunately, in its most efficient version with only three shares, it can only be applied to 50% of all 4-bit S-boxes so far. In this paper, we introduce a new approach, called factorization, that...

متن کامل

Twofish: A 128-Bit Block Cipher

Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by-8-bit S-boxes, a fixed 4-by-4 maximum distance separable matrix over GF(2), a pseudo-Hadamard transform, bitwise rotations, and a carefully designed key schedule. A fully optimized implementation of Twofish e...

متن کامل

Randomness analysis and generation of key-derived s-boxes

Although many ciphers use fixed, close to ideal, s-boxes (like AES e.g.), random s-boxes offer an interesting alternative since they have no underlying structure that can be exploited in cryptanalysis. For this reason, some cryptosystems generate pseudorandom s-boxes as a function of the key (key-derived). We analyse the randomness properties of key-derived s-boxes generated by some popular cry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000