A New Method for Generating High Non-linearity S-Boxes

نویسنده

  • Petr TESAŘ
چکیده

Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of crypto-attacks has led to the development of criteria for repelling such attacks. The non-linearity criterion provides some protection against wellknown attacks, such as linear cryptanalysis and differential cryptanalysis. The open problem is constructed by generating methods which will be rapid and will generate S-boxes with the highest possible non-linearity. This paper deals with a new rapid method for generating regular 8x8 S-boxes with non-linearity up to a value of 104. The new method combines the special genetic algorithm with total tree searching.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Strategy for Simultaneous Compensation of Instantaneous Reactive Power and Harmonics of Non-Linear Loads (RESEARCH NOTE)

This paper presents a new control method for simultaneous compensation of instantaneous reactive power and current harmonics by parallel active filters (PAFs). Reference compensating currents of PAF are calculated using the subtraction of instantaneous power from its average value. In this way, it is possible omitting high/low pass filter(s) from the control circuit of PAF, which usually result...

متن کامل

Testing for Stochastic Non- Linearity in the Rational Expectations Permanent Income Hypothesis

The Rational Expectations Permanent Income Hypothesis implies that consumption follows a martingale. However, most empirical tests have rejected the hypothesis. Those empirical tests are based on linear models. If the data generating process is non-linear, conventional tests may not assess some of the randomness properly. As a result, inference based on conventional tests of linear models can b...

متن کامل

A Guideline for Designing Cryptographic S-boxes

S-box’s provide the core non-linearity of block ciphers. An s-box must exhibit certain properties in order to support the overall security of a given block cipher. AES is one of the most widely used symmetric algorithms. With growing awareness of cryptographic backdoors, some organizations have expressed an interest in modifying their AES implementations in order to provide a private version of...

متن کامل

DPA Attacks and S-Boxes

For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-boxes (also called (n, m)-functions) relied on DPA attacks. We show that these properties are opposite to the non-linearity criterion and to the propagation criterion. To quantify the resistance of an S-box to DPA atta...

متن کامل

Multilevel Input Ring-Tcm Coding Scheme: a Method for Generating High-Rate Codes

The capability of multilevel input ring-TCM coding scheme for generating high-rate codes with improved symbol Hamming and squared Euclidean distances is demonstrated. The existence of uniform codes and the decoder complexity are also considered.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010