Non-existence of Certain Quadratic S-boxes and Two Bounds on Nonlinear Characteristics of General S-boxes

نویسندگان

  • Xian-Mo Zhang
  • Yuliang Zheng
چکیده

Due to the success of diierential and linear attacks on a large number of encryption algorithms, it is important to investigate relationships among the various cryptographic, including diierential and linear, characteristics of an S-box (substitution box). After discussing a precise relationship among three tables, namely the diierence, auto-correlation and correlation immunity distribution tables, of an S-box, we develop a number of results on various properties of S-boxes. These results include: (1) an interesting equivalence relationship between a regular (balanced) S-box and a tight lower bound on the sum of elements in the leftmost column of its diierential distribution table, (2) a proof for the nonexistence of quadratic S-boxes with a uniformly half-occupied diierence distribution table for the case of n > = 2m?1. This serves as a piece of evidence that further supports an important and unproven conjecture, namely, for all n > m, there exist no n m S-boxes with a uniformly half-occupied diierence distribution table. Prior to this work, the best known result that supports the conjecture is that there exist no quadratic S-boxes with a uniformly half-occupied diierence distribution table if n or m is even, (3) a non-trivial and tight lower bound on the diierential uniformity of an S-box, and (4) two upper bounds on the nonlinearity of S-boxes (one for a general, not necessarily regular, S-box and the other for a regular S-box).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differentially 4-uniform bijections by permuting the inverse function

Block ciphers use Substitution boxes (S-boxes) to create confusion into the cryptosystems. Functions used as S-boxes should have low differential uniformity, high nonlinearity and algebraic degree larger than 3 (preferably strictly larger). They should be fastly computable; from this viewpoint, it is better when they are in even number of variables. In addition, the functions should be bijectio...

متن کامل

Relationships Among Nonlinear Criteria (Extended Abstract)

An important question in designing cryptographic functions including substitution boxes (S-boxes) is the relationships among the various nonlinearity criteria each of which indicates the strength or weakness of a cryptographic function against a particular type of cryptanalytic attacks. In this paper we reveal, for the rst time, interesting connections among the strict avalanche characteristics...

متن کامل

The nonhomomorphicity of S-boxes

In this paper we introduce the concept of kth order nonho momorphicity of mappings or S boxes as an alternative indicator that forecasts nonlinearity characteristics of an S box where k is even Main results of this paper include we show that nonhomomorphicity especially the th order nonhomomorphicity can be precisely expressed by using other important nonlinear indicators of an S box we estab l...

متن کامل

Relating Differential Distribution Tables to Other Properties of of Substitution Boxes

Due to the success of differential and linear attacks on a large number of encryption algorithms, it is important to investigate relationships among various cryptographic, including differential and linear, characteristics of an S-box (substitution box). After discussing a precise relationship among three tables, namely the difference, auto-correlation and correlation immunity distribution tabl...

متن کامل

On the Diiculty of Constructing C R Y P T Ographically Strong S U Bstitution Boxes

Two signi cant recent advances in cryptanalysis namely the di erential at tack put forward by Biham and Shamir BS and the linear attack by Matsui Mat a Mat b have had devastating impact on data encryption algorithms An eminent prob lem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007