Pitfalls in Designing Substitution Boxes

نویسندگان

  • Jennifer Seberry
  • Xian-Mo Zhang
  • Yuliang Zheng
چکیده

Two signi cant recent advances in cryptanalysis namely the di erential attack put for ward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this paper we present evidence indicating that there are many pitfalls on the road to achieve the goal In particular we show that certain types of S boxes which are seemly very appealing do not exist We also show that contrary to previous per ception techniques such as chopping or repeating permutations do not yield cryptographically strong S boxes In addition we reveal an important combinatorial structure associated with certain quadratic permutations namely the di erence distribution table of each di erentially uniform quadratic permutation embodies a Hadamard matrix As an application of this result we show that chopping a di erentially uniform quadratic permutation results in an S box that is very prone to the di erential cryptanalytic attack

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pitfalls in Designing Substitution Boxes (Extended Abstract)

Two signi cant recent advances in cryptanalysis namely the di erential attack put forward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that em ploys the S boxes is immune to the attacks In this paper we present...

متن کامل

Designing Against the 'Overdefined System of Equations' Attack

Recently, Courtois and Pieprzyk proposed an attack on symmetric ciphers that takes advantage of a previously-unexploited property of substitution boxes, or s-boxes, in the round function. This paper gives a brief overview of this “overdefined system of equations” attack and shows how the attack may be avoided through the use of round functions that contain a variety of protection mechanisms, in...

متن کامل

Designing S-boxes through Evolutionary Computation

Substitution boxes (S-boxes) are of major importance in cryptography as they are used to provide the property of confusion to the corresponding cryptosystem. Thus, a great amount of research is devoted to their study. In this contribution, a new methodology for designing strong S-boxes is studied and two Evolutionary Computation methods, the Particle Swarm Optimization and the Differential Evol...

متن کامل

Designing S-boxes for Ciphers Resistant to Differential Cryptanalysis

This paper examines recent work in the area of bent-function-based substitution boxes in order to refine the relationship between s-box construction and immunity to the differential cryptanalysis attack described by Biham and Shamir. It is concluded that m n × s-boxes, m n < , which are partially bent-function-based are the most appropriate choice for private-key cryptosystems constructed as su...

متن کامل

On the Difficulty of Constructing Cryptographically Strong Substitution Boxes

Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994