Pitfalls in Designing Substitution Boxes
نویسندگان
چکیده
Two signi cant recent advances in cryptanalysis namely the di erential attack put for ward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this paper we present evidence indicating that there are many pitfalls on the road to achieve the goal In particular we show that certain types of S boxes which are seemly very appealing do not exist We also show that contrary to previous per ception techniques such as chopping or repeating permutations do not yield cryptographically strong S boxes In addition we reveal an important combinatorial structure associated with certain quadratic permutations namely the di erence distribution table of each di erentially uniform quadratic permutation embodies a Hadamard matrix As an application of this result we show that chopping a di erentially uniform quadratic permutation results in an S box that is very prone to the di erential cryptanalytic attack
منابع مشابه
Pitfalls in Designing Substitution Boxes (Extended Abstract)
Two signi cant recent advances in cryptanalysis namely the di erential attack put forward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that em ploys the S boxes is immune to the attacks In this paper we present...
متن کاملDesigning Against the 'Overdefined System of Equations' Attack
Recently, Courtois and Pieprzyk proposed an attack on symmetric ciphers that takes advantage of a previously-unexploited property of substitution boxes, or s-boxes, in the round function. This paper gives a brief overview of this “overdefined system of equations” attack and shows how the attack may be avoided through the use of round functions that contain a variety of protection mechanisms, in...
متن کاملDesigning S-boxes through Evolutionary Computation
Substitution boxes (S-boxes) are of major importance in cryptography as they are used to provide the property of confusion to the corresponding cryptosystem. Thus, a great amount of research is devoted to their study. In this contribution, a new methodology for designing strong S-boxes is studied and two Evolutionary Computation methods, the Particle Swarm Optimization and the Differential Evol...
متن کاملDesigning S-boxes for Ciphers Resistant to Differential Cryptanalysis
This paper examines recent work in the area of bent-function-based substitution boxes in order to refine the relationship between s-box construction and immunity to the differential cryptanalysis attack described by Biham and Shamir. It is concluded that m n × s-boxes, m n < , which are partially bent-function-based are the most appropriate choice for private-key cryptosystems constructed as su...
متن کاملOn the Difficulty of Constructing Cryptographically Strong Substitution Boxes
Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1994