On cross-correlation properties of S-boxes and their design using semi-bent functions

نویسندگان

  • Enes Pasalic
  • Samed Bajric
  • Milan Djordjevic
چکیده

In this paper, several methods for constructing substitution boxes (S-boxes) with good cross-correlation properties are proposed. We firstly analyze the cross-correlation properties of bent functions and derive a sufficient condition that the absolute indicator f ,g of two bent functions f and g achieve its lowest possible value 2 n/2. More precisely, it is sufficient that f + g is also a bent function, which then implies that the absolute indicator of vectorial bent functions equals to 2n/2. This indicates an erroneous conclusion in by Zhou et al., claiming that if f is bent, then f ,g = 2 n/2 if and only if g is an affine function, which is not true. Furthermore, because of a strong relationship between the cross-correlation properties and disjoint spectra semi-bent functions, two classes of highly nonlinear vectorial semi-bent functions with very good cross-correlation properties are proposed. In particular, the first class of vectorial semi-bent functions introduced here compares favorably to other methods in terms of the cross-correlation properties of its component functions. In addition, 1. A sufficient condition that the absolute indicator of two bent functions achieves its lowest value is derived. 2. A construction of S-boxes with good auto-correlation properties from vectorial bent functions is given. 3. Two classes of nonlinear vectorial semi-bent functions with good auto-correlation properties are proposed. Copyright © 2014 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Around bent and semi-bent quadratic Boolean functions

The maximum length sequences, also called m-sequences, have received a lot of attention since the late sixties. In terms of LFSR synthesis they are usually generated by certain power polynomials over finite field and in addition characterized by a low cross correlation and high nonlinearity. We say that such sequence is generated by a semi-bent function. Some new families of such function, repr...

متن کامل

On Application of Neural Networks for S-Boxes Design

In the paper a new schedule of S-boxes design is considered. We start from motivation from block cipher practice. Then, the most popular S-box design criteria are presented, especially a possibility of application of Boolean bent-functions. Finally, we propose integrating neural networks (playing a role of Boolean functions with appropriate properties) in the design process.

متن کامل

Designing S-boxes for Ciphers Resistant to Differential Cryptanalysis

This paper examines recent work in the area of bent-function-based substitution boxes in order to refine the relationship between s-box construction and immunity to the differential cryptanalysis attack described by Biham and Shamir. It is concluded that m n × s-boxes, m n < , which are partially bent-function-based are the most appropriate choice for private-key cryptosystems constructed as su...

متن کامل

"Provable" Security against Differential and Linear Cryptanalysis

In this invited talk, a brief survey on the developments of countermeasures against differential and linear cryptanalysis methods is presented. 1 Nonlinearity of S-boxes Throughout the eighties the unpublished design criteria of the DES had inspired various authors to invent formal nonlinearity criteria for S-boxes such as the strict avalanche criterion [30] and the propagation criterion [27]. ...

متن کامل

A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials

Boolean functions used in cryptosystems are required to have good cryptographic properties, such as balancedness, high nonlinearity and high algebraic degree, to ensure the systems are resistant against linear cryptanalysis ([2]). Besides, it is a desirable property that a Boolean function has 3-valued spectra. This property provides a protection against the soft output joint attack ([3]). A fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015