On the Difficulty of Constructing Cryptographically Strong Substitution Boxes
نویسندگان
چکیده
Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attacks. In this paper we present evidence indicating that there are many pitfalls on the road to achieve the goal. In particular, we show that certain types of S-boxes which are seemingly very appealing do not exist. We also show that, contrary to previous perception, techniques such as chopping or repeating permutations do not yield cryptographically strong S-boxes. In addition, we reveal an important combinatorial structure associated with certain quadratic permutations, namely, the di erence distribution table of each di erentially 2-uniform quadratic permutation embodies a Hadamard matrix. As an application of this result, we show that chopping a di erentially 2-uniform quadratic permutation results in an S-box that is very prone to the di erential cryptanalytic attack.
منابع مشابه
Practical Bijective S-box Design
Vectorial Boolean functions are usually called Substitution Boxes (S-Boxes) and are used as basic component of block ciphers in Cryptography. The ciphers that are Substitution-permutation networks use bijective S-Boxes i.e., Boolean permutations. S-Boxes with low differential uniformity and high nonlinearity are considered as cryptographically strong. In this paper we study some properties of S...
متن کاملRotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication
Substitution boxes with thorough cryptographic strengths are essential for the development of strong encryption systems. They are the only portions capable of inducing nonlinearity in symmetric encryption systems. Bijective substitution boxes having both high nonlinearities and high algebraic complexities are the most desirable to thwart linear, differential and algebraic attacks. In this paper...
متن کاملOn the Diiculty of Constructing C R Y P T Ographically Strong S U Bstitution Boxes
Two signi cant recent advances in cryptanalysis namely the di erential at tack put forward by Biham and Shamir BS and the linear attack by Matsui Mat a Mat b have had devastating impact on data encryption algorithms An eminent prob lem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this ...
متن کاملA Novel Approach for Designing Dynamical S-Boxes Using Hyperchaotic System
In the information security field, the substitution boxes (S-boxes) have been extensively used in many cryptographic systems. This paper presents a novel approach for generating dynamically cryptographically S-boxes using a four-dimensional hyperchaotic Lorenz system. Within the algorithm, the initial condition is employed to drive the hyper-chaotic system to generate a chaotic sequence which i...
متن کاملOn the Diiculty of Constructing Cryptographically Strong Substitution Boxes 1 Basic Deenitions
Two signiicant recent advances in cryptanalysis, namely the diierential attack put forward by Biham and Shamir BS91] and the linear attack by Matsui Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attacks....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. UCS
دوره 2 شماره
صفحات -
تاریخ انتشار 1996