A New Criterion for the Design of 8 8 S-boxes in Private-key Ciphers
نویسندگان
چکیده
In this paper, we examine the security of the class of substitution-permutation private-key block ciphers with respect to linear and diierential crypt-analysis. A new S-box nonlinearity criterion is proposed and it is shown that S-boxes satisfying this criterion and having good diiusion improve remarkably the ability of an SPN to resist linear cryptanalysis and diierential cryptanalysis.
منابع مشابه
Practical Bijective S-box Design
Vectorial Boolean functions are usually called Substitution Boxes (S-Boxes) and are used as basic component of block ciphers in Cryptography. The ciphers that are Substitution-permutation networks use bijective S-Boxes i.e., Boolean permutations. S-Boxes with low differential uniformity and high nonlinearity are considered as cryptographically strong. In this paper we study some properties of S...
متن کاملRandomness analysis and generation of key-derived s-boxes
Although many ciphers use fixed, close to ideal, s-boxes (like AES e.g.), random s-boxes offer an interesting alternative since they have no underlying structure that can be exploited in cryptanalysis. For this reason, some cryptosystems generate pseudorandom s-boxes as a function of the key (key-derived). We analyse the randomness properties of key-derived s-boxes generated by some popular cry...
متن کاملCryptanalysis of Rijmen-Preneel Trapdoor Ciphers
Rijmen and Preneel recently proposed for the first time a family of trapdoor block ciphers [8]. In this family of ciphers, a trapdoor is hidden in S-boxes and is claimed to be undetectable in [8] for properly chosen parameters. Given the trapdoor, the secret key (used for encryption and decryption) can be recovered easily by applying Matsui’s linear cryptanalysis [6]. In this paper, we break th...
متن کاملHermes8 : A Low-Complexity Low-Power Stream Cipher
Since stream ciphers have the reputation to be inefficient in software applications the new stream cipher Hermes8F has been developed. It is based on a 8-bit-architecture and an algorithm with low complexity. The two versions presented here are Hermes8F-80 with 17 byte state and 10 byte key and furthermore Hermes8F-128 with 17 byte state and 16 byte key. Both are suited to run efficiently on 8-...
متن کاملDesigning S-boxes for Ciphers Resistant to Differential Cryptanalysis
This paper examines recent work in the area of bent-function-based substitution boxes in order to refine the relationship between s-box construction and immunity to the differential cryptanalysis attack described by Biham and Shamir. It is concluded that m n × s-boxes, m n < , which are partially bent-function-based are the most appropriate choice for private-key cryptosystems constructed as su...
متن کامل