On the Diiculty of Constructing Cryptographically Strong Substitution Boxes 1 Basic Deenitions

نویسندگان

  • Xian-Mo Zhang
  • Yuliang Zheng
چکیده

Two signiicant recent advances in cryptanalysis, namely the diierential attack put forward by Biham and Shamir BS91] and the linear attack by Matsui Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attacks. In this paper we present evidence indicating that there are many pitfalls on the road to achieve the goal. In particular, we show that certain types of S-boxes which are seemingly very appealing do not exist. We also show that, contrary to previous perception, techniques such as chopping or repeating permutations do not yield cryptographically strong S-boxes. In addition, we reveal an important combinatorial structure associated with certain quadratic permutations, namely, the diierence distribution table of each diierentially 2-uniform quadratic permutation embodies a Hadamard matrix. As an application of this result, we show that chopping a diierentially 2-uniform quadratic permutation results in an S-box that is very prone to the diierential cryptanalytic attack. Denote by V n the vector space of n tuples of elements from GF(2). Let = (a 1 ; : : :; a n) and = (b 1 ; : : :; b n) be two vectors in V n. The scalar product of and , denoted by h; i, is deened by h; i = a 1 b 1 a n b n , where multiplication and addition are over GF(2). In this paper we consider Boolean functions from V n to GF(2) (or simply functions on V n). Let f be a function on V n. 1). f is said to be balanced if its truth table has 2 n?1 zeros (ones), and quadratic if its algebraic degree is 2. An aane function f on V n is a function that takes the form of f = a 1 x 1 a n x n c, where a j ; c 2 GF(2), j = 1; 2; : : :; n. Furthermore f is called a linear function if c = 0. The sequence of an aane (or linear) function is called an aane (or linear) sequence. A (1; ?1)-matrix H of order m is called a Hadamard matrix if HH t = mI m , where H t is the transpose of H and I m is the identity matrix of order m. …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Bijective S-box Design

Vectorial Boolean functions are usually called Substitution Boxes (S-Boxes) and are used as basic component of block ciphers in Cryptography. The ciphers that are Substitution-permutation networks use bijective S-Boxes i.e., Boolean permutations. S-Boxes with low differential uniformity and high nonlinearity are considered as cryptographically strong. In this paper we study some properties of S...

متن کامل

On the Diiculty of Constructing C R Y P T Ographically Strong S U Bstitution Boxes

Two signi cant recent advances in cryptanalysis namely the di erential at tack put forward by Biham and Shamir BS and the linear attack by Matsui Mat a Mat b have had devastating impact on data encryption algorithms An eminent prob lem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this ...

متن کامل

On the Difficulty of Constructing Cryptographically Strong Substitution Boxes

Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attack...

متن کامل

Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication

Substitution boxes with thorough cryptographic strengths are essential for the development of strong encryption systems. They are the only portions capable of inducing nonlinearity in symmetric encryption systems. Bijective substitution boxes having both high nonlinearities and high algebraic complexities are the most desirable to thwart linear, differential and algebraic attacks. In this paper...

متن کامل

A Novel Approach for Designing Dynamical S-Boxes Using Hyperchaotic System

In the information security field, the substitution boxes (S-boxes) have been extensively used in many cryptographic systems. This paper presents a novel approach for generating dynamically cryptographically S-boxes using a four-dimensional hyperchaotic Lorenz system. Within the algorithm, the initial condition is employed to drive the hyper-chaotic system to generate a chaotic sequence which i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996