On the Diiculty of Constructing C R Y P T Ographically Strong S U Bstitution Boxes

نویسندگان

  • Xian Mo Zhang
  • Yuliang Zheng
چکیده

Two signi cant recent advances in cryptanalysis namely the di erential at tack put forward by Biham and Shamir BS and the linear attack by Matsui Mat a Mat b have had devastating impact on data encryption algorithms An eminent prob lem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this paper we present evidence indicating that there are many pitfalls on the road to achieve the goal In particular we show that certain types of S boxes which are seemingly very ap pealing do not exist We also show that contrary to previous perception techniques such as chopping or repeating permutations do not yield cryptographically strong S boxes In addition we reveal an important combinatorial structure associated with certain quadratic permutations namely the di erence distribution table of each di erentially uniform quadratic permutation embodies a Hadamard matrix As an application of this result we show that chopping a di erentially uniform quadratic permutation results in an S box that is very prone to the di erential cryptanalytic attack

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Amitraz Poisoning; A case study

A m i t r a z, a n i ns e c t i c i d e /a ca ri c i de of the f o r m a m i d i n e p e st i c i d e s group, is a ? 2 a d r e n e r g i c ag on i st a nd of t he a m i d i ne c h e m i ca l f a m il y generally us e d to c o n t r ol animal e c top a r a s i t e s. Poisoning due to am i t r a z i s r a r e and character...

متن کامل

On the Diiculty of Constructing Cryptographically Strong Substitution Boxes 1 Basic Deenitions

Two signiicant recent advances in cryptanalysis, namely the diierential attack put forward by Biham and Shamir BS91] and the linear attack by Matsui Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attacks....

متن کامل

Pitch Contour Generation In Speech Synthesis: A Junction Grammar Approach

SUMMARY Computer based t e x t s y n t h e s i s systems r e q u i r e a means f o r generating s e n t e n c e-l e v e l p i t c h c o n t o u r s-These c o n t o u r s must have a k e r t a i n d e g r e e o f "human f i d e l i t y " i f t h e s y n t h e t i c speech i s t o sound n a t u r a l and n o t t o o machine-like. The p i t c h contowrs i n c u t r e n t l y-o p e r a t i o n a l ...

متن کامل

تاثیر مرکزی هیستامین بر درد فرمالینی در خرگوش: نقش سیستم اپیوئیدی

.yiU s1 r qdJ 9 6!r.1 l,-r,iU 61 r,r1.11 ;oal il go,-7^19 ai f * *,-) S '*{'?'J*'fL' t:::tc: l/'2f /2 g.6;gb.t e*)* +r-,JifF.'L!.p"i9 r:.",ii:oul9+ 'Fft s ;J"r.pbjr;^*f- $ J9b +9 ll o;lr"iJ$!l odjUll Jt'56rlr2lr.! :rti9, ,(Jt;5) O*Jt"Jt i,;;ia.rJ1.pll oQr.i; nlCel ."r95f a+1,,r-..;ta 4..59L*yrtirlrcrbtUg i*r..p.259Fl'tfA,lflA.;lLirl,r6ek- 5r crrt!"rlr (efs.s..o' ) o*:..i1 Ji (.fsfefa),-;...

متن کامل

مطالعه میکروبیولوژیک و کلینیکال پاتولوژیک تورم مفصل عفونی در گاو

.r!r5! &tL,"1ei;r.r.laL 61b 4ittq J5r.lsol.,J.'i s!)t :!eaA .e6 .uthiauutY:.7tb 'pJt-96o"L f 9 s* ;;taafu 9S o"ttV :oUles 1r pJt"96a.r! fA9 c{;r'i4Jy,i"rrSr"'t, ttV 'JdL AJ" ,51o*9; :rta9t ,JFli,.,.:.15 lq,Jlt slsi. eJ.,:,:5 . Sd'aref6lal.il.;bl.5bo6;ti'i5 9 J*.5bc,,U. it9 6ta$ ota;.i.. $pt29l ll1^x9 tbtey?95.io,li .gbJ9al5 sl*r; . d elftl !h* 9 y'Lr "5b," I ),,la.l.a p]r" gr.rf .r#S"...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006