Extended SAC: A review and new algorithms of differential cryptanalysis of 4-bit s-boxes and strict avalanche criterion of BFs and 4-bit s-boxes again with a new extension to HO-SAC criterion

نویسندگان

  • Sankhanil Dey
  • Ranjan Ghosh
چکیده

Bitwise-Xor of two 4 bit binary numbers or 4-bit bit patterns entitled 4-bit differences carries information in Cryptography. The Method to Analyze Cryptographic cipher algorithms or 4-bit substitution boxes with 4-bit differences is known as Differential Cryptanalysis. In this paper a brief review of Differential Cryptanalysis of 4-bit bijective Crypto S-Boxes and a new algorithm to analyze them using 4-bit Boolean Functions (BFs) have been introduced. A brief review of Strict Avalanche Criterion (SAC) of 4-bit bijective Crypto S-Boxes and 4-bit BFs and two new algorithms of both the aforesaid criterions have been introduced in this paper. A New algorithm entitled extended Strict Avalanche Criterion (An Extension to Higher Order SAC or HO-SAC) has also been introduced. A new Analysis of Similarity of extended HO-SAC and Differential Cryptanalysis has also been elaborated in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extended SAC: A Review on DC and SAC of 4-bit BFs and S-Boxes and a New Algorithm on DC of S-Boxes based on Various Types of SAC including the Extended Higher Order SAC

Bitwise-Xor of two 4-bit patterns is the 4-bit difference between them which carries useful information in Cryptography. The method to analyze cryptographic ciphering algorithms or 4-bit Substitution boxes (S-boxes) with 4-bit differences is known as Differential Cryptanalysis (DC). An analysis of DC of 4-bit bijective Crypto S-boxes based on Differential Distribution Table (DDT) is reviewed in...

متن کامل

New Analysis Methods on Strict Avalanche Criterion of S-Boxes

S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers, as well as stream ciphers). S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. They are used for confusion in data security An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes eac...

متن کامل

A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion

S(ubstitution)-boxes are quite important components of modern symmetric cryptosystems. S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes each output bit with probability one half. We present some interesting properties ...

متن کامل

New Analysis Methods on Strict Avalanche Criterion of S - Boxes Phyu Phyu

S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers, as well as stream ciphers). S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. They are used for confusion in data security An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes eac...

متن کامل

A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes

4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of existence of all 4-bit linear relations, for all of 16 input and 16 output 4-bit bit patterns of 4-bit bijective crypto S-boxes said as S-boxes has been reported in Linear Cryptanalysis of 4-bit S-boxe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • PeerJ PrePrints

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2017