Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes
S-boxes are used in cryptography in order to provide non-linearity in the design of cryptographic primitives such as block ciphers and hash functions. Some cryptographic primitives use bijective S-boxes as in the Advanced Encryption Standard (AES), and others use surjective S-boxes as in the Data En...
Saved in:
Published in | 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) pp. 447 - 454 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
Infonomics Society
01.12.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | S-boxes are used in cryptography in order to provide non-linearity in the design of cryptographic primitives such as block ciphers and hash functions. Some cryptographic primitives use bijective S-boxes as in the Advanced Encryption Standard (AES), and others use surjective S-boxes as in the Data Encryption Standard (DES). That is, S-boxes can have inputs and outputs of the same length as in the (8,8)-S-box of AES, or alternatively the input length can be larger than the output as in the (6, 4)-S-boxes of DES. In this paper, we perform a statistical study of linear and differential properties of randomly generated (n, m)-S-boxes, where m ≤ n. We show that certain S-boxes with well-behaved linear and differential properties can be feasibly obtained via random search. We show further that certain types of S-boxes with specific desirable linear and differential properties are improbable. |
---|---|
AbstractList | S-boxes are used in cryptography in order to provide non-linearity in the design of cryptographic primitives such as block ciphers and hash functions. Some cryptographic primitives use bijective S-boxes as in the Advanced Encryption Standard (AES), and others use surjective S-boxes as in the Data Encryption Standard (DES). That is, S-boxes can have inputs and outputs of the same length as in the (8,8)-S-box of AES, or alternatively the input length can be larger than the output as in the (6, 4)-S-boxes of DES. In this paper, we perform a statistical study of linear and differential properties of randomly generated (n, m)-S-boxes, where m ≤ n. We show that certain S-boxes with well-behaved linear and differential properties can be feasibly obtained via random search. We show further that certain types of S-boxes with specific desirable linear and differential properties are improbable. |
Author | Alsalami, Y. Martin, T. Khonji, M. Yeun, C. Y. |
Author_xml | – sequence: 1 givenname: Y. surname: Alsalami fullname: Alsalami, Y. organization: Electr. & Comput. Eng., Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, United Arab Emirates – sequence: 2 givenname: C. Y. surname: Yeun fullname: Yeun, C. Y. organization: Electr. & Comput. Eng., Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, United Arab Emirates – sequence: 3 givenname: T. surname: Martin fullname: Martin, T. organization: Electr. & Comput. Eng., Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, United Arab Emirates – sequence: 4 givenname: M. surname: Khonji fullname: Khonji, M. organization: Electr. Eng. & Comput. Sci., Masdar Inst. of Sci. & Technol., Abu Dhabi, United Arab Emirates |
BookMark | eNotj8tKxDAUQCMo6IzzBbPJUsHUm5v0kaUUH5WCi6nrIdPkQqRNh6YLx69XcFZnczhwVuwyTtEztpWQSQnmsambbtdlCLLIyiovylxesJU0UCmEUpXXbJPSFwBIU1QS8Ya9tyF6O3MbHXeByM8-LsEOvJ9Px8VGO5xSSHwinkY7DCKFH-_4_KdPI7-LD3y8FztxmL59umVXZIfkN2eu2efLc1e_ifbjtamfWhEQYRFaI_VKF4BkD2RkoUnmZEg656nHSlW9yTVBaZ3yiCbH3oEuSGkA7KVRa7b97wbv_f44h9HOp_15V_0CbR5MxQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICITST.2016.7856751 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1908320737 9781908320735 |
EndPage | 454 |
ExternalDocumentID | 7856751 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i220t-442fc34602fabf9164f15f9f1ddefc2838c954f07ad3e22952cd046f34002c193 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:44 EDT 2023 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i220t-442fc34602fabf9164f15f9f1ddefc2838c954f07ad3e22952cd046f34002c193 |
OpenAccessLink | https://e-space.mmu.ac.uk/620057/1/randomSboxes.pdf |
PageCount | 8 |
ParticipantIDs | ieee_primary_7856751 |
PublicationCentury | 2000 |
PublicationDate | 2016-Dec. |
PublicationDateYYYYMMDD | 2016-12-01 |
PublicationDate_xml | – month: 12 year: 2016 text: 2016-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) |
PublicationTitleAbbrev | ICITST |
PublicationYear | 2016 |
Publisher | Infonomics Society |
Publisher_xml | – name: Infonomics Society |
SSID | ssj0001968122 |
Score | 1.6721013 |
Snippet | S-boxes are used in cryptography in order to provide non-linearity in the design of cryptographic primitives such as block ciphers and hash functions. Some... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 447 |
SubjectTerms | Block Ciphers Cryptography Differential Cryptanalysis Encryption Linear Cryptanalysis Substitution Boxes |
Title | Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes |
URI | https://ieeexplore.ieee.org/document/7856751 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pa8IwFA7O005u07HNbeSwwwampjH9dZaJCo6BCt6k-QUybUUrbP71e2mrsrHDbiVQGpK8vu97ee99CD35wlAujUskeEPCgdUSoawkoKYKRmIAxbYaefTm96d8OPNmFdQ61sJorfPkM-3Yx_wuX6VyZ0Nl7SD0AN8C1zkLKStqtU7xlMh20mJlYyGXRu1BdzAZT2z2lu-Ub_6QUMk9SK-GRodvF4kjH84uE47c_2rL-N_JXaDGqVYPvx-90CWq6OQK1Q5iDbi03ToaAuuEU43jROGDKgpY9xLLzdcaEGLRmwSnBm9X8XJJtou9Vhg8mUpX-Dlp4dULGRORfuptA017r5Nun5RCCmTBGM0I58zIDvcpM7EwAAi5cT0TGRf-bUYCwAhl5HFDg1h1tNX3ZlIBbzYdMHAmAeJdo2qSJvoG4UgCHzFCAA0SQM2iOJTGhqJYELhxwMQtqtulma-LXhnzclXu_h5uonO7PUV6yD2qZpudfgAnn4nHfHe_AajxpkY |
link.rule.ids | 310,311,786,790,795,796,802,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na8JAEF2kPbQn22rpd_fQQwtuTNZNYs5SUatSMII3yX6BVBPRCK2_vrNJVFp66C1sCAm7mbz3NjPzEHryuLaZ0A4RgIaEgaolXBpLQGVLGImAFJtq5MHQ64xZb-JOSqi2r4VRSmXJZ8oyh9m_fJmIjdkqq_tNF_gtaJ1jwHk7yKu1DjsqgemlRYvWQnC-3m11w1Fo8rc8q7j2h4lKhiHtMhrs7p6njnxYm5RbYvurMeN_H-8MVQ_Vevh9j0PnqKTiC1Te2TXgInorqAe6E95rHMUS73xRIL7nWKy-lsAR8-4kONF4vYjmc7KebZXEgGUyWeDnuIYXL2REePKp1lU0br-GrQ4prBTIjFI7JYxRLRrMs6mOuAZKyLTj6kA78HXTAihGUwQu07YfyYYyDt9USFDOugEhTgWQvEt0FCexukI4EKBINOcghDiIsyBqCm02o6jvO5FP-TWqmKmZLvNuGdNiVm7-Hn5EJ51w0J_2u8O3W3RqlipPFrlDR-lqo-4B8lP-kK30N6CZqZw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+11th+International+Conference+for+Internet+Technology+and+Secured+Transactions+%28ICITST%29&rft.atitle=Linear+and+differential+cryptanalysis+of+small-sized+random+%28n%2C+m%29-S-boxes&rft.au=Alsalami%2C+Y.&rft.au=Yeun%2C+C.+Y.&rft.au=Martin%2C+T.&rft.au=Khonji%2C+M.&rft.date=2016-12-01&rft.pub=Infonomics+Society&rft.spage=447&rft.epage=454&rft_id=info:doi/10.1109%2FICITST.2016.7856751&rft.externalDocID=7856751 |