Reconstructing S-Boxes from Cryptographic Tables with Milp

被引:0
|
作者
Rohit, Raghvendra [1 ]
Sarkar, Sumanta [2 ]
机构
[1] Technol Innovat Inst, Cryptog Res Ctr, Abu Dhabi, U Arab Emirates
[2] Univ Warwick, Coventry, England
基金
英国工程与自然科学研究理事会;
关键词
Substitution box; Difference Distribution Table (DDT); Linear Approximation Table (LAT); Differential-Linear Connectivity Table (DLCT); Boomerang Connectivity Table (BCT); Mixed Integer Linear Programming (MILP); LINEAR LAYERS; CUBE-ATTACK; BOOMERANGS;
D O I
10.46586/tosc.v2024.i3.200-237
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Reconstructing an S-box from a cryptographic table such as difference distribution table (DDT), DDT ), linear approximation table (LAT), LAT ), differential-linear connectivity table ( DLCT ) or boomerang connectivity table ( BCT ) is one of the fundamental problems in symmetric-key cryptography. Till now, there are only very few known methods which can reconstruct an S-box from a given table: guess-and-determine algorithms of Boura et al. (DCC 2019) and Tian et al. (DCC 2020), sign determination algorithm of Dunkelman et al. (ToSC 2019) and STP based approach of Lu et al. (DCC 2022). In this paper we consider the reconstruction problem in an even more challenging setup where one needs to reconstruct S-boxes from a partial cryptographic table. We are able to reconstruct S-boxes when only a few number of rows of a cryptographic table is given. This problem has never been studied in the literature. We apply mixed integer linear programming (MILP) as the key tool for solving this problem. Needless to say that we can solve the reconstruction problem when the full table is given and this is the first ever application of MILP tool in solving such fundamental problems. As a further application of our method, we provide the generic MILP models which can search for S-boxes with a given cryptographic property such as differential uniformity, linearity, differential-linear uniformity or boomerang uniformity. Additionally, our method can recover a Boolean function from a given Walsh spectrum or a Boolean function with a given nonlinearity. We also introduce a new heuristic called Optimistic MILP objective that guides the model towards obtaining multiple S-boxes or Boolean functions with the same cryptographic property. We give detailed experimental results for up to 6-bit S-boxes showing the effectiveness of our technique.
引用
收藏
页码:200 / 237
页数:38
相关论文
共 50 条
  • [1] S-boxes Cryptographic Properties from a Statistical Angle
    Grocholewska-Czurylo, Anna
    HARD AND SOFT COMPUTING FOR ARTIFICIAL INTELLIGENCE, MULTIMEDIA AND SECURITY, 2017, 534 : 133 - 145
  • [2] A CRYPTOGRAPHIC STUDY ON S-BOXES OF DES TYPE Ⅲ
    YANG Junhui (Computing Center of Academia Sinica
    SystemsScienceandMathematicalSciences, 1992, (01) : 27 - 32
  • [3] Method to Improve the Cryptographic Properties of S-Boxes
    Aboytes-Gonzalez, Jesus Agustin
    Soubervielle-Montalvo, Carlos
    Campos-Canton, Isaac
    Perez-Cham, Oscar Ernesto
    Ramirez-Torres, Marco Tulio
    IEEE ACCESS, 2023, 11 : 99546 - 99557
  • [4] Construction of S-boxes with some cryptographic properties
    Liu, Xiao-Chen
    Feng, Deng-Guo
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1299 - 1302
  • [5] Generating Cryptographic S-Boxes Using the Reinforcement Learning
    Kim, Giyoon
    Kim, Hangi
    Heo, Yeachan
    Jeon, Yongjin
    Kim, Jongsung
    IEEE ACCESS, 2021, 9 : 83092 - 83104
  • [6] A Search for Additional Structure: The Case of Cryptographic S-boxes
    Carlet, Claude
    Djurasevic, Marko
    Jakobovic, Domagoj
    Picek, Stjepan
    PARALLEL PROBLEM SOLVING FROM NATURE - PPSN XVI, PT II, 2020, 12270 : 343 - 356
  • [7] Effective algorithm for improving cryptographic properties of bijective S-boxes
    Chen, Hua
    Feng, Deng-Guo
    Wu, Wen-Ling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (08): : 1410 - 1414
  • [8] A New Cryptographic Analysis of 4-bit S-Boxes
    Cheng, Ling
    Zhang, Wentao
    Xiang, Zejun
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 144 - 164
  • [9] Improved algorithms in parallel evaluation of large cryptographic S-boxes
    Khadem, Behrooz
    Ghasemi, Reza
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2020, 35 (04) : 461 - 472
  • [10] A CRYPTOGRAPHIC STUDY ON S—BOXES OF DES TYPE Ⅰ AN INTEGRATED ANALYSIS OF THE DESIGN CRITERIA FOR S-BOXES
    杨君辉
    戴宗铎
    曾肯成
    Systems Science and Mathematical Sciences, 1991, (02) : 104 - 110