A Search Strategy to Optimize the Affine Variant Properties of S-Boxes

被引:2
|
作者
Picek, Stjepan [1 ]
Yang, Bohan [1 ]
Mentens, Nele [1 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC & IMinds, Kasteelpk Arenberg 10, B-3001 Leuven, Belgium
来源
ARITHMETIC OF FINITE FIELDS, WAIFI 2016 | 2016年 / 10064卷
关键词
CRYPTANALYSIS;
D O I
10.1007/978-3-319-55227-9_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Affine transformations are an often used tool in symmetric key cryptography. They are mostly known as a way of removing fixed points in S-boxes, as for instance in the AES S-box. In general, affine transformations do not have an influence on most cryptographic properties, since those properties are affine invariant; affine transformations only change the representation of the S-box. Because of that, there is not much research on what would be the best affine transformation in terms of usability in practical scenarios. With this research, we try to close that gap; we concentrate on several cryptographic properties and one implementation property that are variable under various affine transformations. To provide experimental validations, we concentrate on affine transformations in S-boxes of three sizes, namely, 4x4, 5x5, and 8x8. Our results indicate that it is possible to optimize one or more of the considered properties. Finally, although we experiment with only a handful of properties, our methodology is of a general nature and could be used for other cryptographic properties that are affine variant.
引用
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [1] Affine equivalence in S-boxes
    Sakalli, M. Tolga
    Bulus, Ercan
    Sahin, Andac
    Buyuksaracogcu, Fatma
    2006 IEEE 14TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1 AND 2, 2006, : 45 - +
  • [2] S8 affine-power-affine S-boxes and their applications
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    Mahmood, Hasan
    NEURAL COMPUTING & APPLICATIONS, 2012, 21 : S377 - S383
  • [3] S8 affine-power-affine S-boxes and their applications
    Iqtadar Hussain
    Tariq Shah
    Muhammad Asif Gondal
    Hasan Mahmood
    Neural Computing and Applications, 2012, 21 : 377 - 383
  • [4] An effective evolutionary strategy for bijective S-boxes
    Chen, H
    Feng, DG
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2120 - 2123
  • [5] Generation of AES like S-boxes by Replacing Affine Matrix
    Waqas, Umer
    Afzal, Shazia
    Mir, Mubeen Akhtar
    Yousaf, Muhammad
    PROCEEDINGS OF 2014 12TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY, 2014, : 159 - 164
  • [6] S-Boxes Based on Affine Mapping and Orbit of Power Function
    Khan, Mubashar
    Azam, Naveed Ahmed
    3D RESEARCH, 2015, 6 (02):
  • [7] Properties of S-boxes and the strength of DES
    Wang, Shichang
    Lu, Huaming
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 1997, 37 (01): : 49 - 52
  • [8] A Search for Additional Structure: The Case of Cryptographic S-boxes
    Carlet, Claude
    Djurasevic, Marko
    Jakobovic, Domagoj
    Picek, Stjepan
    PARALLEL PROBLEM SOLVING FROM NATURE - PPSN XVI, PT II, 2020, 12270 : 343 - 356
  • [9] Method to Improve the Cryptographic Properties of S-Boxes
    Aboytes-Gonzalez, Jesus Agustin
    Soubervielle-Montalvo, Carlos
    Campos-Canton, Isaac
    Perez-Cham, Oscar Ernesto
    Ramirez-Torres, Marco Tulio
    IEEE ACCESS, 2023, 11 : 99546 - 99557
  • [10] On statistical properties of S-boxes in block ciphers
    Hua, C
    Wu, CK
    Feng, DG
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (04): : 584 - 587