S8 affine-power-affine S-boxes and their applications

被引:15
作者
Hussain, Iqtadar [1 ]
Shah, Tariq [1 ]
Gondal, Muhammad Asif [2 ]
Mahmood, Hasan [3 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
[2] Natl Univ Comp & Emerging Sci, Dept Sci & Humanities, Islamabad, Pakistan
[3] Quaid I Azam Univ, Dept Elect, Islamabad, Pakistan
关键词
Nonlinearity analysis; Linear approximation; Differential approximation; Bit independence criterion; Strict avalanche criterion; Generalized majority logic criterion; Affine-power-affine structure; Advanced encryption standard;
D O I
10.1007/s00521-012-1036-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The encryption process relies on the use of nonlinear mapping subsystems to create confusion in the ciphertext. The design of these nonlinear components is a challenging task and requires complex algebraic expression for their descriptions. In an effort to increase the complexity of nonlinear mappings, several implementations exhibiting interesting properties are proposed in the literature. In particular, affine-power-affine structure is designed for advanced encryption standard, which improves the complexity of its algebraic expression by increasing the number of terms. Based on the characteristics of affine-power-affine structure, we propose a new nonlinear component that uses the symmetric group permutation S-8 on the Galois field GF(2(8)) elements and provides the possibility to incorporate 40320 unique instances. A rigorous analysis is presented to evaluate the properties of these new nonlinear components by applying nonlinearity analysis, linear approximation analysis, differential approximation analysis, bit independence criterion and strict avalanche criterion. In order to determine the suitability to various encryption applications, the S-boxes are tested with generalized majority logic criterion.
引用
收藏
页码:S377 / S383
页数:7
相关论文
共 13 条
[1]  
Ahmed W, 2011, LECT NOTES ENG COMP, P1215
[2]  
[Anonymous], 2001, FIPS197 NAT I STAND
[3]  
Cui L., 2007, INT J INNOV COMPUT I, VI 3, P45
[4]  
Ferguson N., 2001, Selected Areas in Cryptography, P103
[5]  
Hussain I., 2010, INT J CONT MATH SCI, V5, P1263
[6]   Generalized Majority Logic Criterion to Analyze the Statistical Strength of S-Boxes [J].
Hussain, Iqtadar ;
Shah, Tariq ;
Gondal, Muhammad Asif ;
Mahmood, Hasan .
ZEITSCHRIFT FUR NATURFORSCHUNG SECTION A-A JOURNAL OF PHYSICAL SCIENCES, 2012, 67 (05) :282-288
[7]  
Liu JM, 2005, 19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings, P724
[8]  
Mentens N, 2005, LECT NOTES COMPUT SC, V3376, P323
[9]  
Morioka S, 2002, LECT NOTES COMPUT SC, V2523, P172
[10]  
Murphy S, 2002, LECT NOTES COMPUT SC, V2442, P1