Anomalies and Vector Space Search: Tools for S-Box Analysis

被引:8
作者
Bonnetain, Xavier [1 ,2 ]
Perrin, Leo [1 ]
Tian, Shizhu [1 ,3 ,4 ]
机构
[1] INRIA, Paris, France
[2] Sorbonne Univ, Coll Doctoral, Paris, France
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I | 2019年 / 11921卷
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
S-box; Vector space search; BCT; Shannon effect; Anomaly; Boolean functions; DIFFERENTIAL CRYPTANALYSIS; AFFINE EQUIVALENCE;
D O I
10.1007/978-3-030-34578-5_8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
S-boxes are functions with an input so small that the simplest way to specify them is their lookup table (LUT). How can we quantify the distance between the behavior of a given S-box and that of an S-box picked uniformly at random? To answer this question, we introduce various "anomalies". These real numbers are such that a property with an anomaly equal to a should be found roughly once in a set of 2(a) random S-boxes. First, we present statistical anomalies based on the distribution of the coefficients in the difference distribution table, linear approximation table, and for the first time, the boomerang connectivity table. We then count the number of S-boxes that have block-cipher like structures to estimate the anomaly associated to those. In order to recover these structures, we show that the most general tool for decomposing S-boxes is an algorithm efficiently listing all the vector spaces of a given dimension contained in a given set, and we present such an algorithm. Combining these approaches, we conclude that all permutations that are actually picked uniformly at random always have essentially the same cryptographic properties and the same lack of structure.
引用
收藏
页码:196 / 223
页数:28
相关论文
共 41 条
[1]  
Advanced Encryption Standard (AES), 2001, FIPS PUB 197
[2]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V547, P1
[3]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[4]  
Bioconvert Developers, 2017, BIOC
[5]  
Biryukov Alex, 2016, Selected Areas in Cryptography - SAC 2015. 22nd International Conference. Revised Selected Papers: LNCS 9566, P102, DOI 10.1007/978-3-319-31301-6_6
[6]  
Biryukov A, 2003, LECT NOTES COMPUT SC, V2656, P33
[7]  
Biryukov A, 2001, LECT NOTES COMPUT SC, V2045, P394
[8]   Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 [J].
Biryukov, Alex ;
Perrin, Leo ;
Udovenko, Aleksei .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 :372-402
[9]   On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure [J].
Biryukov, Alex ;
Perrin, Leo .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :116-140
[10]   Differential Properties of x bar right arrow x2t-1 [J].
Blondeau, Celine ;
Canteaut, Anne ;
Charpin, Pascale .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (12) :8127-8137