Highly Nonlinear Balanced S-Boxes With Good Differential Properties

被引:38
作者
Zhang, WeiGuo [1 ,2 ]
Pasalic, Enes [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Univ Primorska, FAMNIT, Koper 6104, Slovenia
基金
中国国家自然科学基金;
关键词
S-boxes; bent functions; differential properties; maximum-length sequences; substitution permutation networks; Feistel networks;
D O I
10.1109/TIT.2014.2360880
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Substitution boxes (S-boxes) play a central role in the modern design of iterative block ciphers. While in substitution-permutation networks the S-boxes are bijective, thus ensuring the invertibility of the encryption algorithm, the property of being bijective is not mandatory for Feistel kind of networks. In this paper, two methods of constructing highly nonlinear balanced S-boxes (whose nonlinearity > 2(n-1) - 2(n/2) is better than the nonlinearity of the commonly used inverse S-box) with good algebraic and differential properties are given. The first method employs two vectorial Boolean functions from the Maiorana-McFarland class that need to fulfill certain conditions. In particular, these conditions are shown to be satisfied by maximum length sequences. The second method is based on a suitable modification of a certain class of vectorial bent functions. The differential properties of these boxes, measured as a deviation from an optimal uniform distribution, also appear to be better than those of the inverse S-box. Both methods are susceptible to further optimizations of the relevant cryptographic parameters due to the underlying design ideas.
引用
收藏
页码:7970 / 7979
页数:10
相关论文
共 15 条
[1]  
[Anonymous], 1978, The Theory of Error-Correcting Codes
[2]   On almost perfect nonlinear functions over F2n [J].
Berger, Thierry P. ;
Canteaut, Anne ;
Charpin, Pascale ;
Laigle-Chapuy, Yann .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (09) :4160-4170
[3]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[4]  
Chabaud F., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P356, DOI 10.1007/BFb0053450
[5]  
Dillon J., 1974, THESIS U MARYLAND MD
[6]   Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity [J].
Khoo, Khoongming ;
Lim, Chu-Wee ;
Gong, Guang .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2008, 19 (04) :323-338
[7]  
Leander G, 2007, LECT NOTES COMPUT SC, V4593, P196
[8]  
Matsui M., 1993, Advances in Cryptology, V765, P386, DOI [DOI 10.1007/3-540-48285-7, 10.1007/3-540-48285-733, DOI 10.1007/3-540-48285-733]
[9]  
MEIER W, 1990, LECT NOTES COMPUT SC, V434, P549
[10]   Vectorial Hyperbent Trace Functions From the PSap Class-Their Exact Number and Specification [J].
Muratovic-Ribic, Amela ;
Pasalic, Enes ;
Ribic, Samir .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (07) :4408-4413