Highly Nonlinear Balanced S-Boxes With Good Differential Properties

被引:38
作者
Zhang, WeiGuo [1 ,2 ]
Pasalic, Enes [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Univ Primorska, FAMNIT, Koper 6104, Slovenia
基金
中国国家自然科学基金;
关键词
S-boxes; bent functions; differential properties; maximum-length sequences; substitution permutation networks; Feistel networks;
D O I
10.1109/TIT.2014.2360880
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Substitution boxes (S-boxes) play a central role in the modern design of iterative block ciphers. While in substitution-permutation networks the S-boxes are bijective, thus ensuring the invertibility of the encryption algorithm, the property of being bijective is not mandatory for Feistel kind of networks. In this paper, two methods of constructing highly nonlinear balanced S-boxes (whose nonlinearity > 2(n-1) - 2(n/2) is better than the nonlinearity of the commonly used inverse S-box) with good algebraic and differential properties are given. The first method employs two vectorial Boolean functions from the Maiorana-McFarland class that need to fulfill certain conditions. In particular, these conditions are shown to be satisfied by maximum length sequences. The second method is based on a suitable modification of a certain class of vectorial bent functions. The differential properties of these boxes, measured as a deviation from an optimal uniform distribution, also appear to be better than those of the inverse S-box. Both methods are susceptible to further optimizations of the relevant cryptographic parameters due to the underlying design ideas.
引用
收藏
页码:7970 / 7979
页数:10
相关论文
共 15 条
[11]   Vectorial Bent Functions from Multiple Terms Trace Functions [J].
Muratovic-Ribic, Amela ;
Pasalic, Enes ;
Bajric, Samed .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (02) :1337-1347
[12]  
NYBERG K, 1991, LECT NOTES COMPUT SC, V547, P378
[13]  
Piret Gilles, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P311, DOI 10.1007/978-3-642-31284-7_19
[14]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715
[15]   Constructions of Resilient S-Boxes With Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes [J].
Zhang, Wei-Guo ;
Pasalic, Enes .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (03) :1638-1651