Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity

Resilient substitution boxes (S-boxes) with high non-linearity are important cryptographic primitives in the design of certain encryption algorithms. There are several trade-offs between the most important cryptographic parameters and their simultaneous optimisation is regarded as a difficult task. In this study, the authors provide a construction technique to obtain resilient S-boxes with so-called strictly almost optimal non-linearity for a larger number of output bits m than previously known. This is the first time that the non-linearity bound 2 n−1 − 2 n/2 of resilient (n,m) S-boxes, where n and m denote the number of the input and output bits, respectively, has been exceeded for m>⌊n/4⌋. Thus, resilient S-boxes with extremely high non-linearity and a larger output space compared with other design methods have been obtained.

References

    1. 1)
      • 12. Zhang, W.G., Pasalic, E.: ‘Highly nonlinear balanced S-boxes with good differential properties’, IEEE Trans. Inf. Theory, 2014, 60, (12), pp. 79707979.
    2. 2)
      • 14. Zhang, W.G., Pasalic, E.: ‘Constructions of resilient S-boxes with SAO nonlinearity through disjoint linear codes’, IEEE Trans. Inf. Theory, 2014, 60, (3), pp. 16381651.
    3. 3)
      • 11. Zhang, X.M., Zheng, Y.: ‘Cryptographically resilient functions’, IEEE Trans. Inf. Theory, 1997, 43, (5), pp. 17401747.
    4. 4)
      • 1. Chor, B., Goldreich, O., Hastad, J., et al: ‘The bit extraction problem or t-resilient functions’, Proc. 26th Annu. Symp. Found. Comput. Sci., 1985, 26, pp. 396407.
    5. 5)
      • 8. Johansson, T., Pasalic, E.: ‘A construction of resilient functions with high nonlinearity’, IEEE Trans. Inf. Theory, 2003, 49, (2), pp. 494501.
    6. 6)
      • 4. Matsui, M.: ‘Linear cryptanalysis method for DES cipher’. In Helleseth, T. (ED.): Advances in cryptography-EUROCRYPT 1993 (LNCS, Springer Berlin Heidelberg, 1994), vol. 765, pp. 386397.
    7. 7)
      • 15. Xiao, G.Z., Massey, J.L.: ‘A spectral characterization of correlation immune combining functions’, IEEE Trans. Inf. Theory, 1988, 34, (3), pp. 569571.
    8. 8)
      • 13. Nyberg, K.: ‘Perfect nonlinear S-boxes’. In Davies, D.W. (ED.): Advances in cryptography-EUROCRYPT 1991 (LNCS, Springer Berlin Heidelberg, 1991), vol. 547, pp. 378386.
    9. 9)
      • 2. Bennett, C.H., Brassard, G., Robert, J.M.: ‘Privacy amplification by public discussion’, SIAM J. Comput., 1988, 7, (2), pp. 210229.
    10. 10)
      • 10. Pasalic, E., Maitra, S.: ‘Linear codes in generalized construction of resilient functions with very high nonlinearity’, IEEE Trans. Inf. Theory, 2002, 48, (8), pp. 21822191.
    11. 11)
      • 9. Kurosawa, K., Satoh, T., Yamamoto, K.: ‘Highly nonlinear t-resilient functions’, J. Univ. Comput. Sci., 1997, 3, (6), pp. 721729.
    12. 12)
      • 6. Cheon, J.H.: ‘Nonlinear vector resilient functions’. In Kilian, J. (ED.): ‘Advances in cryptography-EUROCRYPT 2001’ (LNCS, Springer Berlin Heidelberg, 2001), vol. 2139, pp. 458469.
    13. 13)
      • 3. Ding, C., Xiao, G., Shan, W.: ‘The stability theory of stream ciphers’ (LNCS, Berlin, Germany, 1991), vol. 561.
    14. 14)
      • 16. Meier, W., Staffelbach, O.: ‘Nonlinearity criteria for cryptographic functions’. In Quisquater, J.-J., Vandewalle, J. (EDs.): Advances in cryptology-EUROCRYPT 1990 (LNCS, Springer Berlin Heidelberg, 1990), vol. 434, pp. 549562.
    15. 15)
      • 7. Gupta, K.C., Sarkar, P.: ‘Improved construction of nonlinear resilient S-boxes’, IEEE Trans. Inf. Theory, 2005, 51, (1), pp. 339348.
    16. 16)
      • 5. Chen, L., Fu, F.W.: ‘On the construction of new resilient functions from old ones’, IEEE Trans. Inf. Theory, 1999, 45, (6), pp. 20772082.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0168
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0168
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address