Abstract
In this paper, we present how to construct DES-like S-boxes based on Boolean functions satisfying the Strict Avalanche Criterion and compare their cryptographic properties with those of DES S-boxes in various points of view. We found that our designed DES-like S-boxes exhibit better cryptographical properties than those of DES S-boxes.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
H. Feistel, “Cryptography and Computer Privacy”, Scientific American, Vol.228, No.5, pp 15–23, 1973.
O.S. Rothaus, “On “Bent” Functions”, J. of Combinatorial Theory(A), Vol.20, pp.300–305, 1976.
“Data Encryption Standard”, National Bureau of Standards, Federal Information Processing Standard, Vol. 46, U.S.A., Jan., 1977.
J.B. Kam and G.I. Davida, “Structured Design of Substitution Permutation Networks”, IEEE Trans. on Comp., Vol. C-28, No.10, pp.747–753, Oct., 1979.
A.F. Webster, “Plaintext/Ciphertext Dependences in Cryptographic Systems”, Master's Thesis, Queen's Univ., CANADA, 1985.
A.F. Webster and S.E. Tavares, “On the Design of S-boxes”, Proc. of CRYPTO'85, Springer-Verlag, 1985.
E.F. Brickell, J.H. Moore, and M.R. Purtill, “Structures in the S-boxes of the DES”, Proc. of CRYPTO'86, Springer-Verlag, pp.3–8, 1986.
R.A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, Berlin, 1986.
S. Miyaguchi, A. Shiraishi, and A. Shimizu, “Fast Data Encryption Algorithm FEAL-8”, (in Japanese), Electr. Comm. Lab. Tech. J., NTT, Vol.37, No.4/5, pp.321–327, 1988.
R. Forré, “The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition”, Proc.of CRYPTO'88, Springer-Verlag, 1988.
J. Pieprzyk, “Nonlinearity of Exponent Permutations”, Proc. of EUROCRYPT'89, Springer-Verlag, 1989.
J. Pieprzyk and G. Finkelstein, “Towards Effective Nonlinear Cryptosystem Design”, IEE, Pt.E, Vol.135, pp.325–335, 1988.
W. Meier and O. Staffelbach, “Nonlinearity Criteria for Cryptographic Functions”, Proc. of EUROCRYPT'89, Springer-Verlag, 1989.
K. Takaraki, K. Sasaki, and F. Nakagawa, “Multi-Media Encryption Algorithm (in Japanese)”, 89-MDP-40-5, 1989.1.19.
C. Adams and S. Tavares, “The Use of Bent Sequences to Achieve Higher-Order Strict Avalanche Criterion in S-box Design”, (Private Communication), 1990.
L. Brown, J. Pieprzyk, and J. Seberry, “LOKI — a Cryptographic Primitive for Authentication and Secrecy”, Proc. of AUSCRYPT'90, 1990.
E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems”, Proc. of CRYPTO'90, 1990.
K. Kim, T. Matsumoto, and H. Imai, “On Generating Cryptographically Desirable Substitutions”, Trans. IEICE, Vol. E73, No.7, Jul., 1990.
K. Kim, T. Matsumoto, and H. Imai, “A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion”, Proc. of CRYPTO'90, 1990.
K. Kim, T. Matsumoto, and H. Imai, “Methods to Generate Functions Satisfying the Strict Avalanche Criterion”, Technical Report on Information Security, ISEC90-30, Nov. 13, 1990.
K. Kim, T. Matsumoto, and H. Imai, “On the Cryptographic Significance of Bent Functions”, KSEAJ Letters, 1990.
R. Forré, “Methods and Instruments for Designing S-boxes”, J. of Cryptology, Vol.2, No.3, pp.115–130, 1990.
K. Kim, “A Study on the Construction and Analysis of Substitution Boxes for Symmetric Cryptosystems”, Ph.D Thesis, Yokohama National Univ., 1991.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, K. (1993). Construction of DES-like S-boxes based on Boolean functions satisfying the SAC. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_5
Download citation
DOI: https://doi.org/10.1007/3-540-57332-1_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57332-6
Online ISBN: 978-3-540-48066-2
eBook Packages: Springer Book Archive