期刊文献+

High-Order Bit Independence Criterion Test for the S-boxes

High-Order Bit Independence Criterion Test for the S-boxes
原文传递
导出
摘要 A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications . A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications .
出处 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期447-451,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Science Foundation of China (61072140) the Doctoral Program Foundation of Institutions of Higher Education of China (20100203110003) the 111 Project (B08038) the Fundamental Research Funds for the Central Universities ( JY10000901034)
关键词 CRYPTOGRAPHY Boolean functions S-boxes highorder bit independence criterion (HOBIC) security test cryptography Boolean functions S-boxes highorder bit independence criterion (HOBIC) security test
  • 相关文献

参考文献12

  • 1Brickell E F, Moore J H, Purtill M R. Structures in the S-boxes of the DES [C]//Proceedings of CRYPTO' 86 (LNCS 263). New York: Springer-Verlag, 1987: 3-8.
  • 2Daemen J, Rijmen V, The design of Rijndael: AES--The Advanced Encryption Standard [M]. Berlin: Springer-Verlag, 2002.
  • 3Webster A F, Tavares S E. On the design of S-boxes [C]// Proceedings of CRYPTO'85 (LNCS 219). Berlin: Springer- Verlag, 1986: 523-534.
  • 4Adams C, Tavares S. Structured design of cryptographically good S-boxes [J]. Journal of Cryptology, 1990, 3(1): 27-41.
  • 5Detombe J, Tavares S. Constructing large cryptographically strong S-boxes [C]// Proceedings ofCRYPTO'92 (LNCS 718). Berlin: Springer-Verlag, 1993: 165-181.
  • 6Millan W, Burnett L, Carter G., et al. Evolutionary heuristics for finding cryptographically strong S-boxes [C]// Proceed- ings oflC1CS99 (LNCS 1726). Berlin: Springer, 1999: 263- 274.
  • 7Mister S, Adams C. Practical S-box design [C]// Proceedings of the 3rd Annual Workshop on Selected Areas in Cryptography (SAC96). Kingston: IEEE Press, 1996: 61-76.
  • 8Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems [J]. Journal of Cryptology, 1991, 4(1): 3-72.
  • 9Matsui M. Linear cryptanalysis method for DES cipher [C] //Proceedings of EUROCRYPT'93 (LNCS 765). Berlin: Springer-Verlag, 1994: 386-397.
  • 10Bibliowicz A, Cohen P, Biham E. A system for assisting analysis of some block ciphers [R]. NESS1E, NES/DOC/TEC! WP2/007/2. February, 2003.

二级参考文献14

  • 1Brickell E F, Moore J H,Purtill M R. Structures in the S boxes of the DES[C]. Advances in Cryptology-CRYPTO ' 86. New York: Springer Verlag, 1986:3 8.
  • 2Zhang M ,Chan A. Maximum Correlation Analysis of Nonlinear S boxes in Stream Ciphers[C].Adin Cryptology--CRYPTO ' 20. Berlin: Springer-Verlag, 2000:501- 514.
  • 3Mister S, Adams C. Practical S-box Design[C]. The 3rd Annual Workshop on Selected Areas in Cryptography(SAC'96), Kingston, Canada, 1996.
  • 4Knudsen L, Raddum H. Linear Approximation to the MARS S box[OL], http:/www. cosic, esat. kuleuven, be/nessie/reports/ , 2000.
  • 5Porwik P. The Spectral Test of the Boolean Function Linearity[J].Journal of Applied Mathematics and Computer Science, 2003, 13(4) :567-575.
  • 6Xiao G Z, Massey J L. A Spectral Characterization of Correlation-immune Combining Functions [J].IEEETrans on Information Theory, 1988, 34(3):569-571.
  • 7Biham E, Shamir A. Differential Cryptanalysis of DES- like Cryptosystems[J].Journal of Cryptology, 1991, 4(1): 3 -72.
  • 8Nyberg K. Perfect Nonlinear S-boxes [C]. Advances in Cryptolygy--EUROCRYPT'91. New York: Springer-Verlag, 1991:161-173.
  • 9Webster A F, Tavares S E. On the Design of S-Boxes[C]. Crypto'85, New York, 1985.
  • 10Shannon C E. Communication Theory of Secrecy Systems[J].Bell System Technical Journal, 1949,28 (4):656- 715.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部