The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu...The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given.展开更多
A class of plateaued functions has been got by using the Maiorana-McFarland construction. A variety of desirable criteria for functions with cryptographic application eouht be satisfied: balancedness, high nonlineari...A class of plateaued functions has been got by using the Maiorana-McFarland construction. A variety of desirable criteria for functions with cryptographic application eouht be satisfied: balancedness, high nonlinearity, correlation immunity of reasonably high order, strict avalanche criterion, non-existence of non-zero linear struetures, good glnbal avalanche characteristics, etc.展开更多
It is well known that the algebraic expression of AES S-box is very simple and only 9 terms are involved. Hence, AES security is suspected although there is no vulnerability on it so far. To eliminate the weakness of ...It is well known that the algebraic expression of AES S-box is very simple and only 9 terms are involved. Hence, AES security is suspected although there is no vulnerability on it so far. To eliminate the weakness of extremely small terms in the algebraic expression of AES S-box, one improved AES S-box is proposed, which preserves the algebraic degree invariable but significantly increases the number of its algebraic expression terms from 9 to 255. At the same times Boolean function has good characters in balance and strict avalanche criterion (SAC), etc. Finally, it is proved that the improved AES S-box scheme is secure against the powerful known differential and linear cryptanalysis.展开更多
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc...Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed.展开更多
In the paper, we use trace representations of Boolean functions to obtain that a class mappings including functionsF(x)=x d over field GF(2 n ), withW(d)=n?1, have desirable cryptographic properties. Therefore we gene...In the paper, we use trace representations of Boolean functions to obtain that a class mappings including functionsF(x)=x d over field GF(2 n ), withW(d)=n?1, have desirable cryptographic properties. Therefore we generalize an important result of Nyberg. As application, we use these conclusions to analyze cryptographic property of the S-box of AES (the Advanced Encryption Standard) and give its several equivalent representations, proving that the composition of inversion function of AES and any invertible affine transformations is impossible to satisfy strict avalanche criterion, any order propagation criteria and any order correlation immunity. Key words trace function - nonlinearity - differentially uniform - strict avalanche criterion CLC number TP 309 Foundation item: Supported by the National Natural Science Foundation of China (60373089, 60373041), Natural Science Foundation of Hubei Province (2002AB0037) and Chen-guang Plan of Wuhan City (20025001007).Biography: Zeng Xiang-yong (1973-), male, A postdoctoral fellow, research direction: cryptology and the representation theory of algebra.展开更多
The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing i...The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing in determining the order of SAC or PC. A calculating table for the autocorrelation is constructed in this paper so as to show what is beyond the autocorrelation and how the three cryptographic characteristics are exhibited. A deeper study on the calculating table in a similar way has helped us to develop a new concept, named as the general autocorrelation, to address efficiently the problem how to determine the orders of SAC and PC. The application on the Advanced Encryption Standard(AES) shows the SAC and PC characteristics of Boolean functions of AES S-box.展开更多
基金Supported by the National Science Foundation of China(No.60773002,61072140)the 111 Project(No.B08038),the Doctoral Program Foundation of Institutions of Higher Education of China(No.20100203110003)+1 种基金the Fundamental Research Funds for the Central Universities(No.JY10000901034)the Anhui Provincial Natural Science Foundation(No.1208085QF119)
文摘The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given.
基金the National Natural Science Foundation of China,Foundation of National Laboratory for Modern Communications
文摘A class of plateaued functions has been got by using the Maiorana-McFarland construction. A variety of desirable criteria for functions with cryptographic application eouht be satisfied: balancedness, high nonlinearity, correlation immunity of reasonably high order, strict avalanche criterion, non-existence of non-zero linear struetures, good glnbal avalanche characteristics, etc.
基金the National Natural Science Foundation of China (90604009).
文摘It is well known that the algebraic expression of AES S-box is very simple and only 9 terms are involved. Hence, AES security is suspected although there is no vulnerability on it so far. To eliminate the weakness of extremely small terms in the algebraic expression of AES S-box, one improved AES S-box is proposed, which preserves the algebraic degree invariable but significantly increases the number of its algebraic expression terms from 9 to 255. At the same times Boolean function has good characters in balance and strict avalanche criterion (SAC), etc. Finally, it is proved that the improved AES S-box scheme is secure against the powerful known differential and linear cryptanalysis.
基金Supported by the National Nature Science Foundation of China( No. 60773003,60970120).
文摘Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed.
文摘In the paper, we use trace representations of Boolean functions to obtain that a class mappings including functionsF(x)=x d over field GF(2 n ), withW(d)=n?1, have desirable cryptographic properties. Therefore we generalize an important result of Nyberg. As application, we use these conclusions to analyze cryptographic property of the S-box of AES (the Advanced Encryption Standard) and give its several equivalent representations, proving that the composition of inversion function of AES and any invertible affine transformations is impossible to satisfy strict avalanche criterion, any order propagation criteria and any order correlation immunity. Key words trace function - nonlinearity - differentially uniform - strict avalanche criterion CLC number TP 309 Foundation item: Supported by the National Natural Science Foundation of China (60373089, 60373041), Natural Science Foundation of Hubei Province (2002AB0037) and Chen-guang Plan of Wuhan City (20025001007).Biography: Zeng Xiang-yong (1973-), male, A postdoctoral fellow, research direction: cryptology and the representation theory of algebra.
基金Partially supported by the National 973 Project(G1999035803)National 863 Project (2002AA143021)the National Cryptography Development Funds for the Tenth Fiveyear Project
文摘The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing in determining the order of SAC or PC. A calculating table for the autocorrelation is constructed in this paper so as to show what is beyond the autocorrelation and how the three cryptographic characteristics are exhibited. A deeper study on the calculating table in a similar way has helped us to develop a new concept, named as the general autocorrelation, to address efficiently the problem how to determine the orders of SAC and PC. The application on the Advanced Encryption Standard(AES) shows the SAC and PC characteristics of Boolean functions of AES S-box.