Strict avalanche criterion of four-valued func-tions as the quality characteristic of cryptographic algorithms strength

Cover Page

Cite item

Full Text

Abstract

The S-box is the most important component of modern cryptographic algorithms which largely determines the quality of cryptographic transformation. The modern method of estimating the S-boxes quality employs their representation as component Boolean functions to which cryptographic quality criteria are applied. Such criteria include: nonlinearity, correlation immunity, an error propagation criterion, and a strict avalanche criterion. Nevertheless, it is obvious that a cryptanalyst is not constrained in the ways of representing the cipher components, in particular, using the functions of many-valued logic. The design features of modern cryptographic algorithms allow their representation in the form of 4-logic functions, which determines the need to research cryptographic properties of the S-boxes represented as component 4-functions. In the literature today there are methods for measuring the nonlinearity of 4-functions; nevertheless, there are no similar methods for researching the differential properties of 4-functions, in particular, involving their compliance with the strict avalanche criterion. In this paper the strict avalanche criterion is generalized to the case of 4-functions and the compliance of the S-boxes component 4-functions of the “Magma” cryptoalgorithm to the strict avalanche criterion has been researched. All balanced 4-functions of length N = 16 satisfying the strict avalanche criterion were synthesized using the restricted brute-force method. The basic properties of the constructed class of 4-functions are determined, and bijective S-boxes based on them are constructed. It has been established that S-boxes of length N = 16 satisfying the strict avalanche criterion, both in terms of component Boolean functions and in terms of 4-functions, also possess optimal nonlinear properties. This circumstance allows us to recommend S-boxes satisfying the strict avalanche criterion of component 4-functions for use in modern cryptographic algorithms.

About the authors

Artem V. Sokolov

Odessa National Polytechnic University

Author for correspondence.
Email: radiosquid@gmail.com

Cand. Sc., Senior Lecturer of the Department of Informatics and Information Security Management

Ukraine, 1, Shevchenko Av., Odessa, 65044

Oleg N. Zhdanov

Reshetnev Siberian State University of Science and Technology

Email: onzhdanov@mail.ru

Cand. Sc., Associate Professor at the Department of Information Technology Security

Russian Federation, 31, Krasnoyarsky Rabochy Av., Krasnoyarsk, 660037

References

  1. Zhdanov O. N. Metodica vibora kluchevoi informacii dla algoritmov blochnoigo shifrovania [The method of selecting key information for the block cipher algorithm]. Moscow, INFRA-M Publ, 2013, 97 p.
  2. Sokolov A. V. New methods for synthesizing non-linear transformations of modern ciphers. Germany, Lap Lambert Academic Publishing, 2015, 100 p.
  3. GOST R 34.12–2015. Kriptograficheskaya zashhita informacii blochnye shifry [State Standard R 34.12–2015. Cryptographic information protection block ciphers]. Moscow, Standartinform Publ., 2015, P. 21.
  4. Nyberg K. Differentially uniform mappings for cryptography. Advances in cryptology, Berlin, Heidelberg, New York, Proc. of EUROCRYPT’93, Lecture Notes in Compuer Springer Verlag, 1994, P. 55–65.
  5. Mazurkov M. I., Sokolov A. V. [Cryptographic properties of the nonlinear transformation of the cipher Rijndael on the basis of complete classes of irreducible polynomials]. Trudy Odesskogo politekhnicheskogo universiteta. 2012, No. 2 (39), P. 183–189 (In Russ.).
  6. FIPS 197. Advanced encryption standard. Available at: http://csrc.nist.gov/publications (accessed 07.06.2019).
  7. Sokolov A. V., Krasota N. I. [Very nonlinear permutations: synthesis method for S-boxes with maximal 4-nonlinearity]. Naukovі praczі ONAZ іm. O. S. Popova. 2017, No. 1, P. 145–154.
  8. Kim K. Matsumoto T., Imai H. A recursive construction method of S-boxes satisfying strict avalanche criterion. Proc. of CRYPTO’90, Springer, Verlag, 1990, P. 565–574.
  9. Gao S., Ma W., Shen D. Design of bijective S-boxes satisfying the strict avalanche criterion. USA: Journal of computer information systems. 2011, No. 6, P. 1967–1973.
  10. Sokolov A. V. [Constructive method for the synthesis of nonlinear S-boxes satisfying the strict avalanche criterion]. Izvestiya vysshikh uchebnykh zavedeniy. Radioelektronika. 2013, Vol. 56, No. 8, P. 43–52 (In Russ.).
  11. Logachev O. A., Salnikov A. A., Yashhenko V. V. Bulevy funkcii v teorii kodirovaniya i kriptologii [Boolean functions in coding theory and cryptology]. Moscow, MCzNMO Publ., 2004, 472 p.
  12. Sokolov A. V., Zhdanov O. N. Prospects for the Application of Many-Valued Logic Functions in Cryptography. International Conference on Theory and Applications of Fuzzy Systems and Soft Computing, Springer, Cham. 2018, P. 331–339.
  13. Zhdanov O. N., Sokolov A. V. [Extending Nyberg construction on Galois fields of odd characteristic]. Izvestiya vysshikh uchebnykh zavedeniy. Radioelektronika. 2017, Vol. 60, No. 12, P. 696–703 (In Russ.).
  14. Kim K. Construction of DES-like S-boxes Based on Boolean Functions Satisfying the SAC. Proc. of Asiacrypt'91. Springer Verlag, 1991, P. 59–72.
  15. Mazurkov M. I., Sokolov A. V. [Fast orthogonal transforms based on bentsequences]. Іnformatika ta matematichnі metodi v modelyuvannі. 2014, No. 1, P. 5–13.

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2023 Sokolov A.V., Zhdanov O.N.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies