Strict avalanche criterion of four-valued func-tions as the quality characteristic of cryptographic algorithms strength

封面

如何引用文章

全文:

详细

The S-box is the most important component of modern cryptographic algorithms which largely determines the quality of cryptographic transformation. The modern method of estimating the S-boxes quality employs their representation as component Boolean functions to which cryptographic quality criteria are applied. Such criteria include: nonlinearity, correlation immunity, an error propagation criterion, and a strict avalanche criterion. Nevertheless, it is obvious that a cryptanalyst is not constrained in the ways of representing the cipher components, in particular, using the functions of many-valued logic. The design features of modern cryptographic algorithms allow their representation in the form of 4-logic functions, which determines the need to research cryptographic properties of the S-boxes represented as component 4-functions. In the literature today there are methods for measuring the nonlinearity of 4-functions; nevertheless, there are no similar methods for researching the differential properties of 4-functions, in particular, involving their compliance with the strict avalanche criterion. In this paper the strict avalanche criterion is generalized to the case of 4-functions and the compliance of the S-boxes component 4-functions of the “Magma” cryptoalgorithm to the strict avalanche criterion has been researched. All balanced 4-functions of length N = 16 satisfying the strict avalanche criterion were synthesized using the restricted brute-force method. The basic properties of the constructed class of 4-functions are determined, and bijective S-boxes based on them are constructed. It has been established that S-boxes of length N = 16 satisfying the strict avalanche criterion, both in terms of component Boolean functions and in terms of 4-functions, also possess optimal nonlinear properties. This circumstance allows us to recommend S-boxes satisfying the strict avalanche criterion of component 4-functions for use in modern cryptographic algorithms.

作者简介

Artem Sokolov

Odessa National Polytechnic University

编辑信件的主要联系方式.
Email: radiosquid@gmail.com

Cand. Sc., Senior Lecturer of the Department of Informatics and Information Security Management

乌克兰, 1, Shevchenko Av., Odessa, 65044

Oleg Zhdanov

Reshetnev Siberian State University of Science and Technology

Email: onzhdanov@mail.ru

Cand. Sc., Associate Professor at the Department of Information Technology Security

俄罗斯联邦, 31, Krasnoyarsky Rabochy Av., Krasnoyarsk, 660037

参考

  1. Zhdanov O. N. Metodica vibora kluchevoi informacii dla algoritmov blochnoigo shifrovania [The method of selecting key information for the block cipher algorithm]. Moscow, INFRA-M Publ, 2013, 97 p.
  2. Sokolov A. V. New methods for synthesizing non-linear transformations of modern ciphers. Germany, Lap Lambert Academic Publishing, 2015, 100 p.
  3. GOST R 34.12–2015. Kriptograficheskaya zashhita informacii blochnye shifry [State Standard R 34.12–2015. Cryptographic information protection block ciphers]. Moscow, Standartinform Publ., 2015, P. 21.
  4. Nyberg K. Differentially uniform mappings for cryptography. Advances in cryptology, Berlin, Heidelberg, New York, Proc. of EUROCRYPT’93, Lecture Notes in Compuer Springer Verlag, 1994, P. 55–65.
  5. Mazurkov M. I., Sokolov A. V. [Cryptographic properties of the nonlinear transformation of the cipher Rijndael on the basis of complete classes of irreducible polynomials]. Trudy Odesskogo politekhnicheskogo universiteta. 2012, No. 2 (39), P. 183–189 (In Russ.).
  6. FIPS 197. Advanced encryption standard. Available at: http://csrc.nist.gov/publications (accessed 07.06.2019).
  7. Sokolov A. V., Krasota N. I. [Very nonlinear permutations: synthesis method for S-boxes with maximal 4-nonlinearity]. Naukovі praczі ONAZ іm. O. S. Popova. 2017, No. 1, P. 145–154.
  8. Kim K. Matsumoto T., Imai H. A recursive construction method of S-boxes satisfying strict avalanche criterion. Proc. of CRYPTO’90, Springer, Verlag, 1990, P. 565–574.
  9. Gao S., Ma W., Shen D. Design of bijective S-boxes satisfying the strict avalanche criterion. USA: Journal of computer information systems. 2011, No. 6, P. 1967–1973.
  10. Sokolov A. V. [Constructive method for the synthesis of nonlinear S-boxes satisfying the strict avalanche criterion]. Izvestiya vysshikh uchebnykh zavedeniy. Radioelektronika. 2013, Vol. 56, No. 8, P. 43–52 (In Russ.).
  11. Logachev O. A., Salnikov A. A., Yashhenko V. V. Bulevy funkcii v teorii kodirovaniya i kriptologii [Boolean functions in coding theory and cryptology]. Moscow, MCzNMO Publ., 2004, 472 p.
  12. Sokolov A. V., Zhdanov O. N. Prospects for the Application of Many-Valued Logic Functions in Cryptography. International Conference on Theory and Applications of Fuzzy Systems and Soft Computing, Springer, Cham. 2018, P. 331–339.
  13. Zhdanov O. N., Sokolov A. V. [Extending Nyberg construction on Galois fields of odd characteristic]. Izvestiya vysshikh uchebnykh zavedeniy. Radioelektronika. 2017, Vol. 60, No. 12, P. 696–703 (In Russ.).
  14. Kim K. Construction of DES-like S-boxes Based on Boolean Functions Satisfying the SAC. Proc. of Asiacrypt'91. Springer Verlag, 1991, P. 59–72.
  15. Mazurkov M. I., Sokolov A. V. [Fast orthogonal transforms based on bentsequences]. Іnformatika ta matematichnі metodi v modelyuvannі. 2014, No. 1, P. 5–13.

补充文件

附件文件
动作
1. JATS XML

版权所有 © Sokolov A.V., Zhdanov O.N., 2023

Creative Commons License
此作品已接受知识共享署名 4.0国际许可协议的许可
##common.cookie##