Fast Generation of DES-Like S-Boxes

被引:1
|
作者
Marin, Leandro [1 ]
机构
[1] Univ Murcia, Dept Appl Math, E-30001 Murcia, Spain
来源
JOURNAL OF INTERNET TECHNOLOGY | 2016年 / 17卷 / 02期
关键词
Cryptographic permutations; DES; PE-equivalences; S-box; Self-equivalent S-boxes;
D O I
10.6138/JIT.2016.17.2.20150703d
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Substitution Boxes (or S-boxes) are tabulated permutations given in the definition of different symmetric encryption methods. In particular, the Data Encryption Standard (DES) includes 8 S-boxes that have been analyzed in depth in the literature. Some of the design criteria used for the choice of these maps have been published. The generation of maps that satisfy these criteria is not a trivial task, in particular because some of them are not easy to find in a random sample. This is specially true for the criterion (S-4), that is satisfied by only a small set of permutations. In this paper this criterion is analyzed in depth and a generator of S-boxes that satisfy it is given. This generator is very effective and can generate a huge amount of S-boxes per second. Using them, other criteria can be analyzed and verified with higher probabilities.
引用
收藏
页码:301 / 308
页数:8
相关论文
共 50 条
  • [21] ON THE DESIGN OF S-BOXES
    WEBSTER, AF
    TAVARES, SE
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 523 - 534
  • [22] A Countermeasure for DES with both Rotating Masks and Secured S-boxes
    Zhuang, Zeleng
    Chen, Jiachao
    Zhang, Haosheng
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 410 - 414
  • [23] DEGENERATE S-BOXES
    Lisickiy, K. E.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (01) : 129 - 138
  • [24] Nonlinearities of S-boxes
    Carlet, Claude
    Ding, Cunsheng
    FINITE FIELDS AND THEIR APPLICATIONS, 2007, 13 (01) : 121 - 135
  • [25] Fast Novel Efficient S-Boxes with Expanded DNA Codes
    Maolood A.T.
    Farhan A.K.
    El-Sobky W.I.
    Zaky H.N.
    Zayed H.L.
    Ahmed H.E.
    Diab T.O.
    Security and Communication Networks, 2023, 2023
  • [26] Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
    Perrin, Leo
    Udovenko, Aleksei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 99 - 124
  • [27] Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
    Borghoff, Julia
    Knudsen, Lars R.
    Leander, Gregor
    Thomsen, Soren S.
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 270 - 289
  • [28] On the Algebraic Expression of the AES S-Box Like S-Boxes
    Sakalli, M. Tolga
    Aslan, Bora
    Bulus, Ercan
    Mesut, Andac Sahin
    Buyuksaracoglu, Fatma
    Karaahmetoglu, Osman
    NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 213 - +
  • [29] On some probabilistic approximations for AES-like s-boxes
    Youssef, A. M.
    Tavares, S. E.
    Gong, G.
    DISCRETE MATHEMATICS, 2006, 306 (16) : 2016 - 2020
  • [30] Randomness analysis and generation of key-derived s-boxes
    Alvarez, Rafael
    Zamora, Antonio
    LOGIC JOURNAL OF THE IGPL, 2016, 24 (01) : 68 - 79