Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci Chin    2011, Vol. 5 Issue (4) : 448-453    https://doi.org/10.1007/s11704-011-0177-9
RESEARCH ARTICLE
On cross-correlation indicators of an S-box
Sheng GAO1(), Wenping MA1, Zepeng ZHUO2, Fenghe WANG1
1. Key Laboratory of Computer Network and Information Security, Ministry of Education, Xidian University, Xi’an 710071, China; 2. State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China
 Download: PDF(131 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Substitution boxes (S-boxes) are often used as the most important nonlinear components in many symmetric encryption algorithms. The cryptographic properties of an S-box directly affect the security of the whole cipher system. Recently, generalized global avalanche characteristics (GGAC) were introduced to measure the correlation between two arbitrary Boolean functions. In this paper, to better evaluate the security of an S-box, we present two cross-correlation indicators for it. In addition, by studying the related properties of the cross-correlation between two balanced Boolean functions, we propose the lower bounds on the sum-of-squares indicator related to GGAC for two balanced functions and also for an S-box.

Keywords cryptography      Boolean functions      substitution boxes      balancedness      generalized global avalanche characteristics      cross-correlation     
Corresponding Author(s): GAO Sheng,Email:gaosheng@mail.xidian.edu.cn   
Issue Date: 05 December 2011
 Cite this article:   
Sheng GAO,Wenping MA,Zepeng ZHUO, et al. On cross-correlation indicators of an S-box[J]. Front Comput Sci Chin, 2011, 5(4): 448-453.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-011-0177-9
https://academic.hep.com.cn/fcs/EN/Y2011/V5/I4/448
Fig.1  An S-box
1 Zhang W G, Xiao G Z. Constructions of almost optimal resilient Boolean functions on large even number of variables. IEEE Transactions on Information Theory , 2009, 55(12): 5822–5831
2 Webster A F, Tavares S E. On the design of S-boxes. In: Proceedings of CRYPTO’85 . 1986, 523–534
3 Preneel B, Van Leekwijck W, Van Linden L, Govaerts R, Vandewalle J. Propagation characteristics of Boolean functions. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques . 1991, 161–173
4 Preneel B, Govaerts R, Vandewalle J. Boolean functions satisfying higher order propagation criteria. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques . 1991, 141–152
5 Zhang X M, Zheng Y L. GAC - the criterion for global avalanche characteristics of cryptographic functions. Journal of Universal Computer Science , 1995, 1(5): 316–333
6 Shannon C E. Communication theory of secrecy systems. Bell System Technical Journal , 1949, 28(4): 656–715
7 Sarkar P, Maitra S. Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes. Theory of Computing Systems , 2002, 35(3): 39–57
8 Zhou Y, Xie M, Xiao G Z. On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity. Information Sciences , 2010, 180(2): 256–265
9 Leander G, Poschmann A. On the classification of 4-bit S-boxes. In: Proceedings of 1st International Workshop on Arithmetic of Finite Fields. 2007, 159–176
10 Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology , 1991, 4(1): 3–72
11 Matsui M. Linear cryptanalysis method for DES cipher. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques . 1994, 396–397
12 Gligoroski D, Moe M E G. On deviations of the AES S-box when represented as vector valued Boolean function. International Journal of Computer Science and Network Security , 2007, 7(4): 156–163
13 Gao S, Ma W P, Guo N, Chen Q L. Design of cross-correlation test algorithm on S-box. Geomatics and Information Science of Wuhan University , 2010, 35(5): 558–561
14 Mister S, Adams C. Practical S-box design. In: Proceedings of the 3rd Annual Workshop on Selected Areas in Cryptography . 1996, 1–17
15 Nyberg K. Perfect nonlinear S-boxes. In: Proceedings of 10th Annual International Conference on Theory and Application of Cryptographic . 1991, 378–385
16 Porwik P. The spectral test of Boolean function linearity. Journal of Applied Mathematics and Computer Science , 2003, 13(4): 567–575
17 National Bureau of Standards. Data encryption standard (DES). Federal Information Processing Standard , 1977
18 Daemen J, Rijmen V. The block cipher Rijndael. http://www.nist.gov/aes
19 Johansson T, Pasalic E. A construction of resilient functions with high nonlinearity. IEEE Transactions on Information Theory , 2003, 49(2): 494–501
20 Zhang M, Chan A. Maximum correlation analysis of nonlinear S-boxes in stream ciphers. In: Proceedings of 20th Annual International Cryptology Conference on Advances in Cryptology . 2000, 501–514
[1] Abhishek MAJUMDAR, Arpita BISWAS, Atanu MAJUMDER, Sandeep Kumar SOOD, Krishna Lal BAISHNAB. A novel DNA-inspired encryption strategy for concealing cloud storage[J]. Front. Comput. Sci., 2021, 15(3): 153807-.
[2] Momeng LIU, Yupu HU. Universally composable oblivious transfer from ideal lattice[J]. Front. Comput. Sci., 2019, 13(4): 879-906.
[3] Wei GAO, Guilin WANG, Kefei CHEN, Xueli WANG. Efficient identity-based threshold decryption scheme from bilinear pairings[J]. Front. Comput. Sci., 2018, 12(1): 177-189.
[4] Mingming JIANG,Yupu HU,Hao LEI,Baocang WANG,Qiqi LAI. Lattice-based certificateless encryption scheme[J]. Front. Comput. Sci., 2014, 8(5): 828-836.
[5] Xiuhua LU,Qiaoyan WEN,Zhengping JIN,Licheng WANG,Chunli YANG. A lattice-based signcryption scheme without random oracles[J]. Front. Comput. Sci., 2014, 8(4): 667-675.
[6] Wenbo SHI,Neeraj KUMAR,Peng GONG,Zezhong ZHANG. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Front. Comput. Sci., 2014, 8(4): 656-666.
[7] Lin CHENG, Qiaoyan WEN, Zhengping JIN, Hua ZHANG. Cryptanalysis and improvement of a certificateless encryption scheme in the standard model[J]. Front. Comput. Sci., 2014, 8(1): 163-173.
[8] Yu ZHOU, Weiguo ZHANG, Juan LI, Xinfeng DONG, Guozhen XIAO. The autocorrelation distribution of balanced Boolean function[J]. Front Comput Sci, 2013, 7(2): 272-278.
[9] Xixiang LV, Hui LI, Baocang WANG. Identity-based key distribution for mobile Ad Hoc networks[J]. Front Comput Sci Chin, 2011, 5(4): 442-447.
[10] Yu ZHOU, Guozhen XIAO, . On the equal-weight symmetric Boolean functions[J]. Front. Comput. Sci., 2009, 3(4): 485-493.
[11] ZHANG Weiguo, ZHANG Weiguo, XIAO Guozhen, XIAO Guozhen, CAI Mian, CAI Mian. On constructing disjoint linear codes[J]. Front. Comput. Sci., 2007, 1(2): 226-230.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed