S-box construction from non-permutation power functions
A substitution box (s-box) is a nonlinear component function used in most block ciphers. It must fulfill several cryptographic properties such as high nonlinearity, low differential uniformity and complex algebraic expression to resist against linear, differential and interpolation attacks. In this...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference paper |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-29381 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-293812023-12-28T12:12:49Z S-box construction from non-permutation power functions Isa H. Jamil N. Z'aba M.R. 56432795500 36682671900 24726154700 Bijective s-box Non-permutation power functions Redundancy removal algorithm S-box performance Substitution box Complex networks Cryptography Frequency hopping Lyapunov methods Security of data Bijective s-box Power functions Redundancy removal S-box performance Substitution boxes Finite element method A substitution box (s-box) is a nonlinear component function used in most block ciphers. It must fulfill several cryptographic properties such as high nonlinearity, low differential uniformity and complex algebraic expression to resist against linear, differential and interpolation attacks. In this paper, we extend and improve the s-box construction method proposed by Mamadolimov et al. [26, 27] which construct an s-box from power and binomial functions over the finite field F28. We study the cryptographic properties exhibited from our s-box and do a comparative analysis with several known 8�8 bijective s-boxes. Our analysis shows that our proposed s-box is ranked seventh compared to known 8�8 bijective s-boxes in terms of strong cryptographic properties. It even surpasses some known s-boxes used in popular block ciphers. Copyright � 2013 ACM. Final 2023-12-28T04:12:49Z 2023-12-28T04:12:49Z 2013 Conference paper 10.1145/2523514.2523525 2-s2.0-84893310923 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893310923&doi=10.1145%2f2523514.2523525&partnerID=40&md5=b4de2546dd9edf3f506128464b839d29 https://irepository.uniten.edu.my/handle/123456789/29381 46 53 Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
Bijective s-box Non-permutation power functions Redundancy removal algorithm S-box performance Substitution box Complex networks Cryptography Frequency hopping Lyapunov methods Security of data Bijective s-box Power functions Redundancy removal S-box performance Substitution boxes Finite element method |
spellingShingle |
Bijective s-box Non-permutation power functions Redundancy removal algorithm S-box performance Substitution box Complex networks Cryptography Frequency hopping Lyapunov methods Security of data Bijective s-box Power functions Redundancy removal S-box performance Substitution boxes Finite element method Isa H. Jamil N. Z'aba M.R. S-box construction from non-permutation power functions |
description |
A substitution box (s-box) is a nonlinear component function used in most block ciphers. It must fulfill several cryptographic properties such as high nonlinearity, low differential uniformity and complex algebraic expression to resist against linear, differential and interpolation attacks. In this paper, we extend and improve the s-box construction method proposed by Mamadolimov et al. [26, 27] which construct an s-box from power and binomial functions over the finite field F28. We study the cryptographic properties exhibited from our s-box and do a comparative analysis with several known 8�8 bijective s-boxes. Our analysis shows that our proposed s-box is ranked seventh compared to known 8�8 bijective s-boxes in terms of strong cryptographic properties. It even surpasses some known s-boxes used in popular block ciphers. Copyright � 2013 ACM. |
author2 |
56432795500 |
author_facet |
56432795500 Isa H. Jamil N. Z'aba M.R. |
format |
Conference paper |
author |
Isa H. Jamil N. Z'aba M.R. |
author_sort |
Isa H. |
title |
S-box construction from non-permutation power functions |
title_short |
S-box construction from non-permutation power functions |
title_full |
S-box construction from non-permutation power functions |
title_fullStr |
S-box construction from non-permutation power functions |
title_full_unstemmed |
S-box construction from non-permutation power functions |
title_sort |
s-box construction from non-permutation power functions |
publishDate |
2023 |
_version_ |
1806426430092869632 |
score |
13.222552 |