Abstract
S(ubstitution)-boxes are quite important components of modern symmetric cryptosystems. S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes each output bit with probability one half. We present some interesting properties of S-boxes and propose an efficient and systematic means of generating arbitrary input size bijective S-boxes satisfying the SAC by applying simple rules recursively given 3-bit input bijectective S-box(es) satisfying the SAC.
Chapter PDF
Similar content being viewed by others
References
NBS, “Data Encryption Standard(DES)”, FIPS PUB 46, US National Burcau of Standards, Washinston DC, Jan., 1977.
S. Miyaguchi, A. Shiraishi and A. Shimizu, “Fast data encryption algorithm FEAL-8 (in Japanese )”, Electr. Comm. Lab. Tech. J., NTT, Vol.37, No.4/5, pp.321–327, 1988.
L. Brown, J. Pieprzyk and J. Seberry, “LOKI-a cryptographic primitive for authentication and secrecy”, Proc. of AUSCRYPT90, 1990.
J.B. Kam and G.I. Davida, “Structured design of substitution-permutation encryption network”, IEEE Trans, on Comput., Vol.C-28, No.10, pp.747–753, Oct., 1979.
A.F. Webster and S.E. Tavares, “On the design of S-boxes”, Proc. of CRYPTO85, Springer-Verlag, 1985.
H. Feistel, “Cryptography and computer privacy”, Scientific American, Vol.228, No.5, pp 15–23, 1973.
R. Forré, “The strict avalanche criterion: spectral properties of Boolean functions and an extended definition”, Proc.of CRYPTO88, Springer-Verlag, 1988.
S. Lloyd, “Counting functions satisfying a higher order strict avalanche criterion”, Proc. of EUROCYRPT89, Springer-Verlag, 1989.
J.A. Gordon and H. Retkin, “Are big S-boxes best?”, IEEE workshop on computer security, pp.257–262, 1981.
F. Ayoub, “Probabilistic completeness of substitution-permutation encryption networks”, IEE, Vol.129, E, 5, pp195–199, Sep., 1982.
J.P. Pieprzyk, “Non-linearity of exponent permutations”, Proc. of EURO-CRYPTO89, Springer-Verlag, 1989.
S. Babbage, “On the relevance of the strict avalanche criterion”, Electronics Letters, Vol.26, No.7, pp.461–462, 29th Max., 1990.
M. Hellman, R. Merkle, R. Schroeppel, L. Washington, W. Diffie, S. Pohlig and P. Schweitzer, “Results of an initial attempt to analyze the NBS data encryption standard”, Information Systems Laboratory Report, Stanford University, 1976.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, K., Matsumoto, T., Imai, H. (1991). A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. In: Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, vol 537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_39
Download citation
DOI: https://doi.org/10.1007/3-540-38424-3_39
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54508-8
Online ISBN: 978-3-540-38424-3
eBook Packages: Springer Book Archive