Abstract
Substitution boxes (S-boxes) are one of the most crucial primitives in the field of block ciphers. Recently, differential power analysis (DPA), a very powerful technique which targets implementations of block ciphers, causes the modern block ciphers to be much more vulnerable than ever before. Up to now, the revised transparency order is one of the best metrics to assess the resistance of S-boxes against DPA attacks. In this paper, we present an efficient algorithm to search for cryptographically significant S-boxes with improved DPA-Resistance. Applying our developed algorithm, we generate an \(8\times 8\) balanced S-box with algebraic degree 7, nonlinearity 112, differential uniformity 4, absolute indicator 32, revised transparency order 6.8820 (whereas the Rijndael S-box has revised transparency order 6.9161) and thereby improved resistance towards DPA attacks. Moreover, many other balanced S-boxes with a much better trade-off of cryptographic characteristics than previous works (e.g. S-boxes given by B. Mazumdar and D. Mukhopadhyay in IEEE Trans. Computers 2017) are also captured. The comparison between ours and previous results manifests that our S-boxes are more secure and robust.
This work was partly supported by National Natural Science Foundation of Jiangsu Province (Application No. SBK2020021060) and National Natural Science Foundation of China (No. 61572189).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-38424-3_1
Carlet, C.: On highly nonlinear s-boxes and their inability to thwart DPA attacks. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 49–62. Springer, Heidelberg (2005). https://doi.org/10.1007/11596219_5
Carlet, C.: Vectorial Boolean Functions for Cryptography, Encyclopedia of Mathematics and its Applications, Cambridge University Press, pp. 398–470. (2010). https://doi.org/10.1017/CBO9780511780448.012
Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., Prouff, E.: Redefining the transparency order. Des. Codes Crypt. 82(1), 95–115 (2016). https://doi.org/10.1007/s10623-016-0250-3
Evci, M.A., Kavut, S.: DPA resilience of rotation-symmetric s-boxes. In: Yoshida, M., Mouri, K. (eds.) IWSEC 2014. LNCS, vol. 8639, pp. 146–157. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09843-2_12
Fei, Y., Ding, A.A., Lao, J., Zhang, L.: A statistics-based fundamental model for side-channel attack analysis. IACR Cryptology ePrint Archive 2014, 152 (2014). http://eprint.iacr.org/2014/152
Fei, Y., Luo, Q., Ding, A.A.: A statistical model for DPA with novel algorithmic confusion analysis. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 233–250. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33027-8_14
Guilley, S., Hoogvorst, P., Pacalet, R.: Differential power analysis model and some results. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., El Kalam, A.A. (eds.) CARDIS 2004. IIFIP, vol. 153, pp. 127–142. Springer, Boston, MA (2004). https://doi.org/10.1007/1-4020-8147-2_9
Jain, A., Chaudhari, N.S.: Evolving highly nonlinear balanced Boolean functions with improved resistance to DPA attacks. NSS 2015. LNCS, vol. 9408, pp. 316–330. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25645-0_21
Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60590-8_16
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, New York (2007)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33
Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Constrained search for a class of good bijective \(s\)-boxes with improved DPA resistivity. IEEE Trans. Inf. Forensics Secur. 8(12), 2154–2163 (2013). https://doi.org/10.1109/TIFS.2013.2285522
Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Design and implementation of rotation symmetric s-boxes with high nonlinearity and high DPA resilience. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 87–92 (June 2013). https://doi.org/10.1109/HST.2013.6581571
Mazumdar, B., Mukhopadhyay, D.: Construction of rotation symmetric s-boxes with high nonlinearity and improved DPA resistivity. IEEE Trans. Comput. 66(1), 59–72 (2017)
Messerges, T.S., Dabbish, E.A.: Investigations of power analysis attacks on smartcards. In: Guthery, S.B., Honeyman, P. (eds.) Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, 10–11 May 1999. USENIX Association (1999). https://www.usenix.org/conference/usenix-workshop-smartcard-technology/investigations-power-analysis-attacks-smartcards
Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_6
Picek, S., Batina, L., Jakobovic, D.: Evolving DPA-resistant Boolean functions. In: Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.) PPSN 2014. LNCS, vol. 8672, pp. 812–821. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2_80
Picek, S., Ege, B., Batina, L., Jakobovic, D., Chmielewski, U., Golub, M.: On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems. p. 13–18. CS2 2014, Association for Computing Machinery, New York, NY, USA (2014). https://doi.org/10.1145/2556315.2556319
Picek, S., Mazumdar, B., Mukhopadhyay, D., Batina, L.: Modified transparency order property: solution or just another attempt. In: Chakraborty, R.S., Schwabe, P., Solworth, J. (eds.) SPACE 2015. LNCS, vol. 9354, pp. 210–227. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24126-5_13
Prouff, E.: DPA attacks and s-boxes. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 424–441. Springer, Heidelberg (2005). https://doi.org/10.1007/11502760_29
Spain, M., Varia, M.: Evolving s-boxes with reduced differential power analysis susceptibility. IACR cryptology ePrint Arch. 2016, 1145 (2016). http://eprint.iacr.org/2016/1145
Wang, Q., Stănică, P.: Transparency order for Boolean functions: analysis and construction. Des. Codes Crypt. 87(9), 2043–2059 (2019). https://doi.org/10.1007/s10623-019-00604-1
Xu, Y., Wang, Q.: Searching for highly nonlinear DPA-resistant balanced Boolean functions in the rotation symmetric class. In: 2019 IEEE International Symposium on Information Theory (ISIT), pp. 1212–1216 (July 2019). https://doi.org/10.1109/ISIT.2019.8849385
Zhang, X.M., Zheng, Y.: GAC the criterion for global avalanche characteristics of cryptographic functions. In: Maurer, H., Calude, C., Salomaa, A. (eds.) J. UCS The Journal of Universal Computer Science, pp. 320–337. Springer, Berlin (1996). https://doi.org/10.1007/978-3-642-80350-5_30
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendices
Proposed S-box #2: \(\mathbf {nlf=110,\tau _F=6.8754}\)
[69, 82, 172, 84, 3, 4, 188, 93, 88, 52, 252, 246, 251, 135, 213, 152, 27, 169, 165, 102, 67, 214, 244, 137, 231, 57, 161, 109, 139, 147, 32, 209, 125, 69, 205, 58, 106, 30, 143, 41, 224, 167, 85, 189, 158, 193, 108, 220, 184, 215, 182, 111, 16, 64, 140, 185, 6, 218, 35, 83, 39, 14, 241, 38, 116, 157, 240, 154, 174, 136, 104, 43, 40, 166, 179, 197, 124, 103, 78, 155, 28, 181, 0, 21, 8, 113, 79, 92, 48, 47, 9, 44, 56, 10, 226, 151, 129, 159, 225, 119, 76, 62, 230, 175, 126, 253, 138, 236, 162, 160, 53, 107, 150, 149, 242, 101, 249, 191, 24, 5, 131, 73, 75, 60, 80, 207, 55, 11, 21, 248, 238, 33, 228, 117, 74, 86, 105, 45, 216, 148, 66, 110, 36, 20, 250, 23, 180, 121, 130, 194, 115, 99, 192, 171, 59, 232, 243, 208, 254, 127, 217, 210, 146, 202, 134, 50, 176, 90, 91, 63, 91, 112, 71, 255, 97, 222, 223, 145, 94, 54, 239, 13, 128, 95, 2, 144, 49, 19, 118, 96, 217, 64, 177, 234, 132, 122, 168, 25, 195, 227, 153, 77, 18, 22, 12, 183, 221, 233, 170, 42, 247, 200, 178, 190, 187, 114, 206, 212, 164, 15, 17, 229, 156, 1, 237, 201, 51, 100, 142, 245, 81, 203, 141, 34, 37, 173, 163, 46, 72, 199, 219, 31, 87, 204, 61, 235, 120, 186, 198, 7, 196, 70, 123, 26, 133, 98]
Proposed S-box #3: \(\mathbf {nlf=108,\tau _F=6.8711}\)
[ 69, 82, 172, 84, 3, 4, 188, 93, 88, 52, 252, 246, 251, 135, 213, 152, 27, 169, 165, 102, 67, 214, 244, 137, 231, 49, 161, 109, 139, 147, 32, 209, 125, 73, 205, 58, 106, 30, 143, 41, 224, 163, 85, 189, 158, 193, 108, 220, 184, 215, 182, 111, 16, 64, 140, 185, 6, 218, 35, 87, 39, 14, 241, 38, 116, 157, 240, 154, 174, 136, 104, 43, 40, 166, 179, 197, 124, 103, 78, 155, 28, 181, 0, 21, 8, 113, 79, 92, 48, 47, 9, 44, 56, 10, 226, 151, 129, 159, 225, 119, 76, 62, 230, 175, 126, 253, 138, 236, 162, 160, 53, 107, 150, 149, 242, 101, 249, 191, 24, 5, 131, 73, 75, 60, 80, 207, 55, 11, 29, 248, 238, 33, 228, 117, 74, 86, 105, 45, 216, 148, 66, 110, 36, 20, 250, 23, 180, 121, 130, 194, 119, 99, 192, 171, 59, 232, 243, 208, 254, 127, 217, 210, 146, 202, 134, 50, 176, 90, 91, 63, 211, 112, 67, 255, 97, 222, 223, 145, 94, 54, 239, 13, 128, 95, 2, 144, 49, 19, 118, 96, 89, 64, 177, 234, 132, 122, 168, 25, 195, 227, 153, 77, 18, 22, 12, 183, 221, 233, 170, 42, 247, 200, 178, 190, 187, 114, 206, 212, 164, 15, 17, 229, 156, 1, 237, 201, 51, 100, 142, 245, 81, 203, 141, 34, 37, 173, 167, 46, 72, 199, 219, 31, 87, 204, 61, 235, 120, 186, 198, 7, 196, 70, 123, 26, 133, 98]
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, Y., Wang, Q. (2020). Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds) Information Security. ISC 2020. Lecture Notes in Computer Science(), vol 12472. Springer, Cham. https://doi.org/10.1007/978-3-030-62974-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-62974-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62973-1
Online ISBN: 978-3-030-62974-8
eBook Packages: Computer ScienceComputer Science (R0)