Skip to main content

Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance

  • Conference paper
  • First Online:
Information Security (ISC 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12472))

Included in the following conference series:

Abstract

Substitution boxes (S-boxes) are one of the most crucial primitives in the field of block ciphers. Recently, differential power analysis (DPA), a very powerful technique which targets implementations of block ciphers, causes the modern block ciphers to be much more vulnerable than ever before. Up to now, the revised transparency order is one of the best metrics to assess the resistance of S-boxes against DPA attacks. In this paper, we present an efficient algorithm to search for cryptographically significant S-boxes with improved DPA-Resistance. Applying our developed algorithm, we generate an \(8\times 8\) balanced S-box with algebraic degree 7, nonlinearity 112, differential uniformity 4, absolute indicator 32, revised transparency order 6.8820 (whereas the Rijndael S-box has revised transparency order 6.9161) and thereby improved resistance towards DPA attacks. Moreover, many other balanced S-boxes with a much better trade-off of cryptographic characteristics than previous works (e.g. S-boxes given by B. Mazumdar and D. Mukhopadhyay in IEEE Trans. Computers 2017) are also captured. The comparison between ours and previous results manifests that our S-boxes are more secure and robust.

This work was partly supported by National Natural Science Foundation of Jiangsu Province (Application No. SBK2020021060) and National Natural Science Foundation of China (No. 61572189).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-38424-3_1

    Chapter  Google Scholar 

  2. Carlet, C.: On highly nonlinear s-boxes and their inability to thwart DPA attacks. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 49–62. Springer, Heidelberg (2005). https://doi.org/10.1007/11596219_5

    Chapter  Google Scholar 

  3. Carlet, C.: Vectorial Boolean Functions for Cryptography, Encyclopedia of Mathematics and its Applications, Cambridge University Press, pp. 398–470. (2010). https://doi.org/10.1017/CBO9780511780448.012

  4. Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., Prouff, E.: Redefining the transparency order. Des. Codes Crypt. 82(1), 95–115 (2016). https://doi.org/10.1007/s10623-016-0250-3

    Article  MathSciNet  MATH  Google Scholar 

  5. Evci, M.A., Kavut, S.: DPA resilience of rotation-symmetric s-boxes. In: Yoshida, M., Mouri, K. (eds.) IWSEC 2014. LNCS, vol. 8639, pp. 146–157. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09843-2_12

    Chapter  Google Scholar 

  6. Fei, Y., Ding, A.A., Lao, J., Zhang, L.: A statistics-based fundamental model for side-channel attack analysis. IACR Cryptology ePrint Archive 2014, 152 (2014). http://eprint.iacr.org/2014/152

  7. Fei, Y., Luo, Q., Ding, A.A.: A statistical model for DPA with novel algorithmic confusion analysis. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 233–250. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33027-8_14

    Chapter  Google Scholar 

  8. Guilley, S., Hoogvorst, P., Pacalet, R.: Differential power analysis model and some results. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., El Kalam, A.A. (eds.) CARDIS 2004. IIFIP, vol. 153, pp. 127–142. Springer, Boston, MA (2004). https://doi.org/10.1007/1-4020-8147-2_9

    Chapter  Google Scholar 

  9. Jain, A., Chaudhari, N.S.: Evolving highly nonlinear balanced Boolean functions with improved resistance to DPA attacks. NSS 2015. LNCS, vol. 9408, pp. 316–330. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25645-0_21

    Chapter  Google Scholar 

  10. Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60590-8_16

    Chapter  Google Scholar 

  11. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9

    Chapter  Google Scholar 

  12. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  13. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, New York (2007)

    MATH  Google Scholar 

  14. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33

    Chapter  Google Scholar 

  15. Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Constrained search for a class of good bijective \(s\)-boxes with improved DPA resistivity. IEEE Trans. Inf. Forensics Secur. 8(12), 2154–2163 (2013). https://doi.org/10.1109/TIFS.2013.2285522

    Article  Google Scholar 

  16. Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Design and implementation of rotation symmetric s-boxes with high nonlinearity and high DPA resilience. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 87–92 (June 2013). https://doi.org/10.1109/HST.2013.6581571

  17. Mazumdar, B., Mukhopadhyay, D.: Construction of rotation symmetric s-boxes with high nonlinearity and improved DPA resistivity. IEEE Trans. Comput. 66(1), 59–72 (2017)

    Article  MathSciNet  Google Scholar 

  18. Messerges, T.S., Dabbish, E.A.: Investigations of power analysis attacks on smartcards. In: Guthery, S.B., Honeyman, P. (eds.) Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, 10–11 May 1999. USENIX Association (1999). https://www.usenix.org/conference/usenix-workshop-smartcard-technology/investigations-power-analysis-attacks-smartcards

  19. Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_6

    Chapter  Google Scholar 

  20. Picek, S., Batina, L., Jakobovic, D.: Evolving DPA-resistant Boolean functions. In: Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.) PPSN 2014. LNCS, vol. 8672, pp. 812–821. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2_80

    Chapter  Google Scholar 

  21. Picek, S., Ege, B., Batina, L., Jakobovic, D., Chmielewski, U., Golub, M.: On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems. p. 13–18. CS2 2014, Association for Computing Machinery, New York, NY, USA (2014). https://doi.org/10.1145/2556315.2556319

  22. Picek, S., Mazumdar, B., Mukhopadhyay, D., Batina, L.: Modified transparency order property: solution or just another attempt. In: Chakraborty, R.S., Schwabe, P., Solworth, J. (eds.) SPACE 2015. LNCS, vol. 9354, pp. 210–227. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24126-5_13

    Chapter  Google Scholar 

  23. Prouff, E.: DPA attacks and s-boxes. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 424–441. Springer, Heidelberg (2005). https://doi.org/10.1007/11502760_29

    Chapter  Google Scholar 

  24. Spain, M., Varia, M.: Evolving s-boxes with reduced differential power analysis susceptibility. IACR cryptology ePrint Arch. 2016, 1145 (2016). http://eprint.iacr.org/2016/1145

  25. Wang, Q., Stănică, P.: Transparency order for Boolean functions: analysis and construction. Des. Codes Crypt. 87(9), 2043–2059 (2019). https://doi.org/10.1007/s10623-019-00604-1

    Article  MathSciNet  MATH  Google Scholar 

  26. Xu, Y., Wang, Q.: Searching for highly nonlinear DPA-resistant balanced Boolean functions in the rotation symmetric class. In: 2019 IEEE International Symposium on Information Theory (ISIT), pp. 1212–1216 (July 2019). https://doi.org/10.1109/ISIT.2019.8849385

  27. Zhang, X.M., Zheng, Y.: GAC the criterion for global avalanche characteristics of cryptographic functions. In: Maurer, H., Calude, C., Salomaa, A. (eds.) J. UCS The Journal of Universal Computer Science, pp. 320–337. Springer, Berlin (1996). https://doi.org/10.1007/978-3-642-80350-5_30

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qichun Wang .

Editor information

Editors and Affiliations

Appendices

Appendices

Proposed S-box #2: \(\mathbf {nlf=110,\tau _F=6.8754}\)

[69, 82, 172, 84, 3, 4, 188, 93, 88, 52, 252, 246, 251, 135, 213, 152, 27, 169, 165, 102, 67, 214, 244, 137, 231, 57, 161, 109, 139, 147, 32, 209, 125, 69, 205, 58, 106, 30, 143, 41, 224, 167, 85, 189, 158, 193, 108, 220, 184, 215, 182, 111, 16, 64, 140, 185, 6, 218, 35, 83, 39, 14, 241, 38, 116, 157, 240, 154, 174, 136, 104, 43, 40, 166, 179, 197, 124, 103, 78, 155, 28, 181, 0, 21, 8, 113, 79, 92, 48, 47, 9, 44, 56, 10, 226, 151, 129, 159, 225, 119, 76, 62, 230, 175, 126, 253, 138, 236, 162, 160, 53, 107, 150, 149, 242, 101, 249, 191, 24, 5, 131, 73, 75, 60, 80, 207, 55, 11, 21, 248, 238, 33, 228, 117, 74, 86, 105, 45, 216, 148, 66, 110, 36, 20, 250, 23, 180, 121, 130, 194, 115, 99, 192, 171, 59, 232, 243, 208, 254, 127, 217, 210, 146, 202, 134, 50, 176, 90, 91, 63, 91, 112, 71, 255, 97, 222, 223, 145, 94, 54, 239, 13, 128, 95, 2, 144, 49, 19, 118, 96, 217, 64, 177, 234, 132, 122, 168, 25, 195, 227, 153, 77, 18, 22, 12, 183, 221, 233, 170, 42, 247, 200, 178, 190, 187, 114, 206, 212, 164, 15, 17, 229, 156, 1, 237, 201, 51, 100, 142, 245, 81, 203, 141, 34, 37, 173, 163, 46, 72, 199, 219, 31, 87, 204, 61, 235, 120, 186, 198, 7, 196, 70, 123, 26, 133, 98]

Proposed S-box #3: \(\mathbf {nlf=108,\tau _F=6.8711}\)

[ 69, 82, 172, 84, 3, 4, 188, 93, 88, 52, 252, 246, 251, 135, 213, 152, 27, 169, 165, 102, 67, 214, 244, 137, 231, 49, 161, 109, 139, 147, 32, 209, 125, 73, 205, 58, 106, 30, 143, 41, 224, 163, 85, 189, 158, 193, 108, 220, 184, 215, 182, 111, 16, 64, 140, 185, 6, 218, 35, 87, 39, 14, 241, 38, 116, 157, 240, 154, 174, 136, 104, 43, 40, 166, 179, 197, 124, 103, 78, 155, 28, 181, 0, 21, 8, 113, 79, 92, 48, 47, 9, 44, 56, 10, 226, 151, 129, 159, 225, 119, 76, 62, 230, 175, 126, 253, 138, 236, 162, 160, 53, 107, 150, 149, 242, 101, 249, 191, 24, 5, 131, 73, 75, 60, 80, 207, 55, 11, 29, 248, 238, 33, 228, 117, 74, 86, 105, 45, 216, 148, 66, 110, 36, 20, 250, 23, 180, 121, 130, 194, 119, 99, 192, 171, 59, 232, 243, 208, 254, 127, 217, 210, 146, 202, 134, 50, 176, 90, 91, 63, 211, 112, 67, 255, 97, 222, 223, 145, 94, 54, 239, 13, 128, 95, 2, 144, 49, 19, 118, 96, 89, 64, 177, 234, 132, 122, 168, 25, 195, 227, 153, 77, 18, 22, 12, 183, 221, 233, 170, 42, 247, 200, 178, 190, 187, 114, 206, 212, 164, 15, 17, 229, 156, 1, 237, 201, 51, 100, 142, 245, 81, 203, 141, 34, 37, 173, 167, 46, 72, 199, 219, 31, 87, 204, 61, 235, 120, 186, 198, 7, 196, 70, 123, 26, 133, 98]

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, Y., Wang, Q. (2020). Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds) Information Security. ISC 2020. Lecture Notes in Computer Science(), vol 12472. Springer, Cham. https://doi.org/10.1007/978-3-030-62974-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62974-8_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62973-1

  • Online ISBN: 978-3-030-62974-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics