Skip to main content

Experimental Results on Higher-Order Differential Spectra of 6 and 8-bit Invertible S-Boxes

  • Conference paper
  • First Online:
Security, Privacy, and Applied Cryptography Engineering (SPACE 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12586))

  • 508 Accesses

Abstract

Designing S-box with good cryptographic properties still remains as one of the most important areas of research in symmetric key cryptography. For quite sometime, inverse function (\(x\mapsto x^{-1}\), i.e., \(x^{2^n-2}\)) over \(\mathbb {F}_{2^n}\) has been the most popular choice for S-boxes due to good resistance against differential and linear cryptanalysis. Very recently Tang et. al. (2020) proved that inverse function admits a bias (error) of \(\frac{1}{2^{n-2}}\) when considered in its second-order differential spectrum. In this paper we present experimental results related to higher-order differential spectrum of multiplicative inverse functions for \(n=6\) and 8 and compare the result with APN permutation for \(n=6\). In particular, we observe that APN permutation over \(\mathbb {F}_{2^6}\) has larger bias in its second-order differential spectrum with probability \(\frac{1}{8}\) ( \(\frac{1}{2^{n-2}}\)). This fact admits the possibility of higher-order differential attacks against block ciphers which employ APN permutations as a nonlinear layer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biryukov, A., Lamberger, M., Mendel, F., Nikolić, I.: Second-order differential collisions for reduced SHA-256. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 270–287. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25385-0_15

    Chapter  Google Scholar 

  2. Browning, K.A., Dillon, J.F., McQuistan, M.T., Wolfe, A.J.: An APN permutation in dimension six. Contemp. Math. 518, 3–42 (2010)

    MathSciNet  MATH  Google Scholar 

  3. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)

    Article  MathSciNet  Google Scholar 

  4. Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_34

    Chapter  Google Scholar 

  5. Carlet, C.: Vectorial Boolean functions for cryptography. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 398–469. Cambridge University Press (2010)

    Google Scholar 

  6. Ivanov, G., Nikolov, N., Nikova, S.: Reversed genetic algorithms for generation of bijective S-boxes with good cryptographic properties. Commun. Crypt. 8(2), 247–276 (2016)

    Article  MathSciNet  Google Scholar 

  7. Knudsen, L., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 112–127. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45661-9_9

    Chapter  Google Scholar 

  8. Knudsen, Lars R.: Truncated and higher order differentials. In: Preneel, Bart (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60590-8_16

    Chapter  Google Scholar 

  9. Knudsen, L.R.: Partial and higher order differentials and applications to the DES. BRICS Report Series, RS-95-9 (1995)

    Google Scholar 

  10. Lai, X.: Higher order derivatives and differential cryptanalysis. Commun. Crypt. 276, 227–233 (1994)

    Article  Google Scholar 

  11. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33

    Chapter  Google Scholar 

  12. Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 57–76. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34704-7_5

    Chapter  MATH  Google Scholar 

  13. Mariot, L., Picek, S., Leporati, A., Jakobovic, D.: Cellular automata based S-boxes. Commun. Cryptogr. 11(1), 41–62 (2019)

    Article  MathSciNet  Google Scholar 

  14. Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_6

    Chapter  Google Scholar 

  15. Picek, S., Cupic, M., Rotim, L.: A New Cost Function for Evolution of S-Boxes. Evol. Comput. 24(4), 695–718 (2016)

    Article  Google Scholar 

  16. Shamir, A.: Impossible differential attacks. Crypto 1998 rump session

    Google Scholar 

  17. Tsunoo, Y., Saito, T., Shigeri, M., Kawabata, T.: Higher order differential attacks on reduced-round MISTY1. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 415–431. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00730-9_26

    Chapter  Google Scholar 

  18. Tang, D., Mandal, B., Maitra, S.: Further Cryptographic Properties of the Multiplicative Inverse Function. IACR Cryptol. ePrint Arch, vol. 920 (2020)

    Google Scholar 

  19. Wu, S., Wang, M.: Security Evaluation Against Differential Cryptanalysis for Block Cipher Structures. IACR Cryptol. ePrint Arch, vol. 511 (2011)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for the detailed comments that improved the technical as well as editorial quality of this paper significantly. The work of Bimal Mandal was supported by the Science and Engineering Research Board, India (Project number: MA1920334SERB008668).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bimal Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maitra, S., Mandal, B., Roy, M., Tang, D. (2020). Experimental Results on Higher-Order Differential Spectra of 6 and 8-bit Invertible S-Boxes. In: Batina, L., Picek, S., Mondal, M. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2020. Lecture Notes in Computer Science(), vol 12586. Springer, Cham. https://doi.org/10.1007/978-3-030-66626-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66626-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66625-5

  • Online ISBN: 978-3-030-66626-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics