Abstract
Designing S-box with good cryptographic properties still remains as one of the most important areas of research in symmetric key cryptography. For quite sometime, inverse function (\(x\mapsto x^{-1}\), i.e., \(x^{2^n-2}\)) over \(\mathbb {F}_{2^n}\) has been the most popular choice for S-boxes due to good resistance against differential and linear cryptanalysis. Very recently Tang et. al. (2020) proved that inverse function admits a bias (error) of \(\frac{1}{2^{n-2}}\) when considered in its second-order differential spectrum. In this paper we present experimental results related to higher-order differential spectrum of multiplicative inverse functions for \(n=6\) and 8 and compare the result with APN permutation for \(n=6\). In particular, we observe that APN permutation over \(\mathbb {F}_{2^6}\) has larger bias in its second-order differential spectrum with probability \(\frac{1}{8}\) ( \(\frac{1}{2^{n-2}}\)). This fact admits the possibility of higher-order differential attacks against block ciphers which employ APN permutations as a nonlinear layer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Biryukov, A., Lamberger, M., Mendel, F., Nikolić, I.: Second-order differential collisions for reduced SHA-256. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 270–287. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25385-0_15
Browning, K.A., Dillon, J.F., McQuistan, M.T., Wolfe, A.J.: An APN permutation in dimension six. Contemp. Math. 518, 3–42 (2010)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_34
Carlet, C.: Vectorial Boolean functions for cryptography. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 398–469. Cambridge University Press (2010)
Ivanov, G., Nikolov, N., Nikova, S.: Reversed genetic algorithms for generation of bijective S-boxes with good cryptographic properties. Commun. Crypt. 8(2), 247–276 (2016)
Knudsen, L., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 112–127. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45661-9_9
Knudsen, Lars R.: Truncated and higher order differentials. In: Preneel, Bart (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60590-8_16
Knudsen, L.R.: Partial and higher order differentials and applications to the DES. BRICS Report Series, RS-95-9 (1995)
Lai, X.: Higher order derivatives and differential cryptanalysis. Commun. Crypt. 276, 227–233 (1994)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33
Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 57–76. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34704-7_5
Mariot, L., Picek, S., Leporati, A., Jakobovic, D.: Cellular automata based S-boxes. Commun. Cryptogr. 11(1), 41–62 (2019)
Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_6
Picek, S., Cupic, M., Rotim, L.: A New Cost Function for Evolution of S-Boxes. Evol. Comput. 24(4), 695–718 (2016)
Shamir, A.: Impossible differential attacks. Crypto 1998 rump session
Tsunoo, Y., Saito, T., Shigeri, M., Kawabata, T.: Higher order differential attacks on reduced-round MISTY1. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 415–431. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00730-9_26
Tang, D., Mandal, B., Maitra, S.: Further Cryptographic Properties of the Multiplicative Inverse Function. IACR Cryptol. ePrint Arch, vol. 920 (2020)
Wu, S., Wang, M.: Security Evaluation Against Differential Cryptanalysis for Block Cipher Structures. IACR Cryptol. ePrint Arch, vol. 511 (2011)
Acknowledgments
The authors would like to thank the anonymous reviewers for the detailed comments that improved the technical as well as editorial quality of this paper significantly. The work of Bimal Mandal was supported by the Science and Engineering Research Board, India (Project number: MA1920334SERB008668).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Maitra, S., Mandal, B., Roy, M., Tang, D. (2020). Experimental Results on Higher-Order Differential Spectra of 6 and 8-bit Invertible S-Boxes. In: Batina, L., Picek, S., Mondal, M. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2020. Lecture Notes in Computer Science(), vol 12586. Springer, Cham. https://doi.org/10.1007/978-3-030-66626-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-66626-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66625-5
Online ISBN: 978-3-030-66626-2
eBook Packages: Computer ScienceComputer Science (R0)