Skip to main content

Cryptographically Strong S-Boxes Based on Cellular Automata

  • Conference paper
Cellular Automata (ACRI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5191))

Included in the following conference series:

Abstract

Substitution boxes (S-boxes) are the main elements of block ciphers, wide used in modern cryptography. In this paper we propose a new method to create S-boxes, which is based on application of Cellular Automata (CA). We present results of testing CA-based S-boxes, which confirm that CA are able to realize efficiently Boolean functions corresponding to classical S-boxes. Proposed CA-based S-boxes offer cryptographic properties comparable or better than classical S-box tables.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clark, J.A., Jacob, J.L., Stepney, S.: The Design of S-Boxes by Simulated Annealing. New Generation Computing 23(3), 219–231 (2005)

    Article  MATH  Google Scholar 

  2. Dowson, E., Millan, W., Simpson, L.: Designing Boolean Functions for Cryptographic Applications. Contributions to General Algebra 12, pp. 1–22. Verlag Johannes Heyn, Klagenfurt (2000)

    Google Scholar 

  3. Federal Information Processing Standards Publication, Fips Pub 46-3, DES (1999), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

  4. Federal Information Processing Standards Publications, FIPS PUBS 197, AES (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  5. Fuller, J., Millan, W., Dawson, E.: Multi-objective Optimisation of Bijective S-boxes. In: Proceedings of CEC 2004, Portland, OR (2004)

    Google Scholar 

  6. Millan, W.: How to Improve the Non-linearity of Bijective S-boxes. LNCS, vol. 143, pp. 181–192. Springer, Heidelberg (1998)

    Google Scholar 

  7. Millan, W., Burnett, L., Carter, G., Clark, A., Dawson, E.: Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726. Springer, Heidelberg (1999)

    Google Scholar 

  8. Millan, W.: New Cryptographic Applications of Boolean Function Equivalence Classes. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 572–583. Springer, Heidelberg (2005)

    Google Scholar 

  9. Nedjah, N., de Macedo Mourelle, L.: Designing Substitution Boxes for Secure Ciphers. International Journal Innovative Computing and Application 1(1), 86–91 (2007)

    Article  Google Scholar 

  10. Schneier, B.: Applied Cryptography. Wiley, New York (1996)

    Google Scholar 

  11. Seredynski, F., Bouvry, P., Zomaya, A.Y.: Cellular Automata Computations and Secret Key Cryptography. Parallel Computing 30, 753–766 (2004)

    Article  MathSciNet  Google Scholar 

  12. Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)

    Google Scholar 

  13. Wolfram, S.: A New Kind of Science. Wolfram Media Inc., Champaign (2002)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hiroshi Umeo Shin Morishita Katsuhiro Nishinari Toshihiko Komatsuzaki Stefania Bandini

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Szaban, M., Seredynski, F. (2008). Cryptographically Strong S-Boxes Based on Cellular Automata. In: Umeo, H., Morishita, S., Nishinari, K., Komatsuzaki, T., Bandini, S. (eds) Cellular Automata. ACRI 2008. Lecture Notes in Computer Science, vol 5191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79992-4_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79992-4_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79991-7

  • Online ISBN: 978-3-540-79992-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics