Nothing Special   »   [go: up one dir, main page]

Skip to main content

On Characterization of Transparency Order for (nm)-functions

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13007))

Included in the following conference series:

Abstract

The transparency order (denoted by \(\mathcal {TO}\)) is a useful measure of the robustness of (nm)-functions (cryptographic S-boxes as mappings from \(GF(2)^n\) to \(GF(2)^m\)) to multi-bits Differential Power Analysis (DPA). An improved version of transparency order (denoted by \(\mathcal {RTO}\)), based on the use of cross-correlation coefficients, was also introduced recently. For the first time, we resolve this open problem which (nm)-functions reach the upper bound on \(\mathcal {TO}\) for odd n (m is a power of 2). We also investigate the tightness of upper and lower bounds related to \(\mathcal {RTO}\) and derive its relationship to main cryptographic characterizations of (nm)-functions (such as nonlinearity, the sum-of-square indicator and algebraic immunity). Finally, concerning S-boxes of size \(4\times 4\), the distributions of \(\mathcal {RTO}\) for all 302 balanced S-boxes (up to affine equivalence) and 16 equivalence classes of optimal S-boxes are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Carlet, C.: On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 49–62. Springer, Heidelberg (2005). https://doi.org/10.1007/11596219_5

    Chapter  Google Scholar 

  2. Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, New York (2020)

    Book  Google Scholar 

  3. Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., Prouff, E.: Redefining the transparency order. Designs Codes Cryptogr. 82(1–2), 95–115 (2017)

    Article  MathSciNet  Google Scholar 

  4. Fan, L., Zhou, Y., Feng, D.: A fast implementation of computing the transparency order of S-Boxes. In: The 9th International Conference of Young Computer Scientists, 2008, ICYCS 2008, pp. 206–211. IEEE (2008)

    Google Scholar 

  5. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  6. Leander, G., Poschmann, A.: On the classification of 4 bit S-boxes. In: International Workshop on Arithmetic of Finite Fields (WAIFI 2007), pp. 159–176 (2007)

    Google Scholar 

  7. Mazumdar, B., Nyjgioadgtat, D., Sengupta, I.: Constrained search for a class of good bijective S-boxes with improved DPA resistivity. IEEE Trans. Inf. Forensics Secur. 8(12), 2154–2163 (2013)

    Article  Google Scholar 

  8. Pasalic, E., Maitra, S., Johansson, T., Sarkar, P.: New constructions of resilient and correlation immune boolean functions achieving upper bound on nonlinearity. Electron. Notes Disc. Math. 6, 158–167 (2001)

    Article  MathSciNet  Google Scholar 

  9. Picek, S., Batina, L., Jakobovic, D.: Evolving DPA-resistant boolean functions. In: Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.) PPSN 2014. LNCS, vol. 8672, pp. 812–821. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2_80

    Chapter  Google Scholar 

  10. Prouff, E.: DPA attacks and S-boxes. In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, 21–23 February 2005, Revised Selected Papers, pp. 424–441 (2005)

    Google Scholar 

  11. Rothaus, O.S.: On bent functions. J. Comb. Theory A 20, 300–305 (1976)

    Article  Google Scholar 

  12. Sarkar, P., Maitra, S.: Cross-correlation analysis of cryptographically useful boolean functions and S-boxes. Theory Comput. Syst. 35(1), 39–57 (2002)

    Article  MathSciNet  Google Scholar 

  13. Wang, Q., Stǎnicǎ, P.: Transparency order for Boolean functions: analysis and construction. Designs Codes Cryptogr. 87, 2043–2059 (2019)

    Article  MathSciNet  Google Scholar 

  14. Zhang, X., Zheng, Y.: GAC - the criterion for global avalance characteristics of cryptographic functions. J. Univ. Comput. Sci. 1(5), 320–337 (1995)

    MATH  Google Scholar 

  15. Zheng, Y., Zhang, X.: On plateaued functions. IEEE Trans. Inf. Theory 47(3), 1215–1223 (2001)

    Article  MathSciNet  Google Scholar 

  16. Zhou, Y., Xie, M., Xiao, G.: On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity. Inf. Sci. 180(2), 256–265 (2010)

    Article  MathSciNet  Google Scholar 

  17. Zhou, Y., Wei, Y., Zhang, H., Zhang, W.: On the modified transparency order of \((n, m)\)-functions. Secur. Commun. Netw., Article ID 6640099, p. 14 (2021). https://doi.org/10.1155/2021/6640099

Download references

Acknowledgments

Yu Zhou is supported in part by the Sichuan Science and Technology Program (2020JDJQ0076). Yongzhuang Wei is supported by the National Natural Science Foundation of China (61872103), the Guangxi Science and Technology Foundation (Guike AB18281019) and the Guangxi Natural Science Foundation (2019GXNSFGA245004). Hailong Zhang is supported by the National Natural Science Foundation of China (61872040). Enes Pasalic is supported in part by the Slovenian Research Agency (research program P1-0404 and research projects J1-9108, J1-1694, N1-0159, J1-2451). Luyang Li is supported by the Natural Science Foundation of Shaanxi Provincial Department of Education (20JK0911).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, Y., Wei, Y., Zhang, H., Li, L., Pasalic, E., Wu, W. (2021). On Characterization of Transparency Order for (nm)-functions. In: Yu, Y., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2021. Lecture Notes in Computer Science(), vol 13007. Springer, Cham. https://doi.org/10.1007/978-3-030-88323-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-88323-2_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-88322-5

  • Online ISBN: 978-3-030-88323-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics