Abstract
The transparency order (denoted by \(\mathcal {TO}\)) is a useful measure of the robustness of (n, m)-functions (cryptographic S-boxes as mappings from \(GF(2)^n\) to \(GF(2)^m\)) to multi-bits Differential Power Analysis (DPA). An improved version of transparency order (denoted by \(\mathcal {RTO}\)), based on the use of cross-correlation coefficients, was also introduced recently. For the first time, we resolve this open problem which (n, m)-functions reach the upper bound on \(\mathcal {TO}\) for odd n (m is a power of 2). We also investigate the tightness of upper and lower bounds related to \(\mathcal {RTO}\) and derive its relationship to main cryptographic characterizations of (n, m)-functions (such as nonlinearity, the sum-of-square indicator and algebraic immunity). Finally, concerning S-boxes of size \(4\times 4\), the distributions of \(\mathcal {RTO}\) for all 302 balanced S-boxes (up to affine equivalence) and 16 equivalence classes of optimal S-boxes are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Carlet, C.: On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 49–62. Springer, Heidelberg (2005). https://doi.org/10.1007/11596219_5
Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, New York (2020)
Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., Prouff, E.: Redefining the transparency order. Designs Codes Cryptogr. 82(1–2), 95–115 (2017)
Fan, L., Zhou, Y., Feng, D.: A fast implementation of computing the transparency order of S-Boxes. In: The 9th International Conference of Young Computer Scientists, 2008, ICYCS 2008, pp. 206–211. IEEE (2008)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Leander, G., Poschmann, A.: On the classification of 4 bit S-boxes. In: International Workshop on Arithmetic of Finite Fields (WAIFI 2007), pp. 159–176 (2007)
Mazumdar, B., Nyjgioadgtat, D., Sengupta, I.: Constrained search for a class of good bijective S-boxes with improved DPA resistivity. IEEE Trans. Inf. Forensics Secur. 8(12), 2154–2163 (2013)
Pasalic, E., Maitra, S., Johansson, T., Sarkar, P.: New constructions of resilient and correlation immune boolean functions achieving upper bound on nonlinearity. Electron. Notes Disc. Math. 6, 158–167 (2001)
Picek, S., Batina, L., Jakobovic, D.: Evolving DPA-resistant boolean functions. In: Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.) PPSN 2014. LNCS, vol. 8672, pp. 812–821. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2_80
Prouff, E.: DPA attacks and S-boxes. In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, 21–23 February 2005, Revised Selected Papers, pp. 424–441 (2005)
Rothaus, O.S.: On bent functions. J. Comb. Theory A 20, 300–305 (1976)
Sarkar, P., Maitra, S.: Cross-correlation analysis of cryptographically useful boolean functions and S-boxes. Theory Comput. Syst. 35(1), 39–57 (2002)
Wang, Q., Stǎnicǎ, P.: Transparency order for Boolean functions: analysis and construction. Designs Codes Cryptogr. 87, 2043–2059 (2019)
Zhang, X., Zheng, Y.: GAC - the criterion for global avalance characteristics of cryptographic functions. J. Univ. Comput. Sci. 1(5), 320–337 (1995)
Zheng, Y., Zhang, X.: On plateaued functions. IEEE Trans. Inf. Theory 47(3), 1215–1223 (2001)
Zhou, Y., Xie, M., Xiao, G.: On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity. Inf. Sci. 180(2), 256–265 (2010)
Zhou, Y., Wei, Y., Zhang, H., Zhang, W.: On the modified transparency order of \((n, m)\)-functions. Secur. Commun. Netw., Article ID 6640099, p. 14 (2021). https://doi.org/10.1155/2021/6640099
Acknowledgments
Yu Zhou is supported in part by the Sichuan Science and Technology Program (2020JDJQ0076). Yongzhuang Wei is supported by the National Natural Science Foundation of China (61872103), the Guangxi Science and Technology Foundation (Guike AB18281019) and the Guangxi Natural Science Foundation (2019GXNSFGA245004). Hailong Zhang is supported by the National Natural Science Foundation of China (61872040). Enes Pasalic is supported in part by the Slovenian Research Agency (research program P1-0404 and research projects J1-9108, J1-1694, N1-0159, J1-2451). Luyang Li is supported by the Natural Science Foundation of Shaanxi Provincial Department of Education (20JK0911).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, Y., Wei, Y., Zhang, H., Li, L., Pasalic, E., Wu, W. (2021). On Characterization of Transparency Order for (n, m)-functions. In: Yu, Y., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2021. Lecture Notes in Computer Science(), vol 13007. Springer, Cham. https://doi.org/10.1007/978-3-030-88323-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-88323-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-88322-5
Online ISBN: 978-3-030-88323-2
eBook Packages: Computer ScienceComputer Science (R0)