Nothing Special   »   [go: up one dir, main page]

Skip to main content

Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

The inverse, the Gold, and the Bracken-Leander functions are crucial for building S-boxes of block ciphers with good cryptographic properties in symmetric cryptography. These functions have been intensively studied, and various properties related to standard attacks have been investigated. Thanks to novel advances in symmetric cryptography and, more precisely, those pertaining to boomerang cryptanalysis, this article continues to follow this momentum and further examine these functions. More specifically, we revisit and bring new results about their Difference Distribution Table (DDT), their Boomerang Connectivity Table (BCT), their Feistel Boomerang Connectivity Table (FBCT), and their Feistel Boomerang Difference Table (FBDT). For each table, we give explicit values of all entries by solving specific systems of equations over the finite field \(\mathbb {F}_{2^n}\) of cardinality \(2^n\) and compute the cardinalities of their corresponding sets of such values. The explicit values of the entries of these tables and their cardinalities are crucial tools to test the resistance of block ciphers based on variants of the inverse, the Gold, and the Bracken-Leander functions against cryptanalytic attacks such as differential and boomerang attacks. The computation of these entries and the cardinalities in each table aimed to facilitate the analysis of differential and boomerang cryptanalysis of S-boxes when studying distinguishers and trails.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, vol. 4, no. 1, 3–72 (1991)

    Article  MathSciNet  Google Scholar 

  2. Biham, E., Anderson, R.J., Knudsen, L.R.: Serpent: A new block cipher proposal. In Serge Vaudenay, editor, Fast Software Encryption, 5th International Workshop, FSE’98, Paris, France, March 23-25, 1998, Proceedings, volume 1372 of Lecture Notes in Computer Science, pages 222–238. Springer (1998)

  3. Boukerrou, H., Huynh, P., Lallemand, V., Mandal, B., Minier, M.: On the Feistel Counterpart of the Boomerang Connectivity Table: Introduction and Analysis of the FBCT, IACR Transactions on Symmetric Cryptology, Ruhr-Universität Bochum, 020, Issue 1, 331–362 (2020)

    Article  Google Scholar 

  4. Boura, C., Canteaut, A.: On the Boomerang Uniformity of Cryptographic Sboxes. IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2018, 2018 (3), 290–310 (2018)

  5. Bracken C., Leander G.: A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Appl. 16, 231–242 (2010)

    Article  MathSciNet  Google Scholar 

  6. Browning, K.A., Dillon, J.F., McQuistan, M.T., Wolfe, A.J.: An APN permutation in dimension six, The 9th Conference on Finite Fields and Applications - Fq9, Contemporary Mathematics, 518, 33–42 (2010)

  7. Calderini, M.: Differentially low uniform permutations from known 4-uniform functions, Designs Codes and Cryptography 89, pages 33–52 (2021)

    Article  MathSciNet  Google Scholar 

  8. Calderini, M., Budaghyan, L., Carlet, C.: On known constructions of APN and AB functions and their relation to each other, Cryptology ePrint Archive, Report 2020/1444. https://eprint.iacr.org/2020/1444

  9. Calderini, M., Villa, I.: On the boomerang uniformity of some permutation polynomials, Cryptography and Communications 12, 1161–1178 (2020)

    Article  MathSciNet  Google Scholar 

  10. Carlet, C.: Boolean Functions for Cryptography and Coding Theory, Cambridge University Press, Cambridge (2021)

    Google Scholar 

  11. Carlet, C.: Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform, Mathematics, Computer Science, IEEE Transactions on Information Theory (2018)

    Book  Google Scholar 

  12. Cherly, J., Gallardo, L., Vaserstein, L., Wheland, E.: Solving quadratic equations over polynomial rings of characteristic two, Publicacions Matematiques, Vol 42, 131–142 (1998)

    Article  MathSciNet  Google Scholar 

  13. Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: Boomerang Connectivity Table: A New Cryptanalysis Tool. In Jesper Buus Nielsen and Vincent Rijmen, editors, Advances in Cryptology - EUROCRYPT 2018 -Proceedings, Part II, volume 10821 of Lecture Notes in Computer Science, 683–714. Springer (2018)

  14. Coulter, S., Henderson, M.: A note on the roots of trinomials over a finite field, Bull. Austral. Math. Soc. 69, 429–432 (2004)

    Article  MathSciNet  Google Scholar 

  15. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer (2002)

    Book  Google Scholar 

  16. Data Encryption Standard, National Bureau of Standards, NBS FIPS PUB 46, U.S. Department Of Commerce, January (1977)

  17. Dobbertin, H.: One-to-one highly nonlinear power functions on GF(2n), Appl. Algebra Engrg. Comm. Comput. 9 (2) 139–152 (1998)

    Article  MathSciNet  Google Scholar 

  18. Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (Corresp.), IEEE Transactions on Information Theory, vol.14, issue.1, 154–156 (1968)

  19. GOST 28147-89: Cryptographic Protection for Data Processing Systems, Cryptographic Transformation Algorithm. Government Standard of the U.S.S.R., Inv. No. 3583, UDC 681.325.6:006.354., 1998 (in Russian)

  20. Hasan, S. U., Pal, M., Stănică, P.: The (generalized) boomerang uniformity of some classes of functions over finite fields. The 6th International Workshop on Boolean Functions and their Applications BFA (2021)

  21. Kasami, T.: The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes. Inf. Control. 18(4), 369–394 (1971)

    Article  MathSciNet  Google Scholar 

  22. Kim, H., Kim, S., Hong, D., Sung, J., Hong, S.: Improved Differential-Linear Cryptanalysis Using DLCT, Journal of The Korea Institute of Information Security & Cryptology vol. 28, no.6, Dec. 2018 (2018)

  23. Kölsch, L.: On the inverses of Kasami and Bracken-Leander exponents. Des. Codes Cryptogr. 88, 2597–2621 (2020)

    Article  MathSciNet  Google Scholar 

  24. Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542–7553 (2019)

    Article  MathSciNet  Google Scholar 

  25. Li, Y., Wang, M., Yu, Y.: Constructing Differentially 4-uniform Permutations over GF (22k) from the Inverse Function Revisited IACR Cryptology ePrint Archive 2013: 731, (2013). https://eprint.iacr.org/2013/731

  26. Lidl, R., Niederreiter, H.: Introduction to finite fields and their applications, Cambridge University Press (1986)

  27. Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth T. (eds) Advances in Cryptology - EUROCRYPT’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765. 386–397, Springer, Berlin, Heidelberg (1994)

  28. Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations. Des. Codes Cryptogr. 88, 2233–2246 (2020)

    Article  MathSciNet  Google Scholar 

  29. National Institute of Standards and Technology. Federal Information Processing Standards Publication 197: Announcing the Advanced Encryption Standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  30. Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth T. (eds) Advances in Cryptology - EUROCRYPT’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765, 55–64, Springer, Berlin, Heidelberg (1994)

  31. Pommerening, K.: Quadratic equations in finite fields of characteristic 2, February 2012. http://www.staff.uni-mainz.de/pommeren/MathMisc/QuGlChar2.pdf

  32. Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In Ross Anderson, editor, Fast Software Encryption, volume 809 of Lecture Notes in Computer Science, pages 191–204. Springer Berlin Heidelberg (1994)

  33. Tang, D., Carlet, C., Tang, X.: Differentially 4-uniform bijections by permuting the inverse function. Des. Codes. Cryptogr. 77, 117–141 (2014)

    Article  MathSciNet  Google Scholar 

  34. Tian, S., Boura, C., Perrin, L.: Boomerang uniformity of popular S-box constructions. Des. Codes Cryptogr. 88, 1959–1989 (2020)

    Article  MathSciNet  Google Scholar 

  35. Tu, Z., Li, N., Zeng, X., Zhou, J.: A class of quadrinomial permutations with boomerang uniformity four, in IEEE Transactions on Information Theory, vol. 66, no. 6, 3753–3765 (2020)

    Article  MathSciNet  Google Scholar 

  36. Wagner, D.: The Boomerang Attack. In Lars R. Knudsen, editor, Fast Software Encryption, volume 1636 of Lecture Notes in Computer Science, pages 156–170. Springer (1999)

  37. Wang, H., Peyrin, T.: Boomerang switch in multiple rounds. IACR Trans. Symm. Cryptol., 2019(1): 142–169 (2019)

    Article  Google Scholar 

  38. Zha, Z., Hu, L., Shan, J.: Differentially 6-uniform permutations by modifying the Gold function. In Information and Automation (ICIA), 2014 IEEE International Conference on Information and Automation, 961-965 IEEE (2014)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sihem Mesnager.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eddahmani, S., Mesnager, S. Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes. Cryptogr. Commun. 14, 1301–1344 (2022). https://doi.org/10.1007/s12095-022-00581-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-022-00581-8

Keywords

Mathematics Subject Classification