Abstract
The inverse, the Gold, and the Bracken-Leander functions are crucial for building S-boxes of block ciphers with good cryptographic properties in symmetric cryptography. These functions have been intensively studied, and various properties related to standard attacks have been investigated. Thanks to novel advances in symmetric cryptography and, more precisely, those pertaining to boomerang cryptanalysis, this article continues to follow this momentum and further examine these functions. More specifically, we revisit and bring new results about their Difference Distribution Table (DDT), their Boomerang Connectivity Table (BCT), their Feistel Boomerang Connectivity Table (FBCT), and their Feistel Boomerang Difference Table (FBDT). For each table, we give explicit values of all entries by solving specific systems of equations over the finite field \(\mathbb {F}_{2^n}\) of cardinality \(2^n\) and compute the cardinalities of their corresponding sets of such values. The explicit values of the entries of these tables and their cardinalities are crucial tools to test the resistance of block ciphers based on variants of the inverse, the Gold, and the Bracken-Leander functions against cryptanalytic attacks such as differential and boomerang attacks. The computation of these entries and the cardinalities in each table aimed to facilitate the analysis of differential and boomerang cryptanalysis of S-boxes when studying distinguishers and trails.
Similar content being viewed by others
References
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, vol. 4, no. 1, 3–72 (1991)
Biham, E., Anderson, R.J., Knudsen, L.R.: Serpent: A new block cipher proposal. In Serge Vaudenay, editor, Fast Software Encryption, 5th International Workshop, FSE’98, Paris, France, March 23-25, 1998, Proceedings, volume 1372 of Lecture Notes in Computer Science, pages 222–238. Springer (1998)
Boukerrou, H., Huynh, P., Lallemand, V., Mandal, B., Minier, M.: On the Feistel Counterpart of the Boomerang Connectivity Table: Introduction and Analysis of the FBCT, IACR Transactions on Symmetric Cryptology, Ruhr-Universität Bochum, 020, Issue 1, 331–362 (2020)
Boura, C., Canteaut, A.: On the Boomerang Uniformity of Cryptographic Sboxes. IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2018, 2018 (3), 290–310 (2018)
Bracken C., Leander G.: A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Appl. 16, 231–242 (2010)
Browning, K.A., Dillon, J.F., McQuistan, M.T., Wolfe, A.J.: An APN permutation in dimension six, The 9th Conference on Finite Fields and Applications - Fq9, Contemporary Mathematics, 518, 33–42 (2010)
Calderini, M.: Differentially low uniform permutations from known 4-uniform functions, Designs Codes and Cryptography 89, pages 33–52 (2021)
Calderini, M., Budaghyan, L., Carlet, C.: On known constructions of APN and AB functions and their relation to each other, Cryptology ePrint Archive, Report 2020/1444. https://eprint.iacr.org/2020/1444
Calderini, M., Villa, I.: On the boomerang uniformity of some permutation polynomials, Cryptography and Communications 12, 1161–1178 (2020)
Carlet, C.: Boolean Functions for Cryptography and Coding Theory, Cambridge University Press, Cambridge (2021)
Carlet, C.: Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform, Mathematics, Computer Science, IEEE Transactions on Information Theory (2018)
Cherly, J., Gallardo, L., Vaserstein, L., Wheland, E.: Solving quadratic equations over polynomial rings of characteristic two, Publicacions Matematiques, Vol 42, 131–142 (1998)
Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: Boomerang Connectivity Table: A New Cryptanalysis Tool. In Jesper Buus Nielsen and Vincent Rijmen, editors, Advances in Cryptology - EUROCRYPT 2018 -Proceedings, Part II, volume 10821 of Lecture Notes in Computer Science, 683–714. Springer (2018)
Coulter, S., Henderson, M.: A note on the roots of trinomials over a finite field, Bull. Austral. Math. Soc. 69, 429–432 (2004)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer (2002)
Data Encryption Standard, National Bureau of Standards, NBS FIPS PUB 46, U.S. Department Of Commerce, January (1977)
Dobbertin, H.: One-to-one highly nonlinear power functions on GF(2n), Appl. Algebra Engrg. Comm. Comput. 9 (2) 139–152 (1998)
Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (Corresp.), IEEE Transactions on Information Theory, vol.14, issue.1, 154–156 (1968)
GOST 28147-89: Cryptographic Protection for Data Processing Systems, Cryptographic Transformation Algorithm. Government Standard of the U.S.S.R., Inv. No. 3583, UDC 681.325.6:006.354., 1998 (in Russian)
Hasan, S. U., Pal, M., Stănică, P.: The (generalized) boomerang uniformity of some classes of functions over finite fields. The 6th International Workshop on Boolean Functions and their Applications BFA (2021)
Kasami, T.: The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes. Inf. Control. 18(4), 369–394 (1971)
Kim, H., Kim, S., Hong, D., Sung, J., Hong, S.: Improved Differential-Linear Cryptanalysis Using DLCT, Journal of The Korea Institute of Information Security & Cryptology vol. 28, no.6, Dec. 2018 (2018)
Kölsch, L.: On the inverses of Kasami and Bracken-Leander exponents. Des. Codes Cryptogr. 88, 2597–2621 (2020)
Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542–7553 (2019)
Li, Y., Wang, M., Yu, Y.: Constructing Differentially 4-uniform Permutations over GF (22k) from the Inverse Function Revisited IACR Cryptology ePrint Archive 2013: 731, (2013). https://eprint.iacr.org/2013/731
Lidl, R., Niederreiter, H.: Introduction to finite fields and their applications, Cambridge University Press (1986)
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth T. (eds) Advances in Cryptology - EUROCRYPT’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765. 386–397, Springer, Berlin, Heidelberg (1994)
Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations. Des. Codes Cryptogr. 88, 2233–2246 (2020)
National Institute of Standards and Technology. Federal Information Processing Standards Publication 197: Announcing the Advanced Encryption Standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth T. (eds) Advances in Cryptology - EUROCRYPT’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765, 55–64, Springer, Berlin, Heidelberg (1994)
Pommerening, K.: Quadratic equations in finite fields of characteristic 2, February 2012. http://www.staff.uni-mainz.de/pommeren/MathMisc/QuGlChar2.pdf
Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In Ross Anderson, editor, Fast Software Encryption, volume 809 of Lecture Notes in Computer Science, pages 191–204. Springer Berlin Heidelberg (1994)
Tang, D., Carlet, C., Tang, X.: Differentially 4-uniform bijections by permuting the inverse function. Des. Codes. Cryptogr. 77, 117–141 (2014)
Tian, S., Boura, C., Perrin, L.: Boomerang uniformity of popular S-box constructions. Des. Codes Cryptogr. 88, 1959–1989 (2020)
Tu, Z., Li, N., Zeng, X., Zhou, J.: A class of quadrinomial permutations with boomerang uniformity four, in IEEE Transactions on Information Theory, vol. 66, no. 6, 3753–3765 (2020)
Wagner, D.: The Boomerang Attack. In Lars R. Knudsen, editor, Fast Software Encryption, volume 1636 of Lecture Notes in Computer Science, pages 156–170. Springer (1999)
Wang, H., Peyrin, T.: Boomerang switch in multiple rounds. IACR Trans. Symm. Cryptol., 2019(1): 142–169 (2019)
Zha, Z., Hu, L., Shan, J.: Differentially 6-uniform permutations by modifying the Gold function. In Information and Automation (ICIA), 2014 IEEE International Conference on Information and Automation, 961-965 IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Eddahmani, S., Mesnager, S. Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes. Cryptogr. Commun. 14, 1301–1344 (2022). https://doi.org/10.1007/s12095-022-00581-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-022-00581-8
Keywords
- Symmetric cryptography
- Vectorial function
- S-box
- Difference Distribution Table
- Boomerang Connectivity Table
- Feistel Boomerang Connectivity Table
- Feistel Boomerang Difference Table
- Inverse function
- Gold function
- Bracken-Leander function