An algorithm for evaluating the linear redundancy and the factor of inertial groups of S-box
DOI:
https://doi.org/10.54654/isj.v7i1.57Keywords:
S-boxes, affine equivalence, inertial group, non-linear, linear redundancy, Boolean function.Tóm tắt
Abstract— This paper presents an algorithm for evaluating the linear redundancy and the factor of inertial groups with small computational complexity. Specifically, the article introduces the concept of the factor of inertial groups, the relationship between the factor of inertial groups and the linear redundancy of S-box. Thus, it is recommended to use S-boxes that do not possess linear redundancy and have the factor of inertial groups equal to 1 to have better cryptographic properties, and also provide an algorithm for searching such large size S-boxes.
Tóm tắt— Bài viết này đưa ra thuật toán đánh giá độ dư thừa tuyến tính và hệ số quán tính của S-hộp với độ phức tạp tính toán nhỏ. Khái niệm hệ số quán tính, mối liên quan giữa hệ số nhóm quán tính và độ dư thừa tuyến tính của S-hộp được phân tích cụ thể. Qua đó, đưa ra khuyến nghị nên sử dụng các S-hộp không sở hữu độ dư thừa tuyến tính và có hệ số quán tính bằng 1 để có tính chất mật mã tốt hơn, đồng thời cũng đưa ra thuật toán để tìm các S-hộp kích thước lớn như vậy.
Downloads
References
[1]. Panasenko, “Encryption Algorithms, Specialized book”, BHV-Petersburg, pp. 576, 2009.
[2]. Alex Birykov, Christophe De Cannere, An Braeken, and Barn Prenell, “A Toolbox for Cryptanalysis: Linear and Affine Equivalent Algorithms”, Advances in Cryptology – EUROCRYPTO 2003. Springer, Vol. 2656, pp. 33–50, 2003.
[3]. N. P. Borisenko, “ Using search algorithm of affine equivalent S-boxes set for their quality assessment”, Ban Cơ yếu Chính Phủ, Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin, Hà Nội, pp.11-16, 2016.
[4]. O. A.Logachev, A. A. Salnikov, S. V. Smyshlyaev [and another]. “Boolean functions in coding theory and cryptology”, Moscow: LENAND, pp. 576, 2015.
[5]. Joanne Fuller and William Millan, “Linear redundancy in S-boxes” in Fast Software Encryption. Springer, pp. 15, 2003.
[6]. Niels Ferguson, Richard Schroeppel, and Doug Whiting “A Simple Algebraic Representation of Rijndael”. SAC 2001, LNCS 2259, pp. 103–111, 2001.
[7]. Nguyen Bui Cuong, Nguyen Van Long, Hoang Dinh Linh, “Analyzing the influence of linear redundancy in S-boxes with affine equivalence within XSL-like round functions”, Yaroslavl: CTCrypt, pp. 9, 2016.
[8]. Stjepan Picek, “Applications of Evolutionary Computation to Cryptology”, Radboud University, Netherlands, pp. 184, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).