Algorithm for synthesis of efficient S-boxes based on cellular automata

Authors

  • Michael I. Mazurkov Odessa National Polytechnic University, Ukraine
  • Artem V. Sokolov Odessa National Polytechnic University, Ukraine

DOI:

https://doi.org/10.3103/S0735272716050034

Keywords:

cellular automaton, S-box, maximum avalanche effect

Abstract

A method for synthesis of efficient schemes of S-boxes based on cellular automata satisfying the main criteria of cryptographic quality has been proposed. The cellular automata rules making it possible to obtain S-boxes satisfying the criterion of maximum avalanche effect were found.

References

  1. NYBERG, K. Differentially Uniform Mappings for Cryptography. Advances in Cryptology, EUROCRYPT’93, Lecture Notes in Computer Sci., 1994, v.765, p.55-64, DOI: http://dx.doi.org/10.1007/3–540–48285–7_6.
  2. KIM, KWANGJO; MATSUMOTO, TSUTOMU; IMAI, HIDEKI. A recursive construction method of S-boxes satisfying strict avalanche criterion. Advances in Cryptology-CRYPT0’90. Springer, 1991, v.537, p.565-574, DOI: http://dx.doi.org/10.1007/3-540-38424-3_39.
  3. MAZURKOV, M.I.; SOKOLOV, A.V. Synthesis methods of pseudo-random binary sequences with the property of k-gram distribution for encryption tasks. Odes’kyi Politechnichnyi Universystet. Pratsi, 2012, n.1, p.188-198, http://pratsi.opu.ua/articles/show/804.
  4. LOGACHEV, O.A.; SAL’NIKOV, A.A.; YASHCHENKO, V.V. Boolean Functions in the Theory of Coding and Cryptology. Moscow: MTsNMO, 2004 [in Russian].
  5. ROSTOVTSEV, A.G. Large substitutions for program ciphers. Information Security Problems. Computer Systems, 2000, n.3, p.31-34.
  6. CANRIGHT, DAVID. A very compact S-box for AES. Proc. of 7th Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES2005, 29 Aug.–1 Sept. 2005, Edinburgh, UK. NY: Springer-Verlag, 2005, p.441-455, DOI: http://dx.doi.org/10.1007/11545262_32.
  7. SZABAN, MIROSLAW; SEREDYNSKI, FRANCISZEK. Cryptographically strong S-boxes based on cellular automata. Cellular Automata. Springer, 2008, v.5191, p.478-485, DOI: http://dx.doi.org/10.1007/978-3-540-79992-4_62.
  8. SOKOLOV, A.V. New Synthesis Methods of Nonlinear Transformations of Modern Ciphers. LAP, 2015 [in Russian].
  9. ROSTOVTSEV, A.G. Cryptography and Information Security. St. Petersburg: Mir i Sem’ya, 2002 [in Russian].
  10. ZAYKO, Y.N. Cryptography from the physicst’s point of view. Izv. SGU. Fizika, 2009, v.9, n.2, p.34-48, http://www.sgu.ru/files/nodes/60504/N2_2009_Zayko.pdf.
  11. CHANDRASEKHARAPPA, T.G.S.; PREMA, K.V.; SHAMA, KUMARA. S-boxes generated using affine transformation giving maximum avalanche effect. Int. J. Computer Sci. Eng., 2011, v.3, n.9, p.3185-3193, http://www.enggjournals.com/ijcse/doc/IJCSE11-03-09-138.pdf.

Published

2016-05-21

Issue

Section

Research Articles