Algorithm for synthesis of efficient S-boxes based on cellular automata
DOI:
https://doi.org/10.3103/S0735272716050034Keywords:
cellular automaton, S-box, maximum avalanche effectAbstract
A method for synthesis of efficient schemes of S-boxes based on cellular automata satisfying the main criteria of cryptographic quality has been proposed. The cellular automata rules making it possible to obtain S-boxes satisfying the criterion of maximum avalanche effect were found.References
NYBERG, K. Differentially Uniform Mappings for Cryptography. Advances in Cryptology, EUROCRYPT’93, Lecture Notes in Computer Sci., 1994, v.765, p.55-64, DOI: http://dx.doi.org/10.1007/3–540–48285–7_6.
KIM, KWANGJO; MATSUMOTO, TSUTOMU; IMAI, HIDEKI. A recursive construction method of S-boxes satisfying strict avalanche criterion. Advances in Cryptology-CRYPT0’90. Springer, 1991, v.537, p.565-574, DOI: http://dx.doi.org/10.1007/3-540-38424-3_39.
MAZURKOV, M.I.; SOKOLOV, A.V. Synthesis methods of pseudo-random binary sequences with the property of k-gram distribution for encryption tasks. Odes’kyi Politechnichnyi Universystet. Pratsi, 2012, n.1, p.188-198, http://pratsi.opu.ua/articles/show/804.
LOGACHEV, O.A.; SAL’NIKOV, A.A.; YASHCHENKO, V.V. Boolean Functions in the Theory of Coding and Cryptology. Moscow: MTsNMO, 2004 [in Russian].
ROSTOVTSEV, A.G. Large substitutions for program ciphers. Information Security Problems. Computer Systems, 2000, n.3, p.31-34.
CANRIGHT, DAVID. A very compact S-box for AES. Proc. of 7th Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES2005, 29 Aug.–1 Sept. 2005, Edinburgh, UK. NY: Springer-Verlag, 2005, p.441-455, DOI: http://dx.doi.org/10.1007/11545262_32.
SZABAN, MIROSLAW; SEREDYNSKI, FRANCISZEK. Cryptographically strong S-boxes based on cellular automata. Cellular Automata. Springer, 2008, v.5191, p.478-485, DOI: http://dx.doi.org/10.1007/978-3-540-79992-4_62.
SOKOLOV, A.V. New Synthesis Methods of Nonlinear Transformations of Modern Ciphers. LAP, 2015 [in Russian].
ROSTOVTSEV, A.G. Cryptography and Information Security. St. Petersburg: Mir i Sem’ya, 2002 [in Russian].
ZAYKO, Y.N. Cryptography from the physicst’s point of view. Izv. SGU. Fizika, 2009, v.9, n.2, p.34-48, http://www.sgu.ru/files/nodes/60504/N2_2009_Zayko.pdf.
CHANDRASEKHARAPPA, T.G.S.; PREMA, K.V.; SHAMA, KUMARA. S-boxes generated using affine transformation giving maximum avalanche effect. Int. J. Computer Sci. Eng., 2011, v.3, n.9, p.3185-3193, http://www.enggjournals.com/ijcse/doc/IJCSE11-03-09-138.pdf.