Research on cryptographic properties of a new S-box based on cellular automaton
Correspondences|更新时间:2024-06-05
|
Research on cryptographic properties of a new S-box based on cellular automaton
Journal on CommunicationsVol. 40, Issue 5, Pages: 192-200(2019)
作者机构:
解放军战略支援部队信息工程大学密码工程学院,河南 郑州 450001
作者简介:
基金信息:
The National Natural Science Foundation of China(61572516);The National Natural Science Foundation of China(61272041);The National Natural Science Foundation of China(61272488)
Jie GUAN, Junjun HUANG. Research on cryptographic properties of a new S-box based on cellular automaton[J]. Journal on Communications, 2019, 40(5): 192-200.
DOI:
Jie GUAN, Junjun HUANG. Research on cryptographic properties of a new S-box based on cellular automaton[J]. Journal on Communications, 2019, 40(5): 192-200. DOI: 10.11959/j.issn.1000-436x.2019101.
Research on cryptographic properties of a new S-box based on cellular automaton
A new S-box based on cellular automata was found by experiments.The permutation properties of the S-box were analyzed
which proved that the S-box was a permutation only when the size of lattice was 5.Then the relation between the nontrivial difference transition probability of the S-box and the rank of the difference matrix was proved by constructing the difference matrix.And it was proved that the cyclic shift of input differential would not change the corresponding nontrivial differential transition probability
and obtained the sufficient and necessary conditions about the maximum and minimum nontrivial differential transition probabilities when the size of lattice was 5.Then the problem of the difference distribution of the S-box in this situation is completely solved.
关键词
Keywords
references
MARIOT L , PICEK S , LEPORATI A , et al . Cellular automata based S-boxes [J ] . Cryptography and Communications , 2019 , 11 ( 1 ): 41 - 62 .
NIST . Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm(SHA-3)family [EB ] . Gaithersburg:National Institute of Standards and Technology , 2007 .
BERTONI G , DAEMEN J , PEETERS M , et al . The KECCAK reference,SHA-3 competition (round 3) [EB ] . STMicroelectronics,NXP Semiconductors , 2011 .
DAEMEN J , CLAPP C S K . Fast hashing and stream encryption with PANAMA [C ] // International Workshop on FAST Software Encryption . Springer-Verlag , 1998 : 60 - 74 .
CLAESEN L , DAEMEN J , GENOE M , et al . Subterranean:a 600 Mbit/s cryptographic VLSI chip [C ] // IEEE International Conference on Computer Design:VLSI in Computers and Processors . IEEE , 1993 : 610 - 613 .
DAEMEN J , GOVAERTS R , VANDEWALLE J . A new approach to block cipher design [C ] // Fast Software Encryption . Cambridge Security Workshop , 1993 : 18 - 32 .
DOBRAUNING C , EICHLSEDER M , MENDEL F , et al . Ascon v1.2:submission to the CAESAR competition [EB ] . Institute for Applied Information Processing and Communications,Infineon Technologies Austria AG , 2016 .
SHANNON C E . Communication theory of secrecy systems [J ] . Bell System Technical Journal , 1949 , 28 ( 4 ): 656 - 715 .
NAJI A W , HAMEED S A , ZAIDAN B B , et al . Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques [J ] . International Journal of Computer Science and Information Security , 2009 , 3 ( 1 ): 73 - 78 .
PIEPRZYK J , FINKELSTEIN G . Towards effective nonlinear cryptosystem design [J ] . IEE Proceedings E-Computers and Digital Techniques , 2005 , 135 ( 6 ): 325 - 335 .
LI Q N , LI Y Q , JIANG S J , et al . Research on differential properties of Keccak-like nonlinear transform [J ] . Journal on Communications , 2012 , 33 ( 9 ): 140 - 146 .
DINUR I , MORAWIECKI P , PIEPRZYK J , et al . Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function [J ] . Theory and Application of Cryptographic Techniques , 2015 : 733 - 761 .