S-box construction from non-permutation power functions

Herman Isa, Norziana Jamil, Muhammad Reza Z'aba

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

A substitution box (s-box) is a nonlinear component function used in most block ciphers. It must fulfill several cryptographic properties such as high nonlinearity, low differential uniformity and complex algebraic expression to resist against linear, differential and interpolation attacks. In this paper, we extend and improve the s-box construction method proposed by Mamadolimov et al. [26, 27] which construct an s-box from power and binomial functions over the finite field F28. We study the cryptographic properties exhibited from our s-box and do a comparative analysis with several known 8×8 bijective s-boxes. Our analysis shows that our proposed s-box is ranked seventh compared to known 8×8 bijective s-boxes in terms of strong cryptographic properties. It even surpasses some known s-boxes used in popular block ciphers.

Original languageEnglish
Title of host publicationSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
Pages46-53
Number of pages8
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event6th International Conference on Security of Information and Networks, SIN 2013 - Aksaray, Turkey
Duration: Nov 26 2013Nov 28 2013

Publication series

NameSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks

Conference

Conference6th International Conference on Security of Information and Networks, SIN 2013
Country/TerritoryTurkey
CityAksaray
Period11/26/1311/28/13

Keywords

  • Bijective s-box
  • Non-permutation power functions
  • Redundancy removal algorithm
  • S-box performance
  • Substitution box

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'S-box construction from non-permutation power functions'. Together they form a unique fingerprint.

Cite this