Skip to main content
Top
Published in: Applicable Algebra in Engineering, Communication and Computing 5/2016

30-01-2016 | Original Paper

On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion

Authors: Riccardo Aragona, Marco Calderini, Daniele Maccauro, Massimiliano Sala

Published in: Applicable Algebra in Engineering, Communication and Computing | Issue 5/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We study the relation among some security parameters for vectorial Boolean functions which prevent attacks on the related block cipher. We focus our study on a recently-introduced security criterion, called weak differential uniformity, which prevents the existence of an undetectable trapdoor based on imprimitive group action. We present some properties of functions with low weak differential uniformity, especially for the case of power functions and 4-bit S-Boxes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aragona, R., Caranti, A., Volta, F. Dalla., Sala, M.: On the group generated by the round functions of translation based ciphers over arbitrary finite fields. Finite Fields Appl. 25, 293–305 (2014) Aragona, R., Caranti, A., Volta, F. Dalla., Sala, M.: On the group generated by the round functions of translation based ciphers over arbitrary finite fields. Finite Fields Appl. 25, 293–305 (2014)
2.
go back to reference Biham, E., Anderson, R., Knudsen, L.: Serpent: a new block cipher proposal. Fast Softw. Encryption, LNCS 1372, 222–238 (1998) Biham, E., Anderson, R., Knudsen, L.: Serpent: a new block cipher proposal. Fast Softw. Encryption, LNCS 1372, 222–238 (1998)
3.
go back to reference Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149–170 (2010)MathSciNetCrossRefMATH Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149–170 (2010)MathSciNetCrossRefMATH
4.
go back to reference Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of \(x\mapsto x^{2^{t}-1}\). IEEE Trans. Inform. Theory 57(12), 8127–8137 (2011)MathSciNetCrossRef Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of \(x\mapsto x^{2^{t}-1}\). IEEE Trans. Inform. Theory 57(12), 8127–8137 (2011)MathSciNetCrossRef
5.
go back to reference Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher, CHES’07. LNCS 4727, 450–466 (2007) Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher, CHES’07. LNCS 4727, 450–466 (2007)
6.
go back to reference Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: An APN permutation in dimension six. In: Finite Fields: Theory and Applications—FQ9, vol. 518, pp. 33–42. AMS, Providence, RI, Contemporary Mathematics (2010) Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: An APN permutation in dimension six. In: Finite Fields: Theory and Applications—FQ9, vol. 518, pp. 33–42. AMS, Providence, RI, Contemporary Mathematics (2010)
7.
go back to reference Calderini, M.: On Boolean functions, symmetric cryptography and algebraic coding theory, PhD Thesis, University of Trento (2015) Calderini, M.: On Boolean functions, symmetric cryptography and algebraic coding theory, PhD Thesis, University of Trento (2015)
8.
go back to reference Calderini, M., Sala, M.: On differential uniformity of maps that may hide an algebraic trapdoor. Algebr. Inform. LNCS 9270, 70–78 (2015) Calderini, M., Sala, M.: On differential uniformity of maps that may hide an algebraic trapdoor. Algebr. Inform. LNCS 9270, 70–78 (2015)
9.
10.
go back to reference Canteaut, A., Naya-Plasencia, M.: Structural weakness of permutations with a low differential uniformity and generalized crooked functions. Finite Fields: Theory and Applications-Selected Papers from the 9th International Conference Finite Fields and Applications, Contemporary Mathematics, p. 518 (2009) Canteaut, A., Naya-Plasencia, M.: Structural weakness of permutations with a low differential uniformity and generalized crooked functions. Finite Fields: Theory and Applications-Selected Papers from the 9th International Conference Finite Fields and Applications, Contemporary Mathematics, p. 518 (2009)
11.
go back to reference Caranti, A., Volta, FDalla, Sala, M.: On some block ciphers and imprimitive groups. Appl. Algebra Engrg. Comm. Comput. 20(5–6), 339–350 (2009)MathSciNetCrossRefMATH Caranti, A., Volta, FDalla, Sala, M.: On some block ciphers and imprimitive groups. Appl. Algebra Engrg. Comm. Comput. 20(5–6), 339–350 (2009)MathSciNetCrossRefMATH
12.
go back to reference Caranti, A., Volta, FDalla, Sala, M.: An application of the O’Nan–Scott theorem to the group generated by the round functions of an AES-like cipher. Des. Codes Cryptogr. 52(3), 293–301 (2009)MathSciNetCrossRefMATH Caranti, A., Volta, FDalla, Sala, M.: An application of the O’Nan–Scott theorem to the group generated by the round functions of an AES-like cipher. Des. Codes Cryptogr. 52(3), 293–301 (2009)MathSciNetCrossRefMATH
14.
go back to reference Coppersmith, D., Grossman, E.: Generators for certain alternating groups with applications to cryptography. SIAM J. Appl. Math. 29(4), 624–627 (1975)MathSciNetCrossRefMATH Coppersmith, D., Grossman, E.: Generators for certain alternating groups with applications to cryptography. SIAM J. Appl. Math. 29(4), 624–627 (1975)MathSciNetCrossRefMATH
15.
go back to reference Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, New York (2013) Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, New York (2013)
16.
18.
go back to reference Fontanari, C., Pulice, V., Rimoldi, A., Sala, M.: On weakly APN function and 4-bit S-boxes. Finite Fields Appl. 18, 522–528 (2012)MathSciNetCrossRefMATH Fontanari, C., Pulice, V., Rimoldi, A., Sala, M.: On weakly APN function and 4-bit S-boxes. Finite Fields Appl. 18, 522–528 (2012)MathSciNetCrossRefMATH
21.
go back to reference Kaliski Jr, B.S., Rivest, R.L., Sherman, A.T.: Is the data encryption standard a group? (Results of cycling experiments on DES). J. Cryptol. 1(1), 3–36 (1988)MathSciNetCrossRefMATH Kaliski Jr, B.S., Rivest, R.L., Sherman, A.T.: Is the data encryption standard a group? (Results of cycling experiments on DES). J. Cryptol. 1(1), 3–36 (1988)MathSciNetCrossRefMATH
23.
go back to reference Nyberg, K.: S-boxes and round functions with controllable linearity and differential uniformity. Fast Softw. Encryption LNCS 1008, 111–130 (1995)MATH Nyberg, K.: S-boxes and round functions with controllable linearity and differential uniformity. Fast Softw. Encryption LNCS 1008, 111–130 (1995)MATH
24.
go back to reference Paterson, K.G.: Imprimitive permutation groups and trapdoors in iterated block ciphers. Fast Softw. Encryption LNCS 1636, 201–214 (1999)CrossRefMATH Paterson, K.G.: Imprimitive permutation groups and trapdoors in iterated block ciphers. Fast Softw. Encryption LNCS 1636, 201–214 (1999)CrossRefMATH
25.
go back to reference Rijmen, V., Preneel, B.: A family of trapdoor ciphers. Fast Softw. Encryption LNCS 1267, 139–148 (1997) Rijmen, V., Preneel, B.: A family of trapdoor ciphers. Fast Softw. Encryption LNCS 1267, 139–148 (1997)
26.
go back to reference Seberry, J., Zhang, X., Zheng, Y.: Pitfalls in designing substitution boxes. In: Advances in Cryptology—CRYPTO ’94, LNCS 839, pp. 383–396 (1994) Seberry, J., Zhang, X., Zheng, Y.: Pitfalls in designing substitution boxes. In: Advances in Cryptology—CRYPTO ’94, LNCS 839, pp. 383–396 (1994)
Metadata
Title
On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion
Authors
Riccardo Aragona
Marco Calderini
Daniele Maccauro
Massimiliano Sala
Publication date
30-01-2016
Publisher
Springer Berlin Heidelberg
Published in
Applicable Algebra in Engineering, Communication and Computing / Issue 5/2016
Print ISSN: 0938-1279
Electronic ISSN: 1432-0622
DOI
https://doi.org/10.1007/s00200-016-0285-8

Other articles of this Issue 5/2016

Applicable Algebra in Engineering, Communication and Computing 5/2016 Go to the issue

Premium Partner