Skip to main content
Erschienen in: Applicable Algebra in Engineering, Communication and Computing 5/2016

30.01.2016 | Original Paper

On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion

verfasst von: Riccardo Aragona, Marco Calderini, Daniele Maccauro, Massimiliano Sala

Erschienen in: Applicable Algebra in Engineering, Communication and Computing | Ausgabe 5/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We study the relation among some security parameters for vectorial Boolean functions which prevent attacks on the related block cipher. We focus our study on a recently-introduced security criterion, called weak differential uniformity, which prevents the existence of an undetectable trapdoor based on imprimitive group action. We present some properties of functions with low weak differential uniformity, especially for the case of power functions and 4-bit S-Boxes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aragona, R., Caranti, A., Volta, F. Dalla., Sala, M.: On the group generated by the round functions of translation based ciphers over arbitrary finite fields. Finite Fields Appl. 25, 293–305 (2014) Aragona, R., Caranti, A., Volta, F. Dalla., Sala, M.: On the group generated by the round functions of translation based ciphers over arbitrary finite fields. Finite Fields Appl. 25, 293–305 (2014)
2.
Zurück zum Zitat Biham, E., Anderson, R., Knudsen, L.: Serpent: a new block cipher proposal. Fast Softw. Encryption, LNCS 1372, 222–238 (1998) Biham, E., Anderson, R., Knudsen, L.: Serpent: a new block cipher proposal. Fast Softw. Encryption, LNCS 1372, 222–238 (1998)
3.
Zurück zum Zitat Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149–170 (2010)MathSciNetCrossRefMATH Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149–170 (2010)MathSciNetCrossRefMATH
4.
Zurück zum Zitat Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of \(x\mapsto x^{2^{t}-1}\). IEEE Trans. Inform. Theory 57(12), 8127–8137 (2011)MathSciNetCrossRef Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of \(x\mapsto x^{2^{t}-1}\). IEEE Trans. Inform. Theory 57(12), 8127–8137 (2011)MathSciNetCrossRef
5.
Zurück zum Zitat Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher, CHES’07. LNCS 4727, 450–466 (2007) Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher, CHES’07. LNCS 4727, 450–466 (2007)
6.
Zurück zum Zitat Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: An APN permutation in dimension six. In: Finite Fields: Theory and Applications—FQ9, vol. 518, pp. 33–42. AMS, Providence, RI, Contemporary Mathematics (2010) Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: An APN permutation in dimension six. In: Finite Fields: Theory and Applications—FQ9, vol. 518, pp. 33–42. AMS, Providence, RI, Contemporary Mathematics (2010)
7.
Zurück zum Zitat Calderini, M.: On Boolean functions, symmetric cryptography and algebraic coding theory, PhD Thesis, University of Trento (2015) Calderini, M.: On Boolean functions, symmetric cryptography and algebraic coding theory, PhD Thesis, University of Trento (2015)
8.
Zurück zum Zitat Calderini, M., Sala, M.: On differential uniformity of maps that may hide an algebraic trapdoor. Algebr. Inform. LNCS 9270, 70–78 (2015) Calderini, M., Sala, M.: On differential uniformity of maps that may hide an algebraic trapdoor. Algebr. Inform. LNCS 9270, 70–78 (2015)
9.
Zurück zum Zitat Canteaut, A., Charpin, P., Kyureghyan, G.M.: A new class of monomial bent functions. Finite Fields Appl. 14(1), 221–241 (2008)MathSciNetCrossRefMATH Canteaut, A., Charpin, P., Kyureghyan, G.M.: A new class of monomial bent functions. Finite Fields Appl. 14(1), 221–241 (2008)MathSciNetCrossRefMATH
10.
Zurück zum Zitat Canteaut, A., Naya-Plasencia, M.: Structural weakness of permutations with a low differential uniformity and generalized crooked functions. Finite Fields: Theory and Applications-Selected Papers from the 9th International Conference Finite Fields and Applications, Contemporary Mathematics, p. 518 (2009) Canteaut, A., Naya-Plasencia, M.: Structural weakness of permutations with a low differential uniformity and generalized crooked functions. Finite Fields: Theory and Applications-Selected Papers from the 9th International Conference Finite Fields and Applications, Contemporary Mathematics, p. 518 (2009)
11.
Zurück zum Zitat Caranti, A., Volta, FDalla, Sala, M.: On some block ciphers and imprimitive groups. Appl. Algebra Engrg. Comm. Comput. 20(5–6), 339–350 (2009)MathSciNetCrossRefMATH Caranti, A., Volta, FDalla, Sala, M.: On some block ciphers and imprimitive groups. Appl. Algebra Engrg. Comm. Comput. 20(5–6), 339–350 (2009)MathSciNetCrossRefMATH
12.
Zurück zum Zitat Caranti, A., Volta, FDalla, Sala, M.: An application of the O’Nan–Scott theorem to the group generated by the round functions of an AES-like cipher. Des. Codes Cryptogr. 52(3), 293–301 (2009)MathSciNetCrossRefMATH Caranti, A., Volta, FDalla, Sala, M.: An application of the O’Nan–Scott theorem to the group generated by the round functions of an AES-like cipher. Des. Codes Cryptogr. 52(3), 293–301 (2009)MathSciNetCrossRefMATH
14.
Zurück zum Zitat Coppersmith, D., Grossman, E.: Generators for certain alternating groups with applications to cryptography. SIAM J. Appl. Math. 29(4), 624–627 (1975)MathSciNetCrossRefMATH Coppersmith, D., Grossman, E.: Generators for certain alternating groups with applications to cryptography. SIAM J. Appl. Math. 29(4), 624–627 (1975)MathSciNetCrossRefMATH
15.
Zurück zum Zitat Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, New York (2013) Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, New York (2013)
16.
Zurück zum Zitat Even, S., Goldreich, O.: Des-like functions can generate the alternating group. IEEE Trans. Inform. Theory 29(6), 863–865 (1983)MathSciNetCrossRefMATH Even, S., Goldreich, O.: Des-like functions can generate the alternating group. IEEE Trans. Inform. Theory 29(6), 863–865 (1983)MathSciNetCrossRefMATH
18.
Zurück zum Zitat Fontanari, C., Pulice, V., Rimoldi, A., Sala, M.: On weakly APN function and 4-bit S-boxes. Finite Fields Appl. 18, 522–528 (2012)MathSciNetCrossRefMATH Fontanari, C., Pulice, V., Rimoldi, A., Sala, M.: On weakly APN function and 4-bit S-boxes. Finite Fields Appl. 18, 522–528 (2012)MathSciNetCrossRefMATH
21.
Zurück zum Zitat Kaliski Jr, B.S., Rivest, R.L., Sherman, A.T.: Is the data encryption standard a group? (Results of cycling experiments on DES). J. Cryptol. 1(1), 3–36 (1988)MathSciNetCrossRefMATH Kaliski Jr, B.S., Rivest, R.L., Sherman, A.T.: Is the data encryption standard a group? (Results of cycling experiments on DES). J. Cryptol. 1(1), 3–36 (1988)MathSciNetCrossRefMATH
23.
Zurück zum Zitat Nyberg, K.: S-boxes and round functions with controllable linearity and differential uniformity. Fast Softw. Encryption LNCS 1008, 111–130 (1995)MATH Nyberg, K.: S-boxes and round functions with controllable linearity and differential uniformity. Fast Softw. Encryption LNCS 1008, 111–130 (1995)MATH
24.
Zurück zum Zitat Paterson, K.G.: Imprimitive permutation groups and trapdoors in iterated block ciphers. Fast Softw. Encryption LNCS 1636, 201–214 (1999)CrossRefMATH Paterson, K.G.: Imprimitive permutation groups and trapdoors in iterated block ciphers. Fast Softw. Encryption LNCS 1636, 201–214 (1999)CrossRefMATH
25.
Zurück zum Zitat Rijmen, V., Preneel, B.: A family of trapdoor ciphers. Fast Softw. Encryption LNCS 1267, 139–148 (1997) Rijmen, V., Preneel, B.: A family of trapdoor ciphers. Fast Softw. Encryption LNCS 1267, 139–148 (1997)
26.
Zurück zum Zitat Seberry, J., Zhang, X., Zheng, Y.: Pitfalls in designing substitution boxes. In: Advances in Cryptology—CRYPTO ’94, LNCS 839, pp. 383–396 (1994) Seberry, J., Zhang, X., Zheng, Y.: Pitfalls in designing substitution boxes. In: Advances in Cryptology—CRYPTO ’94, LNCS 839, pp. 383–396 (1994)
Metadaten
Titel
On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion
verfasst von
Riccardo Aragona
Marco Calderini
Daniele Maccauro
Massimiliano Sala
Publikationsdatum
30.01.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Applicable Algebra in Engineering, Communication and Computing / Ausgabe 5/2016
Print ISSN: 0938-1279
Elektronische ISSN: 1432-0622
DOI
https://doi.org/10.1007/s00200-016-0285-8

Weitere Artikel der Ausgabe 5/2016

Applicable Algebra in Engineering, Communication and Computing 5/2016 Zur Ausgabe