On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs
Identifieur interne : 004698 ( Istex/Curation ); précédent : 004697; suivant : 004699On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs
Auteurs : Bozhong Liu [République populaire de Chine] ; Zheng Gong [République populaire de Chine] ; Weidong Qiu [République populaire de Chine] ; Dong Zheng [République populaire de Chine]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2011.
Abstract
Abstract: In this work we investigate all the 4-bit involutive S-boxes with linear, differential and almost resilient analysis. The results show that involutive S-boxes can be optimal against linear attack. We prove that for a 4-bit involutive S-box there always exists a pair of input and output differences such that the Hamming distance is 1, which does not satisfy the strict resistance on differential analysis. Moreover, we find that the almost resilient property is not effective to judge the security of 4-bit involutive S-boxes in practise. How to use the almost resilient property to set up a criterion for an optimal secure S-box needs investigations.
Url:
DOI: 10.1007/978-3-642-21031-0_19
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: Pour aller vers cette notice dans l'étape Curation :004698
Links to Exploration step
ISTEX:663C6A43A7EE3C85E266D7AF248F712141A6999BLe document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs</title>
<author><name sortKey="Liu, Bozhong" sort="Liu, Bozhong" uniqKey="Liu B" first="Bozhong" last="Liu">Bozhong Liu</name>
<affiliation wicri:level="1"><mods:affiliation>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
</affiliation>
</author>
<author><name sortKey="Gong, Zheng" sort="Gong, Zheng" uniqKey="Gong Z" first="Zheng" last="Gong">Zheng Gong</name>
<affiliation wicri:level="1"><mods:affiliation>School of Computer Science, South China Normal University, Guangzhou, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer Science, South China Normal University, Guangzhou</wicri:regionArea>
</affiliation>
<affiliation><mods:affiliation>E-mail: cis.gong@gmail.com</mods:affiliation>
<wicri:noCountry code="no comma">E-mail: cis.gong@gmail.com</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Qiu, Weidong" sort="Qiu, Weidong" uniqKey="Qiu W" first="Weidong" last="Qiu">Weidong Qiu</name>
<affiliation wicri:level="1"><mods:affiliation>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>National Laboratory of Communication System Controlling Technology, NO.99, Hongxing Road, Jiaxing City, Zhejiang, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>National Laboratory of Communication System Controlling Technology, NO.99, Hongxing Road, Jiaxing City, Zhejiang</wicri:regionArea>
</affiliation>
</author>
<author><name sortKey="Zheng, Dong" sort="Zheng, Dong" uniqKey="Zheng D" first="Dong" last="Zheng">Dong Zheng</name>
<affiliation wicri:level="1"><mods:affiliation>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:663C6A43A7EE3C85E266D7AF248F712141A6999B</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1007/978-3-642-21031-0_19</idno>
<idno type="url">https://api.istex.fr/document/663C6A43A7EE3C85E266D7AF248F712141A6999B/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">004698</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">004698</idno>
<idno type="wicri:Area/Istex/Curation">004698</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs</title>
<author><name sortKey="Liu, Bozhong" sort="Liu, Bozhong" uniqKey="Liu B" first="Bozhong" last="Liu">Bozhong Liu</name>
<affiliation wicri:level="1"><mods:affiliation>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
</affiliation>
</author>
<author><name sortKey="Gong, Zheng" sort="Gong, Zheng" uniqKey="Gong Z" first="Zheng" last="Gong">Zheng Gong</name>
<affiliation wicri:level="1"><mods:affiliation>School of Computer Science, South China Normal University, Guangzhou, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer Science, South China Normal University, Guangzhou</wicri:regionArea>
</affiliation>
<affiliation><mods:affiliation>E-mail: cis.gong@gmail.com</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Qiu, Weidong" sort="Qiu, Weidong" uniqKey="Qiu W" first="Weidong" last="Qiu">Weidong Qiu</name>
<affiliation wicri:level="1"><mods:affiliation>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>National Laboratory of Communication System Controlling Technology, NO.99, Hongxing Road, Jiaxing City, Zhejiang, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>National Laboratory of Communication System Controlling Technology, NO.99, Hongxing Road, Jiaxing City, Zhejiang</wicri:regionArea>
</affiliation>
</author>
<author><name sortKey="Zheng, Dong" sort="Zheng, Dong" uniqKey="Zheng D" first="Dong" last="Zheng">Dong Zheng</name>
<affiliation wicri:level="1"><mods:affiliation>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China</mods:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2011</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">663C6A43A7EE3C85E266D7AF248F712141A6999B</idno>
<idno type="DOI">10.1007/978-3-642-21031-0_19</idno>
<idno type="ChapterID">19</idno>
<idno type="ChapterID">Chap19</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: In this work we investigate all the 4-bit involutive S-boxes with linear, differential and almost resilient analysis. The results show that involutive S-boxes can be optimal against linear attack. We prove that for a 4-bit involutive S-box there always exists a pair of input and output differences such that the Hamming distance is 1, which does not satisfy the strict resistance on differential analysis. Moreover, we find that the almost resilient property is not effective to judge the security of 4-bit involutive S-boxes in practise. How to use the almost resilient property to set up a criterion for an optimal secure S-box needs investigations.</div>
</front>
</TEI>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Istex/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 004698 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Istex/Curation/biblio.hfd -nk 004698 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= TelematiV1 |flux= Istex |étape= Curation |type= RBID |clé= ISTEX:663C6A43A7EE3C85E266D7AF248F712141A6999B |texte= On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs }}
This area was generated with Dilib version V0.6.31. |