On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs
Identifieur interne : 000897 ( Main/Exploration ); précédent : 000896; suivant : 000898On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs
Auteurs : Bozhong Liu [République populaire de Chine] ; Zheng Gong [République populaire de Chine] ; Weidong Qiu [République populaire de Chine] ; Dong Zheng [République populaire de Chine]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2011.
Abstract
Abstract: In this work we investigate all the 4-bit involutive S-boxes with linear, differential and almost resilient analysis. The results show that involutive S-boxes can be optimal against linear attack. We prove that for a 4-bit involutive S-box there always exists a pair of input and output differences such that the Hamming distance is 1, which does not satisfy the strict resistance on differential analysis. Moreover, we find that the almost resilient property is not effective to judge the security of 4-bit involutive S-boxes in practise. How to use the almost resilient property to set up a criterion for an optimal secure S-box needs investigations.
Url:
DOI: 10.1007/978-3-642-21031-0_19
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 004698
- to stream Istex, to step Curation: 004698
- to stream Istex, to step Checkpoint: 000209
- to stream Main, to step Merge: 000897
- to stream Main, to step Curation: 000897
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs</title>
<author><name sortKey="Liu, Bozhong" sort="Liu, Bozhong" uniqKey="Liu B" first="Bozhong" last="Liu">Bozhong Liu</name>
</author>
<author><name sortKey="Gong, Zheng" sort="Gong, Zheng" uniqKey="Gong Z" first="Zheng" last="Gong">Zheng Gong</name>
</author>
<author><name sortKey="Qiu, Weidong" sort="Qiu, Weidong" uniqKey="Qiu W" first="Weidong" last="Qiu">Weidong Qiu</name>
</author>
<author><name sortKey="Zheng, Dong" sort="Zheng, Dong" uniqKey="Zheng D" first="Dong" last="Zheng">Dong Zheng</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:663C6A43A7EE3C85E266D7AF248F712141A6999B</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1007/978-3-642-21031-0_19</idno>
<idno type="url">https://api.istex.fr/document/663C6A43A7EE3C85E266D7AF248F712141A6999B/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">004698</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">004698</idno>
<idno type="wicri:Area/Istex/Curation">004698</idno>
<idno type="wicri:Area/Istex/Checkpoint">000209</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000209</idno>
<idno type="wicri:doubleKey">0302-9743:2011:Liu B:on:the:security</idno>
<idno type="wicri:Area/Main/Merge">000897</idno>
<idno type="wicri:Area/Main/Curation">000897</idno>
<idno type="wicri:Area/Main/Exploration">000897</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs</title>
<author><name sortKey="Liu, Bozhong" sort="Liu, Bozhong" uniqKey="Liu B" first="Bozhong" last="Liu">Bozhong Liu</name>
<affiliation wicri:level="1"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
<wicri:noRegion>Shanghai</wicri:noRegion>
</affiliation>
</author>
<author><name sortKey="Gong, Zheng" sort="Gong, Zheng" uniqKey="Gong Z" first="Zheng" last="Gong">Zheng Gong</name>
<affiliation wicri:level="3"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer Science, South China Normal University, Guangzhou</wicri:regionArea>
<placeName><settlement type="city">Jiangmen</settlement>
<region type="province">Guangdong</region>
</placeName>
</affiliation>
<affiliation></affiliation>
</author>
<author><name sortKey="Qiu, Weidong" sort="Qiu, Weidong" uniqKey="Qiu W" first="Weidong" last="Qiu">Weidong Qiu</name>
<affiliation wicri:level="1"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
<wicri:noRegion>Shanghai</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>National Laboratory of Communication System Controlling Technology, NO.99, Hongxing Road, Jiaxing City, Zhejiang</wicri:regionArea>
<wicri:noRegion>Zhejiang</wicri:noRegion>
</affiliation>
</author>
<author><name sortKey="Zheng, Dong" sort="Zheng, Dong" uniqKey="Zheng D" first="Dong" last="Zheng">Dong Zheng</name>
<affiliation wicri:level="1"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Information Security Engineering, Shanghai Jiaotong University, Shanghai</wicri:regionArea>
<wicri:noRegion>Shanghai</wicri:noRegion>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2011</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">663C6A43A7EE3C85E266D7AF248F712141A6999B</idno>
<idno type="DOI">10.1007/978-3-642-21031-0_19</idno>
<idno type="ChapterID">19</idno>
<idno type="ChapterID">Chap19</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: In this work we investigate all the 4-bit involutive S-boxes with linear, differential and almost resilient analysis. The results show that involutive S-boxes can be optimal against linear attack. We prove that for a 4-bit involutive S-box there always exists a pair of input and output differences such that the Hamming distance is 1, which does not satisfy the strict resistance on differential analysis. Moreover, we find that the almost resilient property is not effective to judge the security of 4-bit involutive S-boxes in practise. How to use the almost resilient property to set up a criterion for an optimal secure S-box needs investigations.</div>
</front>
</TEI>
<affiliations><list><country><li>République populaire de Chine</li>
</country>
<region><li>Guangdong</li>
</region>
<settlement><li>Jiangmen</li>
</settlement>
</list>
<tree><country name="République populaire de Chine"><noRegion><name sortKey="Liu, Bozhong" sort="Liu, Bozhong" uniqKey="Liu B" first="Bozhong" last="Liu">Bozhong Liu</name>
</noRegion>
<name sortKey="Gong, Zheng" sort="Gong, Zheng" uniqKey="Gong Z" first="Zheng" last="Gong">Zheng Gong</name>
<name sortKey="Qiu, Weidong" sort="Qiu, Weidong" uniqKey="Qiu W" first="Weidong" last="Qiu">Weidong Qiu</name>
<name sortKey="Qiu, Weidong" sort="Qiu, Weidong" uniqKey="Qiu W" first="Weidong" last="Qiu">Weidong Qiu</name>
<name sortKey="Zheng, Dong" sort="Zheng, Dong" uniqKey="Zheng D" first="Dong" last="Zheng">Dong Zheng</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000897 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000897 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= TelematiV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:663C6A43A7EE3C85E266D7AF248F712141A6999B |texte= On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs }}
This area was generated with Dilib version V0.6.31. |