Affiliation:
1. Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, 1113 Sofia, Bulgaria
Abstract
Substitution boxes, or S-boxes, are one of the most important mathematical primitives in modern symmetric cryptographic algorithms. Given their importance, in the past decades, they have been thoroughly analyzed and evaluated by the academic world. Thus, a lot of desirable characteristics a given S-box should possess have been found. This includes, as much as possible, higher nonlinearity and algebraic degrees as well as, as much as possible, lower values of differential uniformity, autocorrelation and sum of squares indicator values. In this work, we use power mappings over GF(28) to generate, enumerate and evaluate all bijective S-boxes yielded by pentanomials of the form f(x)=xa+xb+xc+xd+xe given 0<a<b<c<d<e<256. We find a total of 152,320 different bijective S-boxes, which are further classified into 41,458 different groups in terms of the aforementioned characteristics as well as the number of their fixed points. Having this data, an S-box designer can easily generate a bijective substitution S-box with parameters of their choice. By using pentanomials, we show how we can easily construct S-boxes with cryptographic properties similar to those found in some popular S-boxes like the Kuznyechik S-box proposed by the Russian Federation’s standardization agency as well as the Skipjack S-box proposed by the National Security Agency of the USA.
Funder
Ministry of Education and Science of the Republic of Bulgaria
Reference19 articles.
1. Daemen, J., and Rijmen, V. (1999). AES Proposal: Rijndael.
2. Kuznetsov, A., Frontoni, E., Romeo, L., Poluyanenko, N., Kandiy, S., Kuznetsova, K., and Beňová, E. (2023). Optimizing hill climbing algorithm for S-boxes generation. Electronics, 12.
3. The design of S-boxes by simulated annealing;Clark;New Gener. Comput.,2005
4. Ivanov, G., Nikolov, N., and Nikova, S. (2016). Cryptographically strong S-boxes generated by modified immune algorithm. Cryptography and Information Security in the Balkans, Proceedings of the Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, 3–4 September 2015, Springer. Revised Selected Papers 2.
5. On the design of chaos-based S-boxes;Dimitrov;IEEE Access,2020