On the Pentanomial Power Mapping Classification of 8-bit to 8-bit S-Boxes
Abstract
:1. Introduction
2. Preliminaries
3. Classification of Pentanomial Power Functions in
Algorithm 1 An Algorithm for Pentanomial Power Mapping Classification. | |
Require: with irreducible polynomial | |
Ensure: | |
▹ An empty set of classes | |
for do | |
▹ The empty array | |
for do | |
over F | |
end for | |
if S is bijective then | |
Calculates | ▹ Nonlinearity |
Calculates | ▹ Differential uniformity |
Calculates | ▹ Minimal algebraic degree |
Calculates | ▹ Absolute indicator |
Calculates | ▹ Fixed points |
Calculates | ▹ Square of sum indicator |
if then | |
add in | ▹ New class is found |
end if | |
end if | |
end for |
4. Conclusions
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Daemen, J.; Rijmen, V. AES Proposal: Rijndael; National Institute of Standards and Technology: Gaithersburg, MD, USA, 1999.
- Kuznetsov, A.; Frontoni, E.; Romeo, L.; Poluyanenko, N.; Kandiy, S.; Kuznetsova, K.; Beňová, E. Optimizing hill climbing algorithm for S-boxes generation. Electronics 2023, 12, 2338. [Google Scholar] [CrossRef]
- Clark, J.A.; Jacob, J.L.; Stepney, S. The design of S-boxes by simulated annealing. New Gener. Comput. 2005, 23, 219–231. [Google Scholar] [CrossRef]
- Ivanov, G.; Nikolov, N.; Nikova, S. Cryptographically strong S-boxes generated by modified immune algorithm. In Cryptography and Information Security in the Balkans, Proceedings of the Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, 3–4 September 2015; Revised Selected Papers 2; Springer: Amsterdam, The Netherlands, 2016; pp. 31–42. [Google Scholar]
- Dimitrov, M.M. On the design of chaos-based S-boxes. IEEE Access 2020, 8, 117173–117181. [Google Scholar] [CrossRef]
- Mariot, L.; Picek, S.; Leporati, A.; Jakobovic, D. Cellular automata based S-boxes. Cryptogr. Commun. 2019, 11, 41–62. [Google Scholar] [CrossRef]
- Aslan, B.; Sakalli, M.T.; Bulus, E. Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions. In Arithmetic of Finite Fields, Proceedings of the 2nd International Workshop, WAIFI 2008, Siena, Italy, 6–9 July 2008; Proceedings 2; Springer: Amsterdam, The Netherlands, 2008; pp. 123–133. [Google Scholar]
- Isa, H.; Syed Junid, S.A.A.; Z’aba, M.R.; Endut, R.; Ammar, S.M.; Ali, N. Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes. Mathematics 2023, 11, 446. [Google Scholar] [CrossRef]
- Dolmatov, V. GOST R 34.12-2015: Block Cipher “Kuznyechik”; Technical Report; Center for Information Protection and Special Communications of the Federal Security Service of the Russian Federation: Moscow, Russia, 2016. [Google Scholar]
- Schneier, B.; Kelsey, J.; Whiting, D.; Wagner, D.; Hall, C.; Ferguson, N. Twofish: A 128-bit block cipher. NIST AES Propos. 1998, 15, 23–91. [Google Scholar]
- Lim, C.H. CRYPTON: A New 128-bit Block Cipher Specification and Analysis. Available online: https://api.semanticscholar.org/CorpusID:56701615 (accessed on 5 June 2024).
- Standaert, F.X.; Piret, G.; Rouvroy, G.; Quisquater, J.J.; Legat, J.D. ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware. In Fast Software Encryption, Proceedings of the 11th International Workshop, FSE 2004, Delhi, India, 5–7 February 2004; Revised Papers 11; Springer: Amsterdam, The Netherlands, 2004; pp. 279–298. [Google Scholar]
- Grosso, V.; Leurent, G.; Standaert, F.X.; Varici, K.; Durvaux, F.; Gaspar, L.; Kerckhof, S. SCREAM & iSCREAM Side-Channel Resistant Authenticated Encryption with Masking. 2014. Available online: https://competitions.cr.yp.to/round1/screamv1.pdf (accessed on 5 June 2024).
- Karpman, P.; Grégoire, B. The LITTLUN S-box and the FLY block cipher. In Proceedings of the Lightweight Cryptography Workshop, Gaithersburg, MD, USA, 17–18 October 2016. [Google Scholar]
- Gérard, B.; Grosso, V.; Naya-Plasencia, M.; Standaert, F.X. Block ciphers that are easier to mask: How far can we go? In Cryptographic Hardware and Embedded Systems-CHES 2013, Proceedings of the 15th International Workshop, Santa Barbara, CA, USA, 20–23 August 2013; Proceedings 15; Springer: Amsterdam, The Netherlands, 2013; pp. 383–399. [Google Scholar]
- Barreto, P.; Rijmen, V. The Khazad legacy-level block cipher. Primit. Submitt. NESSIE 2000, 97, 1–20. [Google Scholar]
- Kanda, M.; Moriai, S.; Aoki, K.; Ueda, H.; Takashima, Y.; Ohta, K.; Matsumoto, T. E2–a new 128-bit block cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2000, 83, 48–59. [Google Scholar]
- SKIPJACK and KEA Algorithm Specifications. 1998. Available online: https://cryptome.org/jya/skipjack-spec.htm (accessed on 5 June 2024).
- Barreto, P.; Rijmen, V. The Whirlpool hashing function. In Proceedings of the First Open NESSIE Workshop, Leuven, Belgium, 13–14 November 2000; Volume 13, p. 14. [Google Scholar]
S Pentanomial Power Mapping | Fixed Points | |||||
---|---|---|---|---|---|---|
112 | 16 | 5 | 56 | 16 | 188,416 | |
112 | 16 | 5 | 56 | 12 | 188,416 | |
112 | 16 | 5 | 56 | 10 | 188,416 | |
112 | 16 | 5 | 56 | 8 | 188,416 | |
112 | 16 | 5 | 56 | 4 | 188,416 | |
112 | 16 | 5 | 56 | 2 | 188,416 | |
112 | 16 | 5 | 48 | 16 | 188,416 | |
112 | 16 | 5 | 48 | 12 | 188,416 | |
112 | 16 | 5 | 48 | 10 | 188,416 | |
112 | 16 | 5 | 48 | 8 | 188,416 | |
112 | 16 | 5 | 48 | 4 | 188,416 | |
112 | 16 | 5 | 48 | 2 | 188,416 | |
112 | 4 | 7 | 32 | 12 | 133,120 | |
112 | 4 | 7 | 32 | 10 | 133,120 | |
112 | 4 | 7 | 32 | 6 | 133,120 | |
112 | 4 | 7 | 32 | 4 | 133,120 | |
112 | 4 | 7 | 32 | 2 | 133,120 | |
108 | 6 | 7 | 64 | 6 | 182,272 | |
108 | 6 | 7 | 64 | 4 | 182,272 | |
108 | 6 | 7 | 64 | 2 | 182,272 | |
108 | 6 | 7 | 64 | 10 | 169,216 | |
108 | 6 | 7 | 64 | 6 | 169,216 | |
108 | 6 | 7 | 64 | 4 | 169,216 | |
108 | 6 | 5 | 64 | 28 | 194,560 | |
108 | 6 | 5 | 64 | 10 | 194,560 | |
108 | 6 | 5 | 64 | 6 | 194,560 | |
108 | 6 | 5 | 64 | 4 | 194,560 | |
108 | 6 | 5 | 64 | 2 | 194,560 | |
108 | 6 | 4 | 64 | 6 | 223,232 | |
108 | 6 | 4 | 64 | 4 | 223,232 | |
108 | 6 | 4 | 64 | 2 | 223,232 | |
106 | 10 | 7 | 64 | 6 | 209,536 | |
106 | 10 | 7 | 64 | 4 | 209,536 | |
106 | 10 | 7 | 64 | 2 | 209,536 | |
106 | 8 | 7 | 96 | 6 | 192,640 | |
106 | 8 | 7 | 96 | 4 | 192,640 | |
106 | 8 | 7 | 96 | 2 | 192,640 | |
106 | 8 | 7 | 96 | 10 | 186,880 | |
106 | 8 | 7 | 96 | 6 | 186,880 | |
106 | 8 | 7 | 96 | 4 | 186,880 | |
106 | 8 | 7 | 96 | 2 | 186,880 | |
106 | 8 | 7 | 80 | 28 | 182,272 | |
106 | 8 | 7 | 80 | 6 | 182,272 | |
106 | 8 | 7 | 80 | 4 | 182,272 | |
106 | 8 | 7 | 80 | 2 | 182,272 | |
106 | 8 | 7 | 72 | 6 | 216,064 | |
106 | 8 | 7 | 72 | 4 | 216,064 | |
106 | 8 | 7 | 72 | 2 | 216,064 | |
106 | 8 | 7 | 72 | 6 | 202,624 | |
106 | 8 | 7 | 72 | 4 | 202,624 | |
106 | 8 | 7 | 72 | 2 | 202,624 | |
106 | 8 | 7 | 72 | 6 | 194,176 | |
106 | 8 | 7 | 72 | 4 | 194,176 | |
106 | 8 | 7 | 72 | 2 | 194,176 | |
106 | 8 | 7 | 72 | 6 | 185,344 | |
106 | 8 | 7 | 72 | 4 | 185,344 | |
106 | 8 | 7 | 72 | 2 | 185,344 | |
106 | 8 | 7 | 64 | 6 | 204,928 | |
106 | 8 | 7 | 64 | 4 | 204,928 | |
106 | 8 | 7 | 64 | 2 | 204,928 | |
106 | 8 | 7 | 64 | 6 | 193,408 | |
106 | 8 | 7 | 64 | 4 | 193,408 | |
106 | 8 | 7 | 64 | 2 | 193,408 | |
106 | 8 | 7 | 64 | 6 | 192,640 | |
106 | 8 | 7 | 64 | 4 | 192,640 | |
106 | 8 | 7 | 64 | 2 | 192,640 | |
106 | 8 | 7 | 64 | 28 | 191,872 | |
106 | 8 | 7 | 64 | 6 | 191,872 | |
106 | 8 | 7 | 64 | 4 | 191,872 | |
106 | 8 | 7 | 64 | 2 | 191,872 | |
106 | 8 | 4 | 72 | 28 | 223,232 | |
106 | 8 | 4 | 72 | 6 | 223,232 | |
106 | 8 | 4 | 72 | 4 | 223,232 | |
106 | 8 | 4 | 72 | 2 | 223,232 | |
106 | 8 | 4 | 72 | 28 | 206,848 | |
106 | 8 | 4 | 72 | 6 | 206,848 | |
106 | 8 | 4 | 72 | 4 | 206,848 | |
106 | 8 | 4 | 72 | 2 | 206,848 | |
106 | 6 | 7 | 120 | 18 | 212,224 | |
106 | 6 | 7 | 120 | 6 | 212,224 | |
106 | 6 | 7 | 120 | 4 | 212,224 | |
106 | 6 | 7 | 120 | 2 | 212,224 | |
106 | 6 | 7 | 96 | 6 | 197,248 | |
106 | 6 | 7 | 96 | 4 | 197,248 | |
106 | 6 | 7 | 96 | 2 | 197,248 | |
106 | 6 | 7 | 96 | 10 | 194,944 | |
106 | 6 | 7 | 96 | 6 | 194,944 | |
106 | 6 | 7 | 96 | 4 | 194,944 | |
106 | 6 | 7 | 96 | 2 | 194,944 | |
106 | 6 | 7 | 96 | 6 | 191,488 | |
106 | 6 | 7 | 96 | 4 | 191,488 | |
106 | 6 | 7 | 96 | 2 | 191,488 | |
106 | 6 | 7 | 96 | 6 | 191,104 | |
106 | 6 | 7 | 96 | 4 | 191,104 | |
106 | 6 | 7 | 96 | 2 | 191,104 | |
106 | 6 | 7 | 96 | 6 | 188,416 | |
106 | 6 | 7 | 96 | 4 | 188,416 | |
106 | 6 | 7 | 96 | 2 | 188,416 | |
106 | 6 | 7 | 96 | 6 | 185,728 | |
106 | 6 | 7 | 96 | 4 | 185,728 | |
106 | 6 | 7 | 96 | 2 | 185,728 | |
106 | 6 | 7 | 80 | 6 | 184,192 | |
106 | 6 | 7 | 80 | 4 | 184,192 | |
106 | 6 | 7 | 80 | 2 | 184,192 | |
106 | 6 | 7 | 80 | 28 | 180,736 | |
106 | 6 | 7 | 80 | 6 | 180,736 | |
106 | 6 | 7 | 80 | 4 | 180,736 | |
106 | 6 | 7 | 80 | 2 | 180,736 | |
106 | 6 | 7 | 72 | 10 | 206,848 | |
106 | 6 | 7 | 72 | 6 | 206,848 | |
106 | 6 | 7 | 72 | 4 | 206,848 | |
106 | 6 | 7 | 72 | 2 | 206,848 | |
106 | 6 | 7 | 64 | 18 | 208,384 | |
106 | 6 | 7 | 64 | 12 | 208,384 | |
106 | 6 | 7 | 64 | 6 | 208,384 | |
106 | 6 | 7 | 64 | 4 | 208,384 | |
106 | 6 | 7 | 64 | 2 | 208,384 | |
106 | 6 | 7 | 64 | 10 | 188,800 | |
106 | 6 | 7 | 64 | 6 | 188,800 | |
106 | 6 | 7 | 64 | 4 | 188,800 | |
106 | 6 | 7 | 64 | 2 | 188,800 | |
106 | 6 | 7 | 64 | 6 | 185,344 | |
106 | 6 | 7 | 64 | 4 | 185,344 | |
106 | 6 | 7 | 64 | 2 | 185,344 | |
106 | 6 | 7 | 64 | 6 | 182,656 | |
106 | 6 | 7 | 64 | 4 | 182,656 | |
106 | 6 | 7 | 64 | 2 | 182,656 | |
106 | 6 | 7 | 64 | 28 | 180,352 | |
106 | 6 | 7 | 64 | 6 | 180,352 | |
106 | 6 | 7 | 64 | 4 | 180,352 | |
106 | 6 | 7 | 64 | 2 | 180,352 | |
106 | 6 | 4 | 64 | 18 | 206,848 | |
106 | 6 | 4 | 64 | 6 | 206,848 | |
106 | 6 | 4 | 64 | 4 | 206,848 | |
106 | 6 | 4 | 64 | 2 | 206,848 |
S | ||||
---|---|---|---|---|
Kuznyechik [9] | 100 | 8 | 7 | 96 |
100 | 8 | 7 | 96 | |
[10] | 96 | 10 | 6 | 112 |
96 | 10 | 6 | 112 | |
[11] | 88 | 16 | 4 | 128 |
88 | 16 | 4 | 128 | |
Iceberg [12] | 96 | 8 | 7 | 96 |
96 | 8 | 7 | 96 | |
iScream [13] | 96 | 16 | 4 | 128 |
96 | 16 | 4 | 128 | |
FLY [14] | 96 | 16 | 3 | 128 |
96 | 16 | 3 | 128 | |
Zorro [15] | 96 | 10 | 5 | 112 |
96 | 10 | 5 | 112 | |
Khazad [16] | 96 | 8 | 7 | 104 |
96 | 8 | 7 | 104 | |
E2 [17] | 100 | 10 | 6 | 104 |
100 | 10 | 6 | 104 | |
Skipjack [18] | 100 | 12 | 6 | 96 |
100 | 12 | 6 | 96 | |
Whirlpool [19] | 100 | 8 | 7 | 96 |
100 | 8 | 7 | 96 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dimitrov, M.; Baicheva, T. On the Pentanomial Power Mapping Classification of 8-bit to 8-bit S-Boxes. Mathematics 2024, 12, 2154. https://doi.org/10.3390/math12142154
Dimitrov M, Baicheva T. On the Pentanomial Power Mapping Classification of 8-bit to 8-bit S-Boxes. Mathematics. 2024; 12(14):2154. https://doi.org/10.3390/math12142154
Chicago/Turabian StyleDimitrov, Miroslav, and Tsonka Baicheva. 2024. "On the Pentanomial Power Mapping Classification of 8-bit to 8-bit S-Boxes" Mathematics 12, no. 14: 2154. https://doi.org/10.3390/math12142154
APA StyleDimitrov, M., & Baicheva, T. (2024). On the Pentanomial Power Mapping Classification of 8-bit to 8-bit S-Boxes. Mathematics, 12(14), 2154. https://doi.org/10.3390/math12142154