Understanding S-Box Security Assessment: A Practical Guide
Abstract
1. Introduction
- 1.
- What is an S-box, and why is it a key component in the security of a cipher? This work presents the functionality of the S-box in a cipher and describes three approaches for constructing this component. It also explains how the structure and construction of the S-box impact the security of the cipher.
- 2.
- How is the security level of an S-box determined, and what is its relationship with the principles of confusion and diffusion? The security level of an S-box is determined by various cryptographic properties, whose values are derived from mathematical formulas. Although these values are typically calculated using computer programs, differences in the notation of these formulas across different works can make it challenging to understand the fundamental concepts involved in evaluating S-boxes. Thus, this paper focuses on these variations and discusses their relationships in the context of S-box evaluation. Moreover, through specific examples, it shows how these formulas reveal the capacity of an S-box to contribute to the principles of confusion and diffusion.
- 3.
- What conflicts influence the robustness of an S-box? This paper aims to explain the internal conflicts within the evaluation of an S-box’s security level. While it is not possible to design a perfect S-box, a high level of security can be achieved by carefully balancing various design trade-offs.
2. Related Work
| Tutorials/SoK/ Notes/Chapter | Target Audience | Properties Related to: | Construction Approaches | Conflicts Among S-Box Properties | ||||
|---|---|---|---|---|---|---|---|---|
| DAs | LAs | AAs | BAs | Diffusion | ||||
| Bao et al. [32] | Specialist | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| Waheed et al. [33] | Specialist | ✓ | ✓ | ✓ | ✓ | |||
| Easttom [31] | Non-specialist | ✓ | ✓ | |||||
| Boura [30] | Non-specialist | ✓ | ✓ | |||||
| Canteaut [34] | Specialist | ✓ | ✓ | ✓ | ||||
| Perrin [35] | Specialist | ✓ | ✓ | ✓ | ||||
| This work | Non-specialist | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
3. The Functionality of the S-Box
The S-Box Resistance Against Attacks
- In the first phase, the attacker analyzes the nonlinear component (typically the S-box) to identify characteristics or patterns that enable the construction of distinguishers. These distinguishers allow the adversary to differentiate the cipher from a pseudorandom function.
- In the second phase, by using the distinguishers along with suitable pairs of plaintexts and ciphertexts, the adversary can recover some or all bits of the secret key.
4. The Construction of an S-Box
5. S-Box Properties
5.1. Structural Properties
- 1.
- 2.
- Type of function: The S-box can be bijective and non-bijective. If and the output the S-box must be a permutation, then the S-box is bijective and balanced [15,53]. Bijective S-boxes are typically used in ciphers that require inversion for decryption, such as those based on Substitution Permutation Networks (SPNs) [12,41]. In contrast, Feistel network-based ciphers can use either bijective or non-bijective S-boxes, as they do not rely on inversion [7,13,54].
- 3.
- Output: This property specifies the type of output produced by the S-box. The classical approach uses a static output, meaning that the same S-box is applied in every round. In contrast, a dynamic output is a more recent trend, where the S-box varies based on the key of the cipher [55,56]. In this case, a different S-box is used in each round, which can enhance security. However, in this work, we focus on evaluating the security of static S-boxes.
5.2. Confusion Properties: Resistance to Differential, Linear, Algebraic, and Boomerang Attacks
5.2.1. Resistance to Differential Attacks
- (a)
- The adversary selects two messages or plaintexts () and obtains their corresponding ciphertexts ().
- (b)
- The adversary computes the input difference, which is defined as , and the output difference, given by .
- (c)
- The adversary attempts to exploit these differences to find a high probability of .
| Algorithm 1 Differential Uniformity Computation |
| Require: int n, m, S-box S |
| Ensure: int , double |
|
| Algorithm 2 More Efficient Differential Uniformity Computation |
| Require: int n, m, S-box S |
| Ensure: int , double |
|
5.2.2. Resistance to Linear Attacks
5.2.3. Resistance to Boomerang Attacks
- (a)
- The adversary generates a message and derives a second message using a difference a. Then both messages are encrypted.
- (b)
- Using the encrypted outputs of Step 1 and a new difference b, the adversary constructs messages and . Then, he gets and by using D (the inverse of C).
- (c)
- Finally, the adversary analyzes the resulting differences, aiming to find a high probability of the event .
5.2.4. Resistance to Algebraic Attacks
- (a)
- The adversary attempts to describe the cipher using a system of simple equations () based on the plaintext (M), ciphertext (E), and secret key ().
- (b)
- The adversary tries to solve this system to extract the secret key, using known plaintext/ciphertext pairs ().
Deriving the ANF and AD of the TWINE S-Box
| Algorithm 3 Algebraic Degree Computation |
| Require: int , Sbox S |
| Ensure: int |
|
5.2.5. Highlights on Confusion Properties
5.3. Diffusion Properties: Resistance to Differential and Linear Attacks
5.3.1. Strict Avalanche Criterion (SAC)
| Algorithm 4 Strict Avalanche Criterion |
| Require: int , Sbox S |
| Ensure: double |
|
5.3.2. CarD1 and CarL1
5.3.3. Highlights on Diffusion Properties
5.4. Relation Among Attacks, Property and Optimal Values
- 1.
- Determine the target S-box (structural properties) based on the cipher’s structure and application.
- 2.
- Evaluate classical properties related to linear, differential, and algebraic attacks.
- 3.
- Assess additional resistance against novel or cipher-specific attacks, such as boomerang or advanced algebraic attacks.
- 4.
- Consider conflicts among properties, recognizing that improving one property may degrade another.
- 5.
- Incorporate implementation constraints, including hardware or software costs and efficiency considerations.
Highlights on Relation Between Attacks and S-Box Properties
6. Conflicts Among S-Box Properties
- (a)
- Bijective vs. Non-bijective S-boxes: Bijective S-boxes are balanced and generally more secure than non-bijective ones [37]. Non-bijective S-boxes can only be used in ciphers that do not require the inverse of the component, such as Feistel constructions. However, non-bijective functions can achieve optimal NL values because they are not required to be balanced.
- (b)
- (c)
- CarL1 vs. DU: For a S-box, the optimal DU value is 4, but in that case, CarL1 equals 2. If we aim for , then DU increases to 6. Furthermore, achieving results in , which implies [70]. This trade-off extends one proposed by Zhang et al. in [25]. An optimal S-box (S reaches balance, its is 4, and its L is 8 [15]) exhibits .
- (d)
- APN for bijective S-boxes whenn is even: As previously mentioned, there is no APN S-box for , and for , the existence of such functions remains an open problem.
- (e)
- Large vs. Small S-boxes: Large S-boxes offer higher security but consume more device resources. This effect can be observed in Table 12, which shows the MDP of an S-box with compared to the MDP of an S-box with . Higher MDP values indicate a greater probability of finding differential distinguishers. However, storing LUT or computing a large S-box requires significantly more memory and computational resources than a smaller S-box. A common recommendation for implementing small nonlinear components in ciphers is to increase the number of rounds [52], although this results in higher latency when processing the ciphertext.
- (f)
- Dynamic vs. Static S-boxes: S-boxes with dynamic outputs offer improved security but require more resources, as a new S-box must be generated for each round [56]. This process may also introduce additional latency
- (g)
- CS S-boxes vs. Static S-boxes: Computed S-boxes (CS-boxes) do not require memory to store S-box values, whereas LUT-based S-boxes offer the best performance. Alternatively, hybrid solutions combine both approaches to achieve a good trade-off between cost and performance [75].
- (h)
- Small L and DU vs. Less circuit area: Achieving small L and DU values requires greater circuit area usage [21].
- (i)
7. Toolkits to Analyze S-Boxes
Evaluation of Different S-Boxes
8. Open Research Challenges
- 1.
- Analysis of Boolean functions for S-box construction: Identifying and analyzing suitable Boolean functions remains an ongoing challenge in the development of stronger S-box designs. This open problem is related to the algebraic construction discussed in Section 4, which notes that the inverse function achieves optimal results for certain S-box sizes. However, the uncertainty about its optimality when , combined with its known vulnerability to algebraic attacks, highlights the need to investigate alternative functions. For example, several functions from finite field theory, such as the Gold and Bracken-Leander functions, are actively studied as potential candidates that may offer improved resistance and better cryptographic properties [27,29,82,83,84].
- 2.
- S-boxes for enhanced cryptanalytic attacks: As mentioned in Section 5.2, cryptographic attacks continue to evolve, such as BAs, extensions of DAs, or modifications of AAs through transformations of the S-box. Consequently, designing S-boxes that remain secure against these advanced threats is an ongoing and essential research challenge. This is evident in several studies that, using newly proposed S-box properties, have revealed vulnerabilities in existing implementations [15,22,25,77].
- 3.
- S-box evaluation for cryptographic attacks: While classical DAs, LAs, and AAs, are well-studied, evaluating S-box security against attacks, such as higher-order differential [85] and integral [86], is difficult due to the lack of established analytical design methodologies [38,87]. Developing tools and methods to assess resistance against these advanced attacks is therefore essential for ensuring robust S-box constructions.
- 4.
- Developing a new construction approach starting from cryptographic property tables: An extension of the previous challenge concerns enhancing the security of S-boxes, as adversaries can exploit vulnerabilities by analyzing the full structure of cryptographic property tables, not merely their maximum values [88]. To address this, several studies have proposed innovative approaches that operate directly on these tables [59,89,90,91]. These methods involve populating the tables based on specific design objectives and then searching for an S-box that satisfies the resulting constraints. Although this approach has been used to construct S-boxes from different tables (such as the DDT, LAT, and BCT) the existing proposals still rely on known tables (i.e., where the S-box is already given). This limitation opens multiple lines of inquiry, including how to characterize these tables to enable the generation of new S-boxes, or how to construct S-boxes by simultaneously using two or more property tables, rather than relying on a single one.
- 5.
- Determine the security level of dynamic S-boxes: As mentioned earlier (Section 5), dynamic S-boxes are generally considered more resistant than static S-boxes. However, one of the open problems is how to accurately determine the security level of dynamic S-boxes with respect to different cryptographic properties. For example, as discussed in [55], there are methods to evaluate the security of these components against DAs and LAs. Nevertheless, it remains necessary to assess the resistance of dynamic S-boxes against more novel attacks, such as BAs.
- 6.
- Development of new evaluation toolkits: As cryptographic requirements evolve and new S-box properties are introduced, the development of evaluation toolkits remains essential for supporting the analysis of these nonlinear components. Section 7 demonstrates that, although some toolkits provide broader functionality, none currently support several recently proposed properties.
- 7.
- Design of lightweight S-boxes: Although numerous lightweight S-box designs have been proposed, identifying one that simultaneously achieves strong security and minimizes resource consumption remains a significant challenge. This difficulty arises from the need to balance multiple factors, including size, function type, area, energy efficiency, and overall performance, as discussed in Section 5.
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
| S-box, S | Substitution box |
| n | Input size of the S-box |
| m | Output size of the S-box |
| Finite field with two elements | |
| A n-dimension vector space over | |
| X | A set of input bits |
| Y | A set of output bits |
| Cipher; Inverse of the cipher (Decipher) | |
| Number of sets | |
| Secret key | |
| Length of the secret key | |
| LUT | Look up table |
| k | Key mask |
| DU | Differential uniformity |
| SPN | Substitution Permutation Networks |
| M | Plaintext |
| E | Ciphertext |
| The length in bits of a message M | |
| DAs | Differential attacks |
| DDT | Distribution Differential Table |
| # | Number of pair that meets a condition |
| MDP | Maximum differential probability |
| B | Balance |
| LAT | Linear Approximation Table |
| Bias of the LAT | |
| W | Walsh-Hadamard transform |
| Absolute Value of x | |
| NL | Nonlinearity |
| L | Linearity |
| LAP | Linear Approximation Probability |
| BAs | Boomerang attacks |
| C | Cipher |
| BCT | Boomerang Connectivity Table |
| FBCT | Feistel Boomerang Connectivity Table |
| BU | Boomerang Uniformity |
| FBU | Feistel Boomerang Uniformity |
| PBSR | Probability of of the boomerang switch over a round |
| AAs | Algebraic attacks |
| ANF | Algebraic Normal Form |
| AD | Algebraic degree |
| HW | Hamming Weight |
| AI | Algebraic immunity |
| GAI | Graph algebraic immunity |
| Dr2 | Degree Rank 2 |
| The difference between and at a certain step |
Appendix A. The Design of the AES S-Box
Appendix B. Comparison Between the LAT of PEIGEN and the LAT of SageMath
References
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Biham, E.; Shamir, A. Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 1991, 4, 3–72. [Google Scholar] [CrossRef]
- Matsui, M. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology—EUROCRYPT ’93, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, 23–27 May 1993; Helleseth, T., Ed.; Springer: Berlin/Heidelberg, Germany, 1994; pp. 386–397. [Google Scholar] [CrossRef]
- Wagner, D. The Boomerang Attack. In Fast Software Encryption, Proceedings of the 6th International Workshop, FSE’99, Rome, Italy, 24–26 March 1999; Knudsen, L., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; pp. 156–170. [Google Scholar] [CrossRef]
- Courtois, N.T.; Pieprzyk, J. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In Advances in Cryptology—ASIACRYPT 2002, Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 1–5 December 2002; Zheng, Y., Ed.; Springer: Berlin/Heidelberg, Germany, 2002; pp. 267–287. [Google Scholar] [CrossRef]
- Sorkin, A. Lucifer, A Cryptographic Algorithm. Cryptologia 1984, 8, 22–42. [Google Scholar] [CrossRef]
- National Bureau of Standards. Data Encryption Standard (DES); Federal Information Processing Standards Publication 46; U.S. Department of Commerce: Washington, DC, USA, 1977.
- Biham, E.; Shamir, A. Differential Cryptanalysis of the Data Encryption Standard, 1st ed.; Springer: New York, NY, USA, 1993; p. 188. [Google Scholar] [CrossRef]
- Suzaki, T.; Minematsu, K.; Morioka, S.; Kobayashi, E. TWINE: A Lightweight Block Cipher for Multiple Platforms. In Selected Areas in Cryptography, Proceedings of the 19th International Conference, SAC 2012, Windsor, ON, Canada, 15–16 August 2012; Knudsen, L.R., Wu, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 339–354. [Google Scholar] [CrossRef]
- Biham, E.; Anderson, R.; Knudsen, L. Serpent: A New Block Cipher Proposal. In Fast Software Encryption, Proceedings of the 5th International Workshop, Proceedings of the FSE ’98, Paris, France, 23–25 March 1998; Vaudenay, S., Ed.; Springer: Berlin/Heidelberg, Germany, 1998; pp. 222–238. [Google Scholar] [CrossRef]
- Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.B.; Seurin, Y.; Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block Cipher. In Cryptographic Hardware and Embedded Systems—CHES 2007, Proceedings of the 9th International Workshop, Vienna, Austria, 10–13 September 2007; Paillier, P., Verbauwhede, I., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 450–466. [Google Scholar] [CrossRef]
- Zhang, W.; Bao, Z.; Lin, D.; Rijmen, V.; Yang, B.; Verbauwhede, I. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 2015, 58, 1–15. [Google Scholar] [CrossRef]
- Chen, S.; Fan, Y.; Sun, L.; Fu, Y.; Zhou, H.; Li, Y.; Wang, M.; Wang, W.; Guo, C. SAND: An AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. Des. Codes Cryptogr. 2022, 90, 155–198. [Google Scholar] [CrossRef]
- Kim, S.; Hong, D.; Sung, J.; Hong, S. Classification of 4-bit S-Boxes for BOGI Permutation. IEEE Access 2020, 8, 210935–210949. [Google Scholar] [CrossRef]
- Leander, G.; Poschmann, A. On the Classification of 4 Bit S-Boxes. In Arithmetic of Finite Fields, Proceedings of the First International Workshop, WAIFI 2007, Madrid, Spain, 21–22 June 2007; Carlet, C., Sunar, B., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 159–176. [Google Scholar] [CrossRef]
- Meier, W.; Staffelbach, O. Nonlinearity Criteria for Cryptographic Functions. In Advances in Cryptology—EUROCRYPT ’89, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, 10–13 April 1989; Quisquater, J.J., Vandewalle, J., Eds.; Springer: Berlin/Heidelberg, Germany, 1990; pp. 549–562. [Google Scholar] [CrossRef]
- Rashidi, B. Compact and efficient structure of 8-bit S-box for lightweight cryptography. Integration 2021, 76, 172–182. [Google Scholar] [CrossRef]
- Rana, M.; Mamun, Q.; Islam, R. An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher. In Quality, Reliability, Security and Robustness in Heterogeneous Systems, Proceedings of the 17th EAI International Conference, QShine 2021, Virtual Event, 29–30 November 2021; Yuan, X., Bao, W., Yi, X., Tran, N.H., Eds.; Springer: Cham, Switzerland, 2021; pp. 214–227. [Google Scholar] [CrossRef]
- Thakor, V.A.; Razzaque, M.A.; Darji, A.D.; Patel, A.R. A novel 5-bit S-box design for lightweight cryptography algorithms. J. Inf. Secur. Appl. 2023, 73, 103444. [Google Scholar] [CrossRef]
- Li, L.; Liu, J.; Guo, Y.; Liu, B. A new S-box construction method meeting strict avalanche criterion. J. Inf. Secur. Appl. 2022, 66, 103135. [Google Scholar] [CrossRef]
- Jeon, Y.; Baek, S.; Kim, H.; Kim, G.; Kim, J. Differential uniformity and linearity of S-boxes by multiplicative complexity. Cryptogr. Commun. 2022, 14, 849–874. [Google Scholar] [CrossRef]
- Tong, Y.; Xu, S.; Huang, J.; Wang, B.; Ren, Z. A new analysis of small S-boxes based on a new notion of algebraic immunity. J. Inf. Secur. Appl. 2023, 77, 103574. [Google Scholar] [CrossRef]
- Cid, C.; Huang, T.; Peyrin, T.; Sasaki, Y.; Song, L. Boomerang Connectivity Table: A New Cryptanalysis Tool. In Advances in Cryptology—EUROCRYPT 2018, Proceedings of the37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, 29 April–3 May 2018; Nielsen, J.B., Rijmen, V., Eds.; Springer: Cham, Switzerland, 2018; pp. 683–714. [Google Scholar] [CrossRef]
- Boukerrou, H.; Huynh, P.; Lallemand, V.; Mandal, B.; Minier, M. On the Feistel Counterpart of the Boomerang Connectivity Table. IACR Trans. Symmetric Cryptol. 2020, 2020, 331–362. [Google Scholar] [CrossRef]
- Zhang, W.; Bao, Z.; Rijmen, V.; Liu, M. A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. In Fast Software Encryption, Proceedings of the 22nd International Workshop, FSE 2015, Istanbul, Turkey, 8–11 March 2015; Leander, G., Ed.; Springer: Berlin/Heidelberg, Germany, 2015; pp. 494–515. [Google Scholar] [CrossRef]
- Chabaud, F.; Vaudenay, S. Links between differential and linear cryptanalysis. In Advances in Cryptology—EUROCRYPT’94, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 9–12 May 1994; De Santis, A., Ed.; Springer: Berlin/Heidelberg, Germany, 1995; pp. 356–365. [Google Scholar] [CrossRef]
- Eddahmani, S.; Mesnager, S. Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes. Cryptogr. Commun. 2022, 14, 1301–1344. [Google Scholar] [CrossRef]
- Man, Y.; Mesnager, S.; Li, N.; Zeng, X.; Tang, X. In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities. Discret. Math. 2024, 347, 114185. [Google Scholar] [CrossRef]
- Hu, Z.; Li, N.; Xu, L.; Zeng, X.; Tang, X. The differential spectrum and boomerang spectrum of a class of locally-APN functions. Des. Codes Cryptogr. 2023, 91, 1695–1711. [Google Scholar] [CrossRef]
- Boura, C. S-boxes. In Symmetric Cryptography 1: Design and Security Proofs; Boura, C., Naya-Plasencia, M., Eds.; John Wiley & Sons, Ltd.: Hoboken, NJ, USA, 2024; Chapter 8; pp. 111–121. [Google Scholar] [CrossRef]
- Easttom, C. (Ed.) s-box Design. In Modern Cryptography: Applied Mathematics and Implementation; Springer International Publishing: Cham, Switzerland, 2022; Chapter 8; pp. 193–212. [Google Scholar] [CrossRef]
- Bao, Z.; Guo, J.; Ling, S.; Sasaki, Y. PEIGEN—A Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Trans. Symmetric Cryptol. 2019, 2019, 330–394. [Google Scholar] [CrossRef]
- Waheed, A.; Subhan, F.; Suud, M.M.; Alam, M.; Ahmad, S. An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges. Multimed. Tools Appl. 2023, 82, 29689–29712. [Google Scholar] [CrossRef]
- Canteaut, A. Lecture Notes on Cryptographic Boolean Functions. 2016. Available online: https://www.rocq.inria.fr/secret/Anne.Canteaut/poly.pdf (accessed on 10 October 2025).
- Perrin, L.P. Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms. Ph.D. Thesis, University of Luxembourg, Luxembourg, 25 April 2017. [Google Scholar]
- Pehlivanoğlu, M.K.; Akleylek, S.; Sakallı, M.T.; Duru, N. On the design strategies of diffusion layers and key schedule in lightweight block ciphers. In Proceedings of the 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 5–8 October 2017; pp. 456–461. [Google Scholar] [CrossRef]
- Piret, G.; Roche, T.; Carlet, C. PICARO—A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance. In Applied Cryptography and Network Security, Proceedings of the 10th International Conference, ACNS 2012, Singapore, 26–29, June 2012; Bao, F., Samarati, P., Zhou, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 311–328. [Google Scholar] [CrossRef]
- Lim, J.; Ng, D.; Ng, R. SoK: Security Evaluation of SBox-Based Block Ciphers. Cryptology ePrint Archive, Paper 2022/1098. 2022. Available online: https://eprint.iacr.org/2022/1098 (accessed on 26 November 2025).
- de Canniere, C.; Biryukov, A.; Preneel, B. An introduction to Block Cipher Cryptanalysis. Proc. IEEE 2006, 94, 346–356. [Google Scholar] [CrossRef]
- Stamp, M.; Low, R.M. Block Ciphers. In Applied Cryptanalysis: Breaking Ciphers in the Real World; John Wiley & Sons, Ltd.: Hoboken, NJ, USA, 2007; Chapter 4; pp. 127–191. [Google Scholar] [CrossRef]
- Daemen, J.; Rijmen, V. The Design of Rijndael; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2. [Google Scholar] [CrossRef]
- Nyberg, K. Differentially uniform mappings for cryptography. In Advances in Cryptology—EUROCRYPT ’93, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, 23–27 May 1993; Helleseth, T., Ed.; Springer: Berlin/Heidelberg, Germany, 1994; pp. 55–64. [Google Scholar] [CrossRef]
- Wu, H.; Preneel, B. AEGIS: A Fast Authenticated Encryption Algorithm. In Selected Areas in Cryptography—SAC 2013, Proceedings of the 20th International Conference, Burnaby, BC, Canada, 14–16 August 2013; Lange, T., Lauter, K., Lisoněk, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 185–201. [Google Scholar] [CrossRef]
- Shirai, T.; Shibutani, K.; Akishita, T.; Moriai, S.; Iwata, T. The 128-bit blockcipher CLEFIA. In Proceedings of the 14th International Conference on Fast Software Encryption, Luxembourg, 26–28 March 2007; FSE’07; Springer: Berlin/Heidelberg, Germany, 2007; pp. 181–195. [Google Scholar] [CrossRef]
- Rijmen, V.; Daemen, J.; Preneel, B.; Bosselaers, A.; De Win, E. The cipher SHARK. In Fast Software Encryption, Proceedings of the Third International Workshop, Cambridge, UK, 21–23 February 1996; Gollmann, D., Ed.; Springer: Berlin/Heidelberg, Germany, 1996; pp. 99–111. [Google Scholar] [CrossRef]
- Özkaynak, F. Construction of robust substitution boxes based on chaotic systems. Neural Comput. Appl. 2019, 31, 3317–3326. [Google Scholar] [CrossRef]
- Behera, P.K.; Gangopadhyay, S. Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 1713–1730. [Google Scholar] [CrossRef]
- Mariot, L.; Picek, S.; Leporati, A.; Jakobovic, D. Cellular automata based S-boxes. Cryptogr. Commun. 2019, 11, 41–62. [Google Scholar] [CrossRef]
- Durasevic, M.; Jakobovic, D.; Mariot, L.; Mesnager, S.; Picek, S. On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. In Applications of Evolutionary Computation, Proceedings of the 26th European Conference, EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, 12–14 April 2023; Correia, J., Smith, S., Qaddoura, R., Eds.; Springer: Cham, Switzerland, 2023; pp. 237–252. [Google Scholar] [CrossRef]
- Djurasevic, M.; Jakobovic, D.; Picek, S. One property to rule them all?: On the limits of trade-offs for S-boxes. In Proceedings of the 2020 Genetic and Evolutionary Computation Conference, Cancún, Mexico, 8–12 July 2020; GECCO ’20; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1064–1072. [Google Scholar] [CrossRef]
- Isa, H.; Jamil, N.; Z’aba, M.R. S-box construction from non-permutation power functions. In Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 26–28 November 2013; SIN ’13; Association for Computing Machinery: New York, NY, USA, 2013; pp. 46–53. [Google Scholar] [CrossRef]
- Hatzivasilis, G.; Fysarakis, K.; Papaefstathiou, I.; Manifavas, C. A review of lightweight block ciphers. J. Cryptogr. Eng. 2018, 8, 141–184. [Google Scholar] [CrossRef]
- Wu, C.K.; Feng, D. Boolean Functions and Their Applications in Cryptography; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar] [CrossRef]
- Feng, J.; Li, L. SCENERY: A lightweight block cipher based on Feistel structure. Front. Comput. Sci. 2021, 16, 163813. [Google Scholar] [CrossRef]
- Yan, L.; Li, L.; Guo, Y. DBST: A lightweight block cipher based on dynamic S-box. Front. Comput. Sci. 2022, 17, 173805. [Google Scholar] [CrossRef]
- Dhanalakshmi, K.S.; Padmavathi, R.A. A Survey on VLSI Implementation of AES Algorithm with Dynamic S-Box. J. Appl. Secur. Res. 2022, 17, 241–256. [Google Scholar] [CrossRef]
- Heys, H.M. A tutorial on linear and differential cryptanalysis. Cryptologia 2002, 26, 189–221. [Google Scholar] [CrossRef]
- Stinson, D.R.; Paterson, M.B. Cryptography: Theory and Practice, 4th ed.; CRC Press/Taylor & Francis Group: Boca Raton, FL, USA, 2018. [Google Scholar]
- Dunkelman, O.; Huang, S. Reconstructing an S-box from its Difference Distribution Table. IACR Trans. Symmetric Cryptol. 2019, 2019, 193–217. [Google Scholar] [CrossRef]
- Carlet, C. Boolean Functions for Cryptography and Coding Theory; Cambridge University Press: Cambridge, UK, 2021. [Google Scholar] [CrossRef]
- Youssef, A.; Tavares, S. Resistance of balanced s-boxes to linear and differential cryptanalysis. Inf. Process. Lett. 1995, 56, 249–252. [Google Scholar] [CrossRef]
- Adams, C.M. On immunity against Biham and Shamir’s “differential cryptanalysis”. Inf. Process. Lett. 1992, 41, 77–80. [Google Scholar] [CrossRef]
- Makarim, R.H.; Laigle-Chapuy, Y.; Albrecht, M.R. SAGE: S-Boxes and Their Algebraic Representations; The Sage Development Team: USA online, 2008; Available online: https://doc.sagemath.org/html/en/reference/cryptography/sage/crypto/sbox.html (accessed on 26 June 2025).
- Carlet, C. Vectorial Boolean Functions for Cryptography. In Boolean Models and Methods in Mathematics, Computer Science, and Engineering; Crama, Y., Hammer, P.L., Eds.; Encyclopedia of Mathematics and its Applications; Cambridge University Press: Cambridge, UK, 2010; Chapter 8; pp. 398–469. [Google Scholar] [CrossRef]
- Nyberg, K. S-boxes and round functions with controllable linearity and differential uniformity. In Fast Software Encryption, Proceedings of the Second International Workshop, Leuven, Belgium, 14–16 December 1994; Preneel, B., Ed.; Springer: Berlin/Heidelberg, Germany, 1995; pp. 111–130. [Google Scholar] [CrossRef]
- Pieprzyk, J.; Wang, H.; Zhang, X.M. Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Int. J. Comput. Math. 2011, 88, 1398–1416. [Google Scholar] [CrossRef]
- Meier, W.; Pasalic, E.; Carlet, C. Algebraic Attacks and Decomposition of Boolean Functions. In Advances in Cryptology—EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Cachin, C., Camenisch, J.L., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 474–491. [Google Scholar] [CrossRef]
- Armknecht, F.; Krause, M. Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. In Automata, Languages and Programming, Proceedings of the 33rd International Colloquium, ICALP 2006, Venice, Italy, 10–14 July 2006; Bugliesi, M., Preneel, B., Sassone, V., Wegener, I., Eds.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 180–191. [Google Scholar] [CrossRef]
- Webster, A.F.; Tavares, S.E. On the Design of S-Boxes. In Proceedings of the Advances in Cryptology—CRYPTO ’85 Proceedings, Santa Barbara, CA, USA, 18–22 August 1985; Williams, H.C., Ed.; Springer: Berlin/Heidelberg, Germany, 1986; pp. 523–534. [Google Scholar] [CrossRef]
- Cheng, L.; Zhang, W.; Xiang, Z. A New Cryptographic Analysis of 4-bit S-Boxes. In Information Security and Cryptology, Proceedings of the 11th International Conference, Inscrypt 2015, Beijing, China, 1–3 November 2015; Lin, D., Wang, X., Yung, M., Eds.; Springer: Cham, Switzerland, 2016; pp. 144–164. [Google Scholar] [CrossRef]
- Nyberg, K. Perfect nonlinear S-boxes. In Advances in Cryptology—EUROCRYPT ’91, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, 8–11 April 1991; Davies, D.W., Ed.; Springer: Berlin/Heidelberg, Germany, 1991; pp. 378–386. [Google Scholar] [CrossRef]
- Nyberg, K.; Knudsen, L.R. Provable Security Against Differential Cryptanalysis. In Advances in Cryptology—CRYPTO’ 92, Proceedings of the 12th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 1992; Brickell, E.F., Ed.; Springer: Berlin/Heidelberg, Germany, 1993; pp. 566–574. [Google Scholar] [CrossRef]
- Browning, K.A.; Dillon, J.F.; McQuistan, M.T.; Wolfe, A.J. An APN Permutation in Dimension Six. In Finite Fields: Theory and Applications; McGuire, G., Mullen, G.L., Panario, D., Shparlinski, I.E., Eds.; American Mathematical Society: Providence, RI, USA, 2010; Volume 518 Contemporary Mathematics, pp. 33–42. [Google Scholar] [CrossRef]
- Rothaus, O. On “bent” functions. J. Comb. Theory Ser. A 1976, 20, 300–305. [Google Scholar] [CrossRef]
- Kumar, A.; Tejani, S. S-BOX Architecture. In Futuristic Trends in Network and Communication Technologies, Proceedings of the First International Conference, FTNCT 2018, Solan, India, 9–10 February 2018; Singh, P.K., Paprzycki, M., Bhargava, B., Chhabra, J.K., Kaushal, N.C., Kumar, Y., Eds.; Springer: Singapore, 2019; pp. 17–27. [Google Scholar] [CrossRef]
- Zakaria, A.A.; Azni, A.; Ridzuan, F.; Zakaria, N.H.; Daud, M. Systematic literature review: Trend analysis on the design of lightweight block cipher. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101550. [Google Scholar] [CrossRef]
- Ventura, D.C.; Henríquez, L.M.R.; Hernández, S.E.P. Requirements for Feistel-based Lightweight Block Cipher S-boxes to be Resilient to Boomerang Attacks. In Proceedings of the 2023 Mexican International Conference on Computer Science (ENC), Guanajuato, Guanajuato, Mexico, 11–13 September 2023; pp. 1–8. [Google Scholar] [CrossRef]
- Mesnager, S.; Mandal, B.; Msahli, M. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptogr. Commun. 2022, 14, 691–735. [Google Scholar] [CrossRef]
- Canteaut, A.; Kölsch, L.; Li, C.; Li, C.; Li, K.; Qu, L.; Wiemer, F. Autocorrelations of Vectorial Boolean Functions. In Progress in Cryptology—LATINCRYPT 2021, Proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, 6–8 October 2021; Longa, P., Ràfols, C., Eds.; Springer: Cham, Switzerland, 2021; pp. 233–253. [Google Scholar] [CrossRef]
- Ellingsen, P.; Felke, P.; Riera, C.; Stănică, P.; Tkachenko, A. C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity. IEEE Trans. Inf. Theory 2020, 66, 5781–5789. [Google Scholar] [CrossRef]
- Stănică, P. Investigations on c-boomerang uniformity and perfect nonlinearity. Discret. Appl. Math. 2021, 304, 297–314. [Google Scholar] [CrossRef]
- Calderini, M.; Villa, I. On the boomerang uniformity of some permutation polynomials. Cryptogr. Commun. 2020, 12, 1161–1178. [Google Scholar] [CrossRef]
- Calderini, M.; Sala, M.; Villa, I. A note on APN permutations in even dimension. Finite Fields Their Appl. 2017, 46, 1–16. [Google Scholar] [CrossRef]
- Hasan, S.U.; Pal, M.; Stănică, P. The binary Gold function and its c-boomerang connectivity table. Cryptogr. Commun. 2022, 14, 1257–1280. [Google Scholar] [CrossRef]
- Lai, X. Higher Order Derivatives and Differential Cryptanalysis. In Communications and Cryptography: Two Sides of One Tapestry; Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T., Eds.; Springer: Boston, MA, USA, 1994; pp. 227–233. [Google Scholar] [CrossRef]
- Knudsen, L.; Wagner, D. Integral Cryptanalysis. In Fast Software Encryption, Proceedings of the 9th International Workshop, FSE 2002, Leuven, Belgium, 4–6 February 2002; Daemen, J., Rijmen, V., Eds.; Springer: Berlin/Heidelberg, Germany, 2002; pp. 112–127. [Google Scholar]
- Carlet, C. A notion on S-boxes for a partial resistance to some integral attacks. Cryptol. ePrint Arch. 2024. Paper 2024/1693. [Google Scholar]
- Bar-On, A.; Biham, E.; Dunkelman, O.; Keller, N. Efficient Slide Attacks. J. Cryptol. 2018, 31, 641–670. [Google Scholar] [CrossRef]
- Rohit, R.; Sarkar, S. Reconstructing S-Boxes from Cryptographic Tables with Milp. IACR Trans. Symmetric Cryptol. 2024, 2024, 200–237. [Google Scholar] [CrossRef]
- Boura, C.; Canteaut, A.; Jean, J.; Suder, V. Two notions of differential equivalence on Sboxes. Des. Codes Cryptogr. 2019, 87, 185–202. [Google Scholar] [CrossRef]
- Tian, S.; Boura, C.; Perrin, L. Boomerang uniformity of popular S-box constructions. Des. Codes Cryptogr. 2020, 88, 1959–1989. [Google Scholar] [CrossRef]
- Gold, R. Maximal recursive sequences with 3-valued recursive cross-correlation functions (Corresp.). IEEE Trans. Inf. Theory 1968, 14, 154–156. [Google Scholar] [CrossRef]
- Dobbertin, H. One-to-One Highly Nonlinear Power Functions on GF(2n). Appl. Algebra Eng. Commun. Comput. 1998, 9, 139–152. [Google Scholar] [CrossRef]










| Approach | Main Purpose | Advantages | Disadvantages |
|---|---|---|---|
| Algebraic | Security | 1. Optimal Values regardless of size 2. Produce the best S-boxes | 1. Vulnerability to Algebraic attacks 2. Produce different S-boxes |
| Heuristic | Security | 1. Produce different S-boxes 2. Consider multiple properties | 1. S-boxes are less secure than algebraic approach |
| Random Searching | Searching | 1. Simplest approach 2. High randomness | 1. S-boxes are less secure than algebraic approach |
| X | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| S(X) | C | 0 | F | A | 2 | B | 9 | 5 | 8 | 3 | D | 7 | 1 | E | 6 | 4 |
| DDT | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0 | 16 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 1 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 2 | 2 | 2 | 4 | 0 | 0 | 2 |
| 2 | 0 | 0 | 0 | 2 | 2 | 2 | 0 | 2 | 0 | 0 | 4 | 2 | 0 | 0 | 2 | 0 |
| 3 | 0 | 0 | 2 | 0 | 0 | 2 | 2 | 2 | 2 | 0 | 0 | 0 | 0 | 0 | 2 | 4 |
| 4 | 0 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 4 | 0 | 2 | 2 | 2 |
| 5 | 0 | 2 | 4 | 2 | 0 | 0 | 2 | 2 | 0 | 2 | 2 | 0 | 0 | 0 | 0 | 0 |
| 6 | 0 | 2 | 0 | 0 | 0 | 4 | 0 | 2 | 0 | 2 | 0 | 0 | 2 | 2 | 2 | 0 |
| 7 | 0 | 0 | 0 | 2 | 2 | 2 | 2 | 0 | 2 | 4 | 0 | 0 | 2 | 0 | 0 | 0 |
| 8 | 0 | 2 | 2 | 4 | 2 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 2 |
| 9 | 0 | 0 | 0 | 2 | 0 | 0 | 0 | 2 | 4 | 0 | 2 | 0 | 2 | 2 | 0 | 2 |
| A | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 4 | 2 | 2 | 0 | 2 | 0 | 0 | 0 | 2 |
| B | 0 | 0 | 2 | 0 | 2 | 0 | 2 | 2 | 0 | 0 | 0 | 2 | 2 | 4 | 0 | 0 |
| C | 0 | 0 | 2 | 0 | 2 | 0 | 0 | 0 | 2 | 2 | 2 | 0 | 0 | 2 | 4 | 0 |
| D | 0 | 4 | 2 | 2 | 0 | 0 | 0 | 0 | 2 | 0 | 0 | 2 | 2 | 0 | 2 | 0 |
| E | 0 | 2 | 0 | 0 | 4 | 0 | 2 | 0 | 0 | 0 | 2 | 0 | 2 | 0 | 2 | 2 |
| F | 0 | 2 | 0 | 0 | 0 | 2 | 4 | 0 | 2 | 0 | 2 | 2 | 0 | 2 | 0 | 0 |
| LAT | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0 | 16 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 1 | 0 | 0 | 4 | 4 | 0 | 0 | 4 | 4 | 4 | 4 | 8 | 8 | 4 | 4 | 0 | 0 |
| 2 | 0 | 4 | 0 | 4 | 8 | 4 | 0 | 4 | 0 | 4 | 0 | 4 | 8 | 4 | 0 | 4 |
| 3 | 0 | 4 | 4 | 0 | 0 | 4 | 4 | 8 | 4 | 8 | 0 | 4 | 4 | 0 | 0 | 4 |
| 4 | 0 | 0 | 0 | 8 | 0 | 8 | 0 | 0 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 |
| 5 | 0 | 0 | 4 | 4 | 8 | 0 | 4 | 4 | 8 | 0 | 4 | 4 | 0 | 0 | 4 | 4 |
| 6 | 0 | 4 | 8 | 4 | 0 | 4 | 0 | 4 | 4 | 0 | 4 | 0 | 4 | 0 | 4 | 8 |
| 7 | 0 | 4 | 4 | 0 | 0 | 4 | 4 | 0 | 8 | 4 | 4 | 0 | 8 | 4 | 4 | 0 |
| 8 | 0 | 0 | 0 | 0 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 0 | 8 | 0 | 8 |
| 9 | 0 | 0 | 4 | 4 | 4 | 4 | 0 | 8 | 0 | 0 | 4 | 4 | 4 | 4 | 8 | 0 |
| A | 0 | 4 | 0 | 4 | 4 | 0 | 4 | 0 | 4 | 8 | 4 | 0 | 0 | 4 | 8 | 4 |
| B | 0 | 4 | 4 | 8 | 4 | 0 | 8 | 4 | 0 | 4 | 4 | 0 | 4 | 0 | 0 | 4 |
| C | 0 | 8 | 0 | 0 | 4 | 4 | 4 | 4 | 0 | 0 | 8 | 0 | 4 | 4 | 4 | 4 |
| D | 0 | 8 | 4 | 4 | 4 | 4 | 0 | 0 | 4 | 4 | 0 | 8 | 0 | 0 | 4 | 4 |
| E | 0 | 4 | 8 | 4 | 4 | 0 | 4 | 0 | 0 | 4 | 0 | 4 | 4 | 8 | 4 | 0 |
| F | 0 | 4 | 4 | 0 | 4 | 8 | 8 | 4 | 4 | 0 | 0 | 4 | 0 | 4 | 4 | 0 |
| LAT | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0 | 8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 1 | 0 | 0 | 2 | −2 | 0 | 0 | 2 | −2 | −2 | 2 | −4 | −4 | 2 | −2 | 0 | 0 |
| 2 | 0 | 2 | 0 | 2 | 4 | −2 | 0 | 2 | 0 | −2 | 0 | −2 | 4 | 2 | 0 | −2 |
| 3 | 0 | 2 | 2 | 0 | 0 | 2 | −2 | −4 | 2 | −4 | 0 | −2 | −2 | 0 | 0 | −2 |
| 4 | 0 | 0 | 0 | 4 | 0 | 4 | 0 | 0 | −2 | −2 | −2 | 2 | 2 | −2 | 2 | 2 |
| 5 | 0 | 0 | 2 | 2 | −4 | 0 | −2 | 2 | −4 | 0 | 2 | −2 | 0 | 0 | −2 | −2 |
| 6 | 0 | 2 | 4 | 2 | 0 | −2 | 0 | 2 | 2 | 0 | −2 | 0 | −2 | 0 | −2 | 4 |
| 7 | 0 | 2 | −2 | 0 | 0 | −2 | 2 | 0 | −4 | −2 | −2 | 0 | −4 | 2 | 2 | 0 |
| 8 | 0 | 0 | 0 | 0 | 2 | 2 | −2 | −2 | −2 | 2 | 2 | −2 | 0 | 4 | 0 | 4 |
| 9 | 0 | 0 | −2 | 2 | −2 | −2 | 0 | −4 | 0 | 0 | −2 | 2 | 2 | 2 | −4 | 0 |
| A | 0 | 2 | 0 | 2 | −2 | 0 | −2 | 0 | 2 | 4 | −2 | 0 | 0 | 2 | 4 | −2 |
| B | 0 | 2 | −2 | −4 | −2 | 0 | −4 | 2 | 0 | −2 | −2 | 0 | 2 | 0 | 0 | 2 |
| C | 0 | 4 | 0 | 0 | −2 | −2 | 2 | −2 | 0 | 0 | 4 | 0 | 2 | −2 | 2 | 2 |
| D | 0 | −4 | −2 | 2 | −2 | −2 | 0 | 0 | 2 | −2 | 0 | −4 | 0 | 0 | 2 | 2 |
| E | 0 | −2 | 4 | −2 | −2 | 0 | 2 | 0 | 0 | −2 | 0 | 2 | 2 | 4 | 2 | 0 |
| F | 0 | −2 | 2 | 0 | 2 | −4 | −4 | −2 | −2 | 0 | 0 | 2 | 0 | −2 | 2 | 0 |
| BCT | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 |
| 1 | 16 | 0 | 2 | 0 | 0 | 6 | 0 | 0 | 0 | 6 | 2 | 2 | 4 | 0 | 0 | 2 |
| 2 | 16 | 0 | 0 | 2 | 6 | 2 | 0 | 2 | 0 | 0 | 4 | 2 | 0 | 0 | 6 | 0 |
| 3 | 16 | 0 | 2 | 0 | 0 | 2 | 2 | 6 | 6 | 0 | 0 | 0 | 0 | 0 | 2 | 4 |
| 4 | 16 | 0 | 0 | 2 | 0 | 0 | 6 | 0 | 0 | 2 | 0 | 4 | 0 | 6 | 2 | 2 |
| 5 | 16 | 6 | 4 | 6 | 0 | 0 | 2 | 2 | 0 | 2 | 2 | 0 | 0 | 0 | 0 | 0 |
| 6 | 16 | 2 | 0 | 0 | 0 | 4 | 0 | 2 | 0 | 6 | 0 | 0 | 6 | 2 | 2 | 0 |
| 7 | 16 | 0 | 0 | 2 | 2 | 6 | 2 | 0 | 2 | 4 | 0 | 0 | 6 | 0 | 0 | 0 |
| 8 | 16 | 6 | 6 | 4 | 2 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 0 | 2 |
| 9 | 16 | 0 | 0 | 2 | 0 | 0 | 0 | 6 | 4 | 0 | 2 | 0 | 2 | 2 | 0 | 6 |
| A | 16 | 2 | 0 | 0 | 2 | 0 | 0 | 4 | 6 | 2 | 0 | 2 | 0 | 0 | 0 | 6 |
| B | 16 | 0 | 2 | 0 | 2 | 0 | 6 | 2 | 0 | 0 | 0 | 6 | 2 | 4 | 0 | 0 |
| C | 16 | 0 | 2 | 0 | 6 | 0 | 0 | 0 | 2 | 2 | 6 | 0 | 0 | 2 | 4 | 0 |
| D | 16 | 4 | 6 | 6 | 0 | 0 | 0 | 0 | 2 | 0 | 0 | 2 | 2 | 0 | 2 | 0 |
| E | 16 | 2 | 0 | 0 | 4 | 0 | 2 | 0 | 0 | 0 | 6 | 0 | 2 | 0 | 6 | 2 |
| F | 16 | 2 | 0 | 0 | 0 | 2 | 4 | 0 | 2 | 0 | 2 | 6 | 0 | 6 | 0 | 0 |
| FBCT | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 | 16 |
| 1 | 16 | 16 | 0 | 0 | 0 | 0 | 4 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 2 | 16 | 0 | 16 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 0 | 4 | 0 |
| 3 | 16 | 0 | 0 | 16 | 0 | 0 | 0 | 0 | 0 | 4 | 4 | 0 | 0 | 0 | 0 | 0 |
| 4 | 16 | 0 | 0 | 0 | 16 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 0 | 0 | 0 | 4 |
| 5 | 16 | 0 | 0 | 0 | 0 | 16 | 0 | 0 | 4 | 0 | 0 | 0 | 0 | 4 | 0 | 0 |
| 6 | 16 | 4 | 0 | 0 | 0 | 0 | 16 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 7 | 16 | 4 | 0 | 0 | 0 | 0 | 4 | 16 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 8 | 16 | 0 | 0 | 0 | 0 | 4 | 0 | 0 | 16 | 0 | 0 | 0 | 0 | 4 | 0 | 0 |
| 9 | 16 | 0 | 0 | 4 | 0 | 0 | 0 | 0 | 0 | 16 | 4 | 0 | 0 | 0 | 0 | 0 |
| A | 16 | 0 | 0 | 4 | 0 | 0 | 0 | 0 | 0 | 4 | 16 | 0 | 0 | 0 | 0 | 0 |
| B | 16 | 0 | 0 | 0 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 16 | 0 | 0 | 0 | 4 |
| C | 16 | 0 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 16 | 0 | 4 | 0 |
| D | 16 | 0 | 0 | 0 | 0 | 4 | 0 | 0 | 4 | 0 | 0 | 0 | 0 | 16 | 0 | 0 |
| E | 16 | 0 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 0 | 16 | 0 |
| F | 16 | 0 | 0 | 0 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 0 | 0 | 0 | 16 |
| i | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| P(i) | A | 4 | 7 | F | 2 | 9 | D | 0 | 1 | B | 5 | E | 8 | C | 6 | 3 |
| X | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| S(X) | 3 | 8 | F | 1 | A | 6 | 5 | B | E | D | 4 | 2 | 7 | 0 | 9 | C |
| DDT | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0 | 16 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 1 | 0 | 0 | 0 | 2 | 0 | 2 | 2 | 2 | 0 | 0 | 0 | 2 | 2 | 0 | 4 | 0 |
| 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 0 | 4 | 2 | 2 | 4 |
| 3 | 0 | 2 | 2 | 2 | 0 | 0 | 0 | 2 | 0 | 4 | 0 | 2 | 2 | 0 | 0 | 0 |
| 4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 4 | 0 | 0 | 4 | 4 | 0 |
| 5 | 0 | 0 | 2 | 0 | 4 | 2 | 0 | 0 | 2 | 0 | 2 | 2 | 0 | 0 | 2 | 0 |
| 6 | 0 | 2 | 2 | 4 | 0 | 2 | 2 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 7 | 0 | 0 | 2 | 0 | 4 | 2 | 0 | 0 | 2 | 2 | 0 | 2 | 0 | 2 | 0 | 0 |
| 8 | 0 | 0 | 0 | 2 | 0 | 2 | 2 | 2 | 0 | 0 | 0 | 2 | 2 | 4 | 0 | 0 |
| 9 | 0 | 2 | 2 | 0 | 0 | 2 | 2 | 0 | 0 | 2 | 2 | 0 | 0 | 2 | 2 | 0 |
| A | 0 | 2 | 2 | 2 | 0 | 0 | 0 | 2 | 0 | 0 | 4 | 2 | 2 | 0 | 0 | 0 |
| B | 0 | 2 | 2 | 0 | 0 | 2 | 2 | 0 | 0 | 0 | 0 | 0 | 4 | 0 | 0 | 4 |
| C | 0 | 2 | 0 | 0 | 4 | 0 | 2 | 0 | 2 | 2 | 0 | 2 | 0 | 2 | 0 | 0 |
| D | 0 | 0 | 0 | 4 | 0 | 0 | 0 | 4 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 4 |
| E | 0 | 2 | 0 | 0 | 4 | 0 | 2 | 0 | 2 | 0 | 2 | 2 | 0 | 0 | 2 | 0 |
| F | 0 | 2 | 2 | 0 | 0 | 2 | 2 | 0 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | 4 |
| Property/ Measure | Tool | Attack | Acceptable/ Value | Optimal Value | ||
|---|---|---|---|---|---|---|
| AB ( Odd) | ||||||
| B | Definition 5 | Differential | ✓ | ✓ | ✓ | ✓ |
| DU | DDT | Differential | Small | 4 | 4 | 2 |
| MDP | DDT | Differential | Small | |||
| CarD1 | DDT | Differential | Small | 0 | 0 | 0 |
| L | LAT | Linear | Small | 8 | 32 | ≥ |
| LAP | LAT | Linear | Small | ≥ | ||
| CarL1 | LAT | Linear | Small | 0 | 0 | 0 |
| NL | WH | Linear | High | 4 | 112 | ≤ |
| BU | BCT | Boomerang | Small | 6 | 6 | 2 |
| PBSR | BCT | Boomerang | Small | |||
| FBU | FBCT | Boomerang | Small | 4 | 4 | 0 |
| PBSR (FBU) | FBCT | Boomerang | Small | 0 | ||
| AD | ANF | Algebraic | High | 3 | 7 | |
| SAC | Refer to (31) | Statistical | Near to | |||
| Toolkits | Structural | Confusion | Diffusion | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Size | DU | B | MDP | L | NL | LAP | BU | PBSR (BU) | FBU | PBSR (FBU) | AD | SAC | CarD1 | CarL1 | |
| PEIGEN (2019) [32] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
| SageMath [63] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
| DLS (2023) [77] | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
| ABS | ✓ | ✓ | ✓ | ✓ | |||||||||||
| S-Box | Size | Function | Output | DU | B | MDP | L | NL | LAP | BU | FBU | PBSR | AD | SAC | CarD1 | CarL1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| AES | Bijective | Static | 4 | ✓ | 0.015625 | 32 | 112 | 0.0625 | 6 | n/a | n/a | 7 | 0.504883 | n/a | n/a | |
| TWINE | Bijective | Static | 4 | ✓ | 0.25 | 8 | 4 | 0.25 | n/a | 4 | 0.25 | 3 | 0.57 | n/a | n/a | |
| RECTANGLE | Bijective | Static | 4 | ✓ | 0.25 | 8 | 4 | 0.25 | 16 | n/a | n/a | 3 | 0.671 | 2 | 2 | |
| SERPENT | Bijective | Static | 4 | ✓ | 0.25 | 8 | 4 | 0.25 | 16 | n/a | n/a | 3 | 0.640 | 0 | 8 | |
| PRESENT | Bijective | Static | 4 | ✓ | 0.25 | 8 | 4 | 0.25 | 16 | n/a | n/a | 3 | 0.625 | 0 | 8 | |
| Tong et al. [22] | Bijective | Static | 4 | ✓ | 0.25 | 8 | 4 | 0.25 | 6 | 4 | 0.25 | 3 | 0.5 | 8 | 10 | |
| Li et al. [20] | Bijective | Static | 4 | ✓ | 0.25 | 8 | 4 | 0.25 | 6 | 4 | 0.25 | 3 | 0.5 | 10 | 10 | |
| SAND | Non-bijective | Static | 4 | ✗ | 0.25 | 8 | 4 | 0.25 | n/a | 8 | 0.5 | 3 | — | n/a | n/a | |
| DES | Non-bijective | Static | 16 | ✓ | 0.25 | 36 | 14 | 0.28125 | n/a | 24 | 0.375 | 5 | — | — | — |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Ventura, D.C.; Rodríguez-Henríquez, L.M.X.; Hernández, S.E.P. Understanding S-Box Security Assessment: A Practical Guide. Math. Comput. Appl. 2026, 31, 27. https://doi.org/10.3390/mca31010027
Ventura DC, Rodríguez-Henríquez LMX, Hernández SEP. Understanding S-Box Security Assessment: A Practical Guide. Mathematical and Computational Applications. 2026; 31(1):27. https://doi.org/10.3390/mca31010027
Chicago/Turabian StyleVentura, David Carcaño, Lil María Xibai Rodríguez-Henríquez, and Saúl E. Pomares Hernández. 2026. "Understanding S-Box Security Assessment: A Practical Guide" Mathematical and Computational Applications 31, no. 1: 27. https://doi.org/10.3390/mca31010027
APA StyleVentura, D. C., Rodríguez-Henríquez, L. M. X., & Hernández, S. E. P. (2026). Understanding S-Box Security Assessment: A Practical Guide. Mathematical and Computational Applications, 31(1), 27. https://doi.org/10.3390/mca31010027

