S-box construction from non-permutation power functions

Herman Isa, Norziana Jamil, Muhammad Reza Z'aba

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

A substitution box (s-box) is a nonlinear component function used in most block ciphers. It must fulfill several cryptographic properties such as high nonlinearity, low differential uniformity and complex algebraic expression to resist against linear, differential and interpolation attacks. In this paper, we extend and improve the s-box construction method proposed by Mamadolimov et al. [26, 27] which construct an s-box from power and binomial functions over the finite field F28. We study the cryptographic properties exhibited from our s-box and do a comparative analysis with several known 8×8 bijective s-boxes. Our analysis shows that our proposed s-box is ranked seventh compared to known 8×8 bijective s-boxes in terms of strong cryptographic properties. It even surpasses some known s-boxes used in popular block ciphers.

Original languageEnglish
Title of host publicationSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
Pages46-53
Number of pages8
DOIs
Publication statusPublished - 01 Dec 2013
Event6th International Conference on Security of Information and Networks, SIN 2013 - Aksaray, Turkey
Duration: 26 Nov 201328 Nov 2013

Publication series

NameSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks

Other

Other6th International Conference on Security of Information and Networks, SIN 2013
CountryTurkey
CityAksaray
Period26/11/1328/11/13

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Isa, H., Jamil, N., & Z'aba, M. R. (2013). S-box construction from non-permutation power functions. In SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks (pp. 46-53). (SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks). https://doi.org/10.1145/2523514.2523525