Abstract
This paper investigates the design of S-boxes used for combining linear feedback shift register (LFSR) sequences in combination generators. Such combination generators have higher throughput than those using Boolean functions as the combining functions. However, S-boxes tend to leak more information about the LFSR sequences than Boolean functions. To study the information leakage, the notion of maximum correlation is introduced, which is based on the correlation between linear functions of the input and all the Boolean functions (linear and nonlinear) of the output of an S-box. Using Walsh transform, a spectral characterization of the maximum correlation coefficients, together with their upper and lower bounds, are established. For the perfect nonlinear S-boxes designed for block ciphers, an upper bound on the maximum correlation coefficients is presented.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
C.M. Adams and S.E. Tavares. The structured design of cryptographically good S-boxes. Journal of Cryptology, vol. 3, pp. 27–41, 1990.
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, vol. 4, no. 1, pp. 3–72, 1991.
F. Chabaud and S. Vaudenay. Links between differential and linear cryptanalysis. In Lectures in Computer Science, Advances in Cryptology-EUROCRYPT’94, vol. 950, pp. 356–365, Springer-Verlag, 1995.
J.H. Cheon, S. Chee, and C. Park. S-boxes with controllable nonlinearity. In Lecture Notes in Computer Science, Advances in Cryptology-EUROCRYPT’99, vol. 1592, pp. 286–294, Springer-Verlag, 1999.
T.M. Cover and J.A. Thomas. Elements of Information Theory. John Wiley & Sons Inc., 1991.
S.W. Golomb. Shift Register Sequences. Holden-Day, San Francisco, 1976. Reprinted by Aegean Park Press, 1982.
M.G. Karpovsky. Finite Orthogonal Series in the Design of Digital Devices. New York and Jerudalem: Wiley and TUP, 1976.
M. Matsui. Linear cryptanalysis method for DES ciphers. In Lecture Notes in Computer Science, Advances in Cryptology-EUROCRYPT’93, vol. 765, pp. 386–397, Springer-Verlag, 1994.
W. Meier and O. Staffelbach. Nonlinear criteria for cryptographic functions. In Lecture Notes of Computer Science, Advances in Cryptology: Proceedings of EUROCRYPT’89, vol. 434, pp. 549–562, Springer-Verlag, 1990.
K. Nyberg. Perfect nonlinear S-boxes. In Lecture Notes in Computer Science, Advance in Cryptology-EUROCRYPT’91, vol. 547, pp. 378–385, Springer-Verlag, 1991.
K. Nyberg. On the construction of highly nonlinear permutations. In Lecture Notes in Computer Science, Advance in Cryptology-EUROCRYPT’92, vol. 658, pp. 92–98, Springer-Verlag, 1993.
B. Preneel, W.V. Leekwijck, L.V. Linden, R. Govaerts, and J. Vandewalle. Propagation characteristics of Boolean functions. In Lecture Notes in Computer Science, Advance in Cryptology-EUROCRYPT’90, vol. 473, pp. 161–173, Springer-Verlag, 1991.
O.S. Rothaus. On bent functions. J. Combinatorial Theory, Series A, vol. 20, pp. 300–305, 1976.
R. Rueppel. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986.
R. A. Rueppel. Stream ciphers. In Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., New York: IEEE Press, pp. 65–134, 1991.
J. Seberry, X.M. Zhang, and Y. Zheng. Systematic generation of cryptographically robust S-boxes. In Proceedings of the first ACM Conference on Computer and Communications Security, pp. 172–182, 1993.
T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Computer, vol. C-34, no. 1, pp. 81–85, 1985.
Guozhen Xiao and J. L. Massey. A spectral characterization of correlation-immune combining functions. IEEE Trans. on Information Theory, vol. IT-34, no. 3, pp. 564–571, 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, M., Chan, A. (2000). Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. In: Bellare, M. (eds) Advances in Cryptology — CRYPTO 2000. CRYPTO 2000. Lecture Notes in Computer Science, vol 1880. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44598-6_31
Download citation
DOI: https://doi.org/10.1007/3-540-44598-6_31
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67907-3
Online ISBN: 978-3-540-44598-2
eBook Packages: Springer Book Archive