Efficient Methods for Generating MARS-Like S-Boxes

  • L. Burnett
  • G. Carter
  • E. Dawson
  • W. Millan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1978)


One of the five AES finalists, MARS, makes use of a 9x32 s-box with very specific combinatorial, differential and linear correlation properties. The s-box used in the cipher was selected as the best from a large sample of pseudo randomly generated tables, in a process that took IBM about a week to compute. This paper provides a faster and more effective alternative generation method using heuristic techniques to produce 9x32 s-boxes with cryptographic properties that are clearly superior to those of the MARS s-box, and typically take less than two hours to produce on a single PC.


Boolean Function Block Cipher Truth Table Advance Encryption Standard Hill Climbing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    E. BIHAM and A. SHAMIR Differential Cryptanalysis of DES-like Crypto-systems Journal of Cryptology, 4:3–72, 1991.zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    J. DAEMEN, R. GOVAETS and J. VANDEWALLE Correlation Matrices Fast Software Encryption, LNCS vol. 1008, pages 275–285, Springer-Verlag, 1994.Google Scholar
  3. 3.
    IBM Corporation MARS-a candidate cipher for AES
  4. 4.
    M. MATSUI Linear Cryptanalysis Method of DES Cipher Advances in Cryptology-Eurocrypt’93, LNCS vol. 765, pages 386–397, Springer-Verlag, 1993.Google Scholar
  5. 5.
    W. MILLAN, A. CLARK and E. DAWSON An Effective Genetic Algorithm for Finding Highly Nonlinear Boolean Functions International Conference on Information and Communications Security, ICICS’ 97 Lecture Notes in Computer Science Vol. 1334, pages 149–158, Springer-Verlag, 1997.Google Scholar
  6. 6.
    W. MILLAN, A. CLARK and E. DAWSON Smart Hill Climbing Finds Better Boolean Functions Workshop on Selected Areas of Cryptology, SAC’ 97, Proceedings, pages 50–63, 1997.Google Scholar
  7. 7.
    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Data Encryption Standard U.S. Department of Commerce FIPS Publication 46, January 1977.Google Scholar
  8. 8.
    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Request for Candidate Algorithm Nominations for the Advanced Encryption Standard (AES) Federal Register Vol. 62No. 177, pages 48051–48058.Google Scholar
  9. 9.
    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Secure Hash Standard NIST FIPS PUB 180, U.S. Department of Commerce, May, 1993.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • L. Burnett
    • 1
  • G. Carter
    • 1
  • E. Dawson
    • 1
  • W. Millan
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations