Abstract
S-boxes are often the core nonlinear component in many encryption algorithms. By using vector Boolean functions to represent S-boxes, cryptographic properties as well as constructions can be made possible. This chapter studies the S-boxes by the view of vector Boolean functions, with focus being on Boolean permutations, which are a special class of vector Boolean functions. Properties and constructions of Boolean permutations are studied; computation of inverses of Boolean functions is also studied. The concept of one-way trapdoor Boolean permutation is proposed. Construction of Boolean permutations using function composition is studied which enables the construction of one-way trapdoor Boolean permutations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, C.M., Tavares, S.: The structured design of cryptographically good S-boxes. J. Cryptol. 3(1), 27–41 (1990)
Armknecht, F., Krause M.: Constructing single and multi-output boolean functions with maximal immunity. In: Proceedings of ICALP 2006. LNCS 4052, pp. 162–175. Springer, Berlin Heidelberg (2006)
Daemen, J., Rijmen, V.: AES Proposal: Rijndael, pp. 1–45. NIST, Ventura (1998)
Data Encryption Standard, FIPS PUB 46, National Technical Information Services. Springer-field (1977)
Forre, R.: Methods and instruments for designing S-boxes. J. Cryptol. 2, 115–130 (1990)
Golic, J.D.: Vectorial Boolean functions and induced algebraic equations. IEEE Trans. Inf. Theory IT-52(2), 528–537 (2005)
Gupta, K.C., Sarkar, P.: Improved construction of nonlinear resilient S-boxes. IEEE Trans. Inf. Theory IT-51(1), 339–348 (2005)
Karpovsky M.G.: Finite Orthogonal Series in the Design of Digital Devices. Wiely, New York (1976)
Lidle, R., Muller, W.B.: Permutation polynomials in RSA-cryptosystem. In: Advances in Cryptology – Proceedings of Crypto’83, pp. 293–301. Plenum, New York (1984)
Matsui, M.: On correlation between the order of S-boxes and the strength of DES. In: Advances in Cryptology – Proceedings of Eurocrypt’94. LNCS 950, pp. 366–375. Springer, Berlin (1995)
McEliece, R.L.: A public-key cryptosystem based on algebraic coding theory, pp. 114–116. Deep Space Network Progress Report 42–44, Jet Propulsion Labs, Pasadena (1978)
Minster, S., Adams, C.: Practical S-box design. In: Proceedings of the Third Annual Workshop on Selected Areas in Cryptography, Kingston, pp. 61–76 (1996)
Nyberg, K.: Perfect nonlinear S-boxes. In: Advances in Cryptology – Proceedings of Eurocrypt’91. LNCS 547, pp. 378–386. Springer, Heidelberg (1991)
Nyberg, K.: On the construction of highly nonlinear permutations, In: Advances in Cryptology – Proceedings of Eurocrypt’92. LNCS 658, pp. 92–98. Springer, Berlin/Heidelberg (1993)
Nyberg, K.: Differentially uniform mappings for cryptography. In: Advances in Cryptology – Proceedings of Eurocrypt’93. LNCS 765, pp. 55–64. Springer, Berlin/Heidelberg (1994)
O’Connor, L.J.: Enumerating nondegenerate permutations. In: Advances in Cryptology – Proceedings of Eurocrypt’91. LNCS 547, pp. 368–377. Springer, Berlin/Heidelberg (1991)
Pieprzyk, J.: How to construct pseudorandom permutations from single pseudorandom functions. In: Advances in Cryptology – Proceedings of Eurocrypt’90. LNCS 473, pp. 140–150. Springer, Berlin/Heidelberg (1991)
Pieprzyk, J., Finkelstein, G.: Towards effective nonlinear cryptosystem design. IEE Proc. Part E 135(6), 325–335 (1988)
Pieprzyk, J., Zhang, X.M.: Permutation generators of alternating groups. In: Advances in Cryptology – Proceedings of Auscrypt’90. LNCS 453, pp. 237–244. Springer, New York (1990)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures. Commun. ACM 21(2), 120–126 (1978)
Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Advances in Cryptology – Proceedings of Crypto’85. LNCS 218, pp. 523–534. Springer, Berlin (1986)
Wu, C.K.: Boolean functions in cryptology. Ph.D. thesis, Xidian University, Xian (1993) (in Chinese)
Wu, C., Wang, X.: Efficient construction of permutations of high nonlinearity. Chin. Sci. Bull. 38(8), 679–683 (1993)
Wu, C.K., Varadharajan, V.: Public key cryptosystems based on Boolean permutations and their applications. Int. J. Comput. Math. 74(2), 167–184 (2000)
Xing, Y.S., Yang, Y.: Construction and enumeration of Boolean permutations in cryptosystems. J. China Inst. Commun. 3, 74–76 (1998)
Zhang, X.M., Zheng, Y.: Difference distribution table of a regular substitution box. In: Proceedings of the Third Annual Workshop on Selected Areas in Cryptography, kingston, pp. 57–60 (1996)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Wu, CK., Feng, D. (2016). Boolean Function Representation of S-Boxes and Boolean Permutations. In: Boolean Functions and Their Applications in Cryptography. Advances in Computer Science and Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48865-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-662-48865-2_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48863-8
Online ISBN: 978-3-662-48865-2
eBook Packages: Computer ScienceComputer Science (R0)