Skip to main content

Boolean Function Representation of S-Boxes and Boolean Permutations

  • Chapter
  • First Online:
Boolean Functions and Their Applications in Cryptography

Part of the book series: Advances in Computer Science and Technology ((ACST))

Abstract

S-boxes are often the core nonlinear component in many encryption algorithms. By using vector Boolean functions to represent S-boxes, cryptographic properties as well as constructions can be made possible. This chapter studies the S-boxes by the view of vector Boolean functions, with focus being on Boolean permutations, which are a special class of vector Boolean functions. Properties and constructions of Boolean permutations are studied; computation of inverses of Boolean functions is also studied. The concept of one-way trapdoor Boolean permutation is proposed. Construction of Boolean permutations using function composition is studied which enables the construction of one-way trapdoor Boolean permutations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adams, C.M., Tavares, S.: The structured design of cryptographically good S-boxes. J. Cryptol. 3(1), 27–41 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  2. Armknecht, F., Krause M.: Constructing single and multi-output boolean functions with maximal immunity. In: Proceedings of ICALP 2006. LNCS 4052, pp. 162–175. Springer, Berlin Heidelberg (2006)

    Google Scholar 

  3. Daemen, J., Rijmen, V.: AES Proposal: Rijndael, pp. 1–45. NIST, Ventura (1998)

    Google Scholar 

  4. Data Encryption Standard, FIPS PUB 46, National Technical Information Services. Springer-field (1977)

    Google Scholar 

  5. Forre, R.: Methods and instruments for designing S-boxes. J. Cryptol. 2, 115–130 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  6. Golic, J.D.: Vectorial Boolean functions and induced algebraic equations. IEEE Trans. Inf. Theory IT-52(2), 528–537 (2005)

    MathSciNet  MATH  Google Scholar 

  7. Gupta, K.C., Sarkar, P.: Improved construction of nonlinear resilient S-boxes. IEEE Trans. Inf. Theory IT-51(1), 339–348 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  8. Karpovsky M.G.: Finite Orthogonal Series in the Design of Digital Devices. Wiely, New York (1976)

    MATH  Google Scholar 

  9. Lidle, R., Muller, W.B.: Permutation polynomials in RSA-cryptosystem. In: Advances in Cryptology – Proceedings of Crypto’83, pp. 293–301. Plenum, New York (1984)

    Google Scholar 

  10. Matsui, M.: On correlation between the order of S-boxes and the strength of DES. In: Advances in Cryptology – Proceedings of Eurocrypt’94. LNCS 950, pp. 366–375. Springer, Berlin (1995)

    Google Scholar 

  11. McEliece, R.L.: A public-key cryptosystem based on algebraic coding theory, pp. 114–116. Deep Space Network Progress Report 42–44, Jet Propulsion Labs, Pasadena (1978)

    Google Scholar 

  12. Minster, S., Adams, C.: Practical S-box design. In: Proceedings of the Third Annual Workshop on Selected Areas in Cryptography, Kingston, pp. 61–76 (1996)

    Google Scholar 

  13. Nyberg, K.: Perfect nonlinear S-boxes. In: Advances in Cryptology – Proceedings of Eurocrypt’91. LNCS 547, pp. 378–386. Springer, Heidelberg (1991)

    Google Scholar 

  14. Nyberg, K.: On the construction of highly nonlinear permutations, In: Advances in Cryptology – Proceedings of Eurocrypt’92. LNCS 658, pp. 92–98. Springer, Berlin/Heidelberg (1993)

    Google Scholar 

  15. Nyberg, K.: Differentially uniform mappings for cryptography. In: Advances in Cryptology – Proceedings of Eurocrypt’93. LNCS 765, pp. 55–64. Springer, Berlin/Heidelberg (1994)

    Google Scholar 

  16. O’Connor, L.J.: Enumerating nondegenerate permutations. In: Advances in Cryptology – Proceedings of Eurocrypt’91. LNCS 547, pp. 368–377. Springer, Berlin/Heidelberg (1991)

    Google Scholar 

  17. Pieprzyk, J.: How to construct pseudorandom permutations from single pseudorandom functions. In: Advances in Cryptology – Proceedings of Eurocrypt’90. LNCS 473, pp. 140–150. Springer, Berlin/Heidelberg (1991)

    Google Scholar 

  18. Pieprzyk, J., Finkelstein, G.: Towards effective nonlinear cryptosystem design. IEE Proc. Part E 135(6), 325–335 (1988)

    Google Scholar 

  19. Pieprzyk, J., Zhang, X.M.: Permutation generators of alternating groups. In: Advances in Cryptology – Proceedings of Auscrypt’90. LNCS 453, pp. 237–244. Springer, New York (1990)

    Google Scholar 

  20. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  21. Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Advances in Cryptology – Proceedings of Crypto’85. LNCS 218, pp. 523–534. Springer, Berlin (1986)

    Google Scholar 

  22. Wu, C.K.: Boolean functions in cryptology. Ph.D. thesis, Xidian University, Xian (1993) (in Chinese)

    Google Scholar 

  23. Wu, C., Wang, X.: Efficient construction of permutations of high nonlinearity. Chin. Sci. Bull. 38(8), 679–683 (1993)

    MATH  Google Scholar 

  24. Wu, C.K., Varadharajan, V.: Public key cryptosystems based on Boolean permutations and their applications. Int. J. Comput. Math. 74(2), 167–184 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  25. Xing, Y.S., Yang, Y.: Construction and enumeration of Boolean permutations in cryptosystems. J. China Inst. Commun. 3, 74–76 (1998)

    Google Scholar 

  26. Zhang, X.M., Zheng, Y.: Difference distribution table of a regular substitution box. In: Proceedings of the Third Annual Workshop on Selected Areas in Cryptography, kingston, pp. 57–60 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Wu, CK., Feng, D. (2016). Boolean Function Representation of S-Boxes and Boolean Permutations. In: Boolean Functions and Their Applications in Cryptography. Advances in Computer Science and Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48865-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48865-2_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48863-8

  • Online ISBN: 978-3-662-48865-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics