Skip to main content

Inefficiency of variant characteristics for substitution-permutation networks with position permutations

  • Cryptographic Functions And Cipher
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

  • 121 Accesses

Abstract

In the early '90th E.Biham and A.Shamir for the first time presented new, effective method of the cryptanalysis of the Data Encryption Standard (DES) algorithm — a differential cryptanalysis. This method can be applyed to many types of the algorithms based on substitutions and permutations called the substitution-permutation networks (SPNs).

Together with introducing the differential cryptanalysis appeared a problem of improving resistance of the ciphers against this method of attack. The differential cryptanalysis is based on existance of the differential characteristics. Designing the differential characteristics is a fundamental of the differential cryptanalysis. In this paper we present a kind of extention of the substitution-permutation networks called a position permutation. Applying the position permutations in SPN disables creating the differential characteristics like presented by Biham and Shamir. It is necessary to emphasize that applying the position permutations in the SPN does not change the type of algorithm; it is still the substitution-permutation network.

Differential cryptanalysis of the SPNs with the position permutations can be made with use of so called variant charcteristics. In this paper we show that these characteristics are inefficient and the differential cryptanalysis of the networks with the position permutations is much more difficult than the cryptanalysisof the network without these permutations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C.M. Adams. On immunity against Biham and Shamir's differential cryptanalysis. Information Processing Letters, 41(2), pages 77–80, 1992.

    Article  Google Scholar 

  2. I. Ben-Aroya, E. Biham. Differential Cryptanalysis of Lucifer. Journal of Cryptology, Vol. 9 No. 1, pages 21–34, 1996.

    Article  Google Scholar 

  3. E.Biham, A.Shamir. Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Advances in Cryptology — CRYPTO'91, pages 156–171, Springer-Verlag, 1992.

    Google Scholar 

  4. E.Biham, A.Shamir. Differential cryptanalysis of the Full 16-Round DES. Advances in Cryptolgy — CRYPTO'92, pages 487–496, Springer-Verlag, 1993.

    Google Scholar 

  5. E. Biham, A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4 No.1, pages 3–72, 1991.

    Article  Google Scholar 

  6. L.Brown, M.Kwan, J.Pieprzyk, J.Sebbery. Improving Resistance to Differential Cryptoanalysis and the Redesign of LOKI. Advances in Cryptology — ASIACRYPT'91, pages 36–50, Springer-Verlag, 1992.

    Google Scholar 

  7. L.Brown, J.Seberry. On the design of permutation P in DES type cryptosystems. Advances in Cryptology — EUROCRYPT'89, pages 696–705, Springer-Verlag, 1990.

    Google Scholar 

  8. C.Carnes, J.Pieprzyk. Linear Nonequivalence versus Nonlinearity. Advances in Cryptology — AUSCRYPT'92, pages 156–164, Springer-Verlag, 1993.

    Google Scholar 

  9. H.M. Heys, S.E. Tavares. Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. Journal of Cryptology, Vol. 9 No.1, pages 1–20, 1996.

    Article  Google Scholar 

  10. K.Kim. Construction of DES-like S-boxes Based on Boolean Functions Satisfying the SAC. Advances in Cryptology-ASIACRYPT'91, pages 59–72, Springer-Verlag, 1992.

    Google Scholar 

  11. L.R.Knudsen. Cryptanalysis of LOKI91. Advances in Cryptology — AUSCRYPT'92, pages 196–208, Springer-Verlag, 1993.

    Google Scholar 

  12. L.R.Knudsen.Iterative Characteristics of DES and s2-DES. Advances in Cryptology — CRYPTO'92, pages 497–511, Springer-Verlag, 1993.

    Google Scholar 

  13. M. Matsui. Linear cryptanslysis method for DES cipher. Advances in Cryptology — EUROCRYPT'93, pages 386–397, Springer-Verlag, 1994.

    Google Scholar 

  14. K.Nyberg, L.R.Knudsen. Provable Security Against Differential Cryptanalysis. Advances in Cryptology — CRYPTO'92, pages 566–574, Springer-Verlag, 1993.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sadowski, A. (1997). Inefficiency of variant characteristics for substitution-permutation networks with position permutations. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027924

Download citation

  • DOI: https://doi.org/10.1007/BFb0027924

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics