Abstract
In this paper, we construct a 16 × 16 involution binary matrix of branch number 8 and estimate security of an 128-bit SPN(a substitution and permutation encrypion network) block cipher which uses the matrix as a diffusion layer in a round function. We show how to construct such an involution binary matrix of branch number 8, and use some mathematical techniques to find a form in product of matrices, which is for increasing efficiency in software implementations. We also show that the cryptanalytic properties such as the resistance to differential, linear, impossible differential, and truncated differential cryptanalysis.
This research is supported by Hanyang University and National Security Research Institute(NSRI), Korea
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal 28, 656–715 (1949)
Heys, H.M., Tavares, S.E.: Avalanche characteristics of substitution-permutation encryption networks. IEEE Trans. Comp. 44, 1131–1139 (1995)
Litsyn, S., Rains, E.M., Sloane, N.J.A.: Available at http://www.math.unl.edu/djaffe/codes/webcodes/codeform.html
Kanda, M., Takashima, Y., Matsumoto, T., Aoki, K., Ohta, K.: A strategy for construction fast round functions with practical security against differential and linear cryptanalysis. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 264–279. Springer, Heidelberg (1999)
Kanda, M.: Practical Security Evaluation against Differential and Linear Cryptanalysis for Feistel Ciphers with SPN Round Function. In: Selected Areas in Cryptography 2000, pp. 324–338 (2000)
Koo, B., Song, J.: Construction a diffusion layer in SPN structure against differential and linear cryptanalysis. In: Proceedings of KIISC conference Region Chung-Cheong, pp. 23–39 (2002)
Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995)
NTT Laboratories. Security of E2 against Truncated Differential Cryptanalysis(in progress) (1999), available at http://info.isl.ntt.co.jp/e2/RelDocs/
Aoki, K., Kanda, M.: Search for impossible Differential of E2 (1999), available at http://csrc.nist.gov/CryptoToolkit/aes/round1/pubcmnts.htm
Daemen, J., Rijmen, V.: AES proposal:Rijndael(Version 2) (1999), Available at NIST AES website http://csrc.nist.gov/encryption/aes
Knudsen, L.R.: The Number of Rounds in Block Ciphers, NESSIE public reports, NES/DOC/UIB/WP3/003/a (2000), Available at http://www.cosic.esat.kuleuven.ac.be/nessie/reports/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koo, B.W., Jang, H.S., Song, J.H. (2004). Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_36
Download citation
DOI: https://doi.org/10.1007/978-3-540-24591-9_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20827-3
Online ISBN: 978-3-540-24591-9
eBook Packages: Springer Book Archive