In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities

09/05/2023
by   Yuying Man, et al.
0

Substitution boxes (S-boxes) play a significant role in ensuring the resistance of block ciphers against various attacks. The Difference Distribution Table (DDT), the Feistel Boomerang Connectivity Table (FBCT), the Feistel Boomerang Difference Table (FBDT) and the Feistel Boomerang Extended Table (FBET) of a given S-box are crucial tools to analyze its security concerning specific attacks. However, the results on them are rare. In this paper, we investigate the properties of the power function F(x):=x^2^m+1-1 over the finite field _2^n of order 2^n where n=2m or n=2m+1 (m stands for a positive integer). As a consequence, by carrying out certain finer manipulations of solving specific equations over _2^n, we give explicit values of all entries of the DDT, the FBCT, the FBDT and the FBET of the investigated power functions. From the theoretical point of view, our study pushes further former investigations on differential and Feistel boomerang differential uniformities for a novel power function F. From a cryptographic point of view, when considering Feistel block cipher involving F, our in-depth analysis helps select F resistant to differential attacks, Feistel differential attacks and Feistel boomerang attacks, respectively.

READ FULL TEXT
research
12/08/2020

On the differential spectrum of a class of power functions over finite fields

Differential uniformity is a significant concept in cryptography as it q...
research
12/09/2022

On the Evolution of Boomerang Uniformity in Cryptographic S-boxes

S-boxes are an important primitive that help cryptographic algorithms to...
research
01/26/2022

Boomerang Spectra of Two Classes of Power Functions via Their Differential Spectra

In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptograp...
research
08/08/2022

Differential biases, c-differential uniformity, and their relation to differential attacks

Differential cryptanalysis famously uses statistical biases in the propa...
research
07/19/2020

Using double Weil sums in finding the c-Boomerang Connectivity Table for monomial functions on finite fields

In this paper we characterize the c-Boomerang Connectivity Table (BCT), ...
research
09/10/2018

Unicyclic Strong Permutations

For positive integers n and k such that 0≤ k≤ n-1, we study some propert...
research
03/01/2019

On the boomerang uniformity of (quadratic) permutations over F_2^n

At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new t...

Please sign up or login with your details

Forgot password? Click here to reset