How to Improve the Nonlinearity of Bijective S-Boxes

A method for the systematic improvement of the nonlinearity of bijective substitution boxes is presented. It is shown how to select two outputs so that swapping them increases the nonlinearity. Experimental results show that highly nonlinear bijective substitutions can be obtained by this method that are difficult to obtain by random generation. A survey of results in the design of S-boxes is included.

[1]  Da-Zheng Feng,et al.  Almost perfect nonlinear permutations , 1994 .

[2]  J. Seberry,et al.  Relationships among nonlinearity criteria , 1994 .

[3]  Hideki Imai,et al.  A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion , 1990, CRYPTO.

[4]  Lars R. Knudsen,et al.  Provable Security Against Differential Cryptanalysis , 1992, CRYPTO.

[5]  Kaisa Nyberg,et al.  Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.

[6]  Josef Pieprzyk,et al.  Error propagation property and application in cryptography , 1989 .

[7]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[8]  Kaisa Nyberg,et al.  Perfect Nonlinear S-Boxes , 1991, EUROCRYPT.

[9]  Josef Pieprzyk,et al.  Towards effective nonlinear cryptosystem design , 1988 .

[10]  Jennifer Seberry,et al.  Systematic generation of cryptographically robust S-boxes , 1993, CCS '93.

[11]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[12]  Jennifer Seberry,et al.  Cryptographic Boolean functions via group Hadamard matrices , 1994, Australas. J Comb..

[13]  Kaisa Nyberg,et al.  On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.

[14]  Mitsuru Matsui,et al.  New Block Encryption Algorithm MISTY , 1997, FSE.

[15]  Jennifer Seberry,et al.  Pitfalls in Designing Substitution Boxes (Extended Abstract) , 1994, CRYPTO.

[16]  Josef Pieprzyk,et al.  Non-linearity of Exponent Permutations , 1990, EUROCRYPT.

[17]  Cunsheng Ding,et al.  On Almost Perfect Nonlinear Permutations , 1994, EUROCRYPT.

[18]  O. S. Rothaus,et al.  On "Bent" Functions , 1976, J. Comb. Theory, Ser. A.

[19]  William Millan,et al.  On the Security of Self-Synchronous Ciphers , 1997, ACISP.