Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A complete avalanche 4*4 S box implementation method

An implementation method and complete technology, applied in the field of information security, can solve the problems of simple S-box algebraic expressions and not satisfying the complete avalanche criterion, and achieve the effects of improving security, good avalanche effect, and resisting linear attacks and algebraic attacks.

Active Publication Date: 2019-06-21
HENGYANG NORMAL UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0033] In order to solve the problems that the S-box algebraic expression is too simple and does not satisfy the complete avalanche criterion, combined with the design idea of ​​block cipher, the present invention provides a complete avalanche 4×4 S-box realization method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A complete avalanche 4*4 S box implementation method
  • A complete avalanche 4*4 S box implementation method
  • A complete avalanche 4*4 S box implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] A method and device for implementing a complete avalanche 4×4 S-box of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0053] The actual operation of the S box is a mapping table. For a 4×4 S box, the input is an integer from 0 to 15, and the output is an integer from 0 to 15. The input information of the S box is only 4 bits each time. For example, if you input a 0, use The 4-bit binary number representation is 0000. Then 0000 is represented by (x0, x1, x2, x3), that is, x0, x1, x2, and x3 represent a 0 respectively. .

[0054] Suppose a number a (a∈[0,15]) is input, its binary numbers are x0, x1, x2, x3, and x0, x1, x2, x3 are set according to figure 1 Enter the nonlinear layer.

[0055] The output of the nonlinear layer is obtained as y0, y1, y2, y3.

[0056] a input nonlinear layer operation, the corresponding output is:

[0057] a(0)=0, a(1)=8, a(2)=F, a(3)=3, a(4)=2, a(5)=5, a(6)=C, a (7)=A, a(...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a complete avalanche 4 * 4 S box implementation method, wherein x0, x1, x2 and x3 are inputs of the S box, s0, s1, s2 and s3 are outputs of the S box, and the first part is a nonlinear layer and comprises eight function operations of Fa0, Fa1, Fa2, Fa3, Fb0, Fb1, Fb2 and Fb3 and four xor operations; and the second part is a diffusion layer and comprises two function operations of F0 and F1 and four exclusive-OR operations. The output values y0, y1, y2 and y3 of the nonlinear layer are optimal, complete avalanche values s0, s1, s2 and s3 are output through conversion ofthe diffusion layer, the Boolean function algebraic number of the S box is 3, and the Boolean function algebraic numbers are 9, 9, 13 and 10 respectively. The S box constructed by the invention has acomplete avalanche effect, and other performance indexes are good, so that the S box can be applied to a lightweight block cipher algorithm, and the security of the S box is enhanced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a construction method of an important non-linear component S-box in a lightweight block cipher algorithm. Background technique [0002] With the development of the Internet of Things, people pay more and more attention to information security. How to encrypt data efficiently and safely has become a hot issue. The S-box is an important nonlinear component in the symmetric block cipher algorithm, so-called, the security of the S-box determines the security of the symmetric block cipher algorithm. [0003] The S-box can be seen as GF(2) n →GF(2) m permutation on , for a 4×4 S-box: y(y 0 ,y 1 ,y 2 ,y 3 )=S(x 0 ,x 1 ,x 2 ,x 3 ), that is, 4-bit x input and 4-bit y output. The larger n and m are, the better the security of the S-box is, and the stronger the attack resistance of the symmetric block cipher algorithm constructed by it is. However, the lightweight block ciphe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 李浪刘景根
Owner HENGYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products