首页 | 本学科首页   官方微博 | 高级检索  
     

Trace Representations of S-boxes and Their Application
引用本文:ZengXiang-yong FuJian-ming LiuHe-guo ZhangHuan-guo. Trace Representations of S-boxes and Their Application[J]. 武汉大学学报:自然科学英文版, 2004, 9(2): 173-176. DOI: 10.1007/BF02830597
作者姓名:ZengXiang-yong FuJian-ming LiuHe-guo ZhangHuan-guo
作者单位:[1]SchoolofComputer,WuhanUniversity,Wuhan430072,Hubei,China [2]StateKeyLaboratoryofInformationSecurity(GraduateSchoolofChineseAcademyofSciences),Beijing100039,China
基金项目:upportedbytheNationalNaturalScienceFoundationofChina (60 3730 89,60 3730 4 1 ) ,NaturalScienceFoundationofHubeiProvince (2 0 0 2AB0 0 37)andChenguangPlanofWuhanCity(2 0 0 2 50 0 1 0 0 7) .
摘    要:In the paper,we use trace representations of Boolean functions to obtain that a class mappings including functions F(x)=x^d over field GF(2^″),with W(d) =n-1,have desirable cryptographic properties.Therefore we generalize an important result of Nyberg.As application,we use these conclusions to analyze cryptographic property of the Sbox of AES(the Advanced Encryption Standard) and give its several equivalent representations,proving that the composition of inversion function of AES and any invertible affine transformations is impossible to satisfy strict avalanche criterion,any order propagation criteria and any order correlation immunity.

关 键 词:替换盒 Boolean函数 数据加密 迹函数 对称密码系统
收稿时间:2003-03-08

Trace representations of S-boxes and their application
Zeng Xiang-yong,Fu Jian-ming,Liu He-guo,Zhang Huan-guo. Trace representations of S-boxes and their application[J]. Wuhan University Journal of Natural Sciences, 2004, 9(2): 173-176. DOI: 10.1007/BF02830597
Authors:Zeng Xiang-yong  Fu Jian-ming  Liu He-guo  Zhang Huan-guo
Affiliation:Graduate School of Chinese Academy of Sciences
Abstract:In the paper, we use trace representations of Boolean functions to obtain that a class mappings including functions F(x)=x d over field GF(2 n), with W(d)=n-1, have desirable cryptographic properties. Therefore we generalize an important result of Nyberg. As application, we use these conclusions to analyze cryptographic property of the S-box of AES (the Advanced Encryption Standard) and give its several equivalent representations, proving that the composition of inversion function of AES and any invertible affine transformations is impossible to satisfy strict avalanche criterion,any order propagation criteria and any order correlation immunity.
Keywords:trace function  nonlinearity  differentially uniform  strict avalanche criterion
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号