• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Runlian, Sun Yaping, Wei Yongzhuang, Li Yingxin. A New Automatic Search Method for Cryptographic S-Box[J]. Journal of Computer Research and Development, 2020, 57(7): 1415-1423. DOI: 10.7544/issn1000-1239.2020.20190537
Citation: Zhang Runlian, Sun Yaping, Wei Yongzhuang, Li Yingxin. A New Automatic Search Method for Cryptographic S-Box[J]. Journal of Computer Research and Development, 2020, 57(7): 1415-1423. DOI: 10.7544/issn1000-1239.2020.20190537

A New Automatic Search Method for Cryptographic S-Box

Funds: This work was supported by the National Natural Science Foundation of China (61572148, 61872103), the Guangxi Innovation Research Team Project (2019GXNSFGA245004), the Key Research and Development Program of Guangxi (guike AB18281019), the Natural Science Foundation of Guangxi Autonomous Region of China (2018GXNSFAA294036), the Project of Guangxi Key Laboratory of Cryptography and Information Security (GCIS201705), the Project of Guangxi Colleges Key Laboratory of Cloud Computing and Complex Systems (YF16205), and the Innovation Project of Guangxi Graduate Education (YCSW2018138, YCBZ2018051).
More Information
  • Published Date: June 30, 2020
  • The cryptographic S-boxes are core component in too many symmetric encryption algorithms, which usually determine the security strength of these algorithms. The secure evaluation indicators for these cryptographic S-boxes contain balancedness, algebraic degree, nonlinearity, and differential uniformity etc. How to design the cryptographic S-boxes that have some robust abilities (indicators) against both the traditional attacks and the side channel attacks such as power attacks appears to be a rather difficult task. Currently, the automatic search tools, such as CA(cellular automata), neural network, etc, have became the research hotspots regarding to the design of the cryptographic S-box, except to the classical algebraic construction. Based on the CA rules, a new search method for S-box is proposed, which uses the strategy of partial fixed and separate searching for the variable components. More specifically, in the first place, the features of CA rules of this method is described. Moreover, the strategy of partial fixed and separate searching for the variable components according to the properties of cryptographic S-boxes is constructed. Finally, some new S-boxes are achieved and their features of these S-boxes are also evaluated. It is shown that too many 4×4 optimal S-boxes are attained. In particular, three classes of 4×4 sub-optimal S-boxes can also be transformed to some 4×4 optimal S-boxes under the CA rules of this method. Compared with the previous well-known results, these new 4×4 optimal S-boxes have lower transparency order so that they have a robuster ability against side channel attacks.
  • Related Articles

    [1]Yin Yuyu, Wu Guangqiang, Li Youhuizi, Wang Xinyu, Gao Honghao. A Machine Unlearning Method via Feature Constraint and Adaptive Loss Balance[J]. Journal of Computer Research and Development, 2024, 61(10): 2649-2661. DOI: 10.7544/issn1000-1239.202440476
    [2]Fan Ye, Peng Shujuan, Liu Xin, Cui Zhen, Wang Nannan. Cross-Modal Anomaly Detection via Hierarchical Deep Networks and Bi-Quintuple Loss[J]. Journal of Computer Research and Development, 2022, 59(12): 2770-2780. DOI: 10.7544/issn1000-1239.20210729
    [3]Zhang Qiang, Yang Jibin, Zhang Xiongwei, Cao Tieyong, Zheng Changyan. CS-Softmax: A Cosine Similarity-Based Softmax Loss Function[J]. Journal of Computer Research and Development, 2022, 59(4): 936-949. DOI: 10.7544/issn1000-1239.20200879
    [4]He Xianmin, Li Maoxi, He Yanqing. Siamese BERT-Networks Based Classification Mapping of Scientific and Technological Literature[J]. Journal of Computer Research and Development, 2021, 58(8): 1751-1760. DOI: 10.7544/issn1000-1239.2021.20210323
    [5]Wang Jina, Chen Junhua, Gao Jianhua. ECC Multi-Label Code Smell Detection Method Based on Ranking Loss[J]. Journal of Computer Research and Development, 2021, 58(1): 178-188. DOI: 10.7544/issn1000-1239.2021.20190836
    [6]Song Chuanming, He Xing, Min Xin, Wang Xianghai. Index Map Prediction by 2-Neighbor Joint Transition Probability in Palette Coding[J]. Journal of Computer Research and Development, 2018, 55(11): 2557-2568. DOI: 10.7544/issn1000-1239.2018.20170247
    [7]Zhou Yu, He Jianjun, Gu Hong, Zhang Junxing. A Fast Partial Label Learning Algorithm Based on Max-loss Function[J]. Journal of Computer Research and Development, 2016, 53(5): 1053-1062. DOI: 10.7544/issn1000-1239.2016.20150267
    [8]Zhu Yelei, Wang Yujun, Luo Qiang, and Tao Qing. A Soft-Thresholding Coordinate Descent Algorithm for Solving Truncated Hinge Loss[J]. Journal of Computer Research and Development, 2013, 50(11): 2295-2303.
    [9]Kong Kang, Tao Qing, Wang Qunshan, Chu Dejun. A Sub-Gadient Based Solver for L1-Rgularization+Hinge-Loss Problem[J]. Journal of Computer Research and Development, 2012, 49(7): 1494-1499.
    [10]Weng Dawei, Yin Yilong, Yang Gongping, and Qi Xiuyan. Singular Point Extraction from Fingerprint Based on Gaussian-Hermite Moment and Improved Poincare Index[J]. Journal of Computer Research and Development, 2008, 45(11): 1974-1984.
  • Cited by

    Periodical cited type(6)

    1. 唐续豪,刘发贵,王彬,李超,蒋俊,唐泉,陈维明,何凤文. 跨云环境下任务调度综述. 计算机研究与发展. 2023(06): 1262-1275 . 本站查看
    2. 仝青,郭云飞,霍树民,王亚文. 面向主动防御的多样性研究进展. 信息安全学报. 2022(03): 119-133 .
    3. 秦轶翚,马涛. 对等网络环境下多目标任务容错调度方法研究. 计算机仿真. 2021(08): 352-355 .
    4. 刘林东. 一种改进的wRR独立任务调度算法研究. 广东第二师范学院学报. 2020(03): 89-93 .
    5. 郑子秋,张卫东,刘宁,付秋璇,尹健康,贺红梅. 信息安全技术在企业ERP系统中的应用. 科技创新与应用. 2019(18): 174-176 .
    6. 徐俊,项倩红,肖刚. 基于改进混合蛙跳算法的云工作流负载均衡调度优化. 计算机科学. 2019(11): 315-322 .

    Other cited types(9)

Catalog

    Article views (942) PDF downloads (187) Cited by(15)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return