Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

S-box parameterization design method based on bit AND operation and storage medium

A parametric design and bit-based technology, applied to encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., can solve problems such as large quantities, uncontrollable cipher properties, and occupation of storage resources

Active Publication Date: 2021-03-16
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure the security strength of the cryptographic algorithm and its components, if the componentized variable cryptographic algorithm realizes the parameterization of the algorithm components by replacing the non-linear fixed table, the off-line preset method will be the main method, in order to achieve the change amount of the security strength setting , the number of S-boxes that need to be pre-stored is generally large, and there are two weaknesses: one is that it occupies a large amount of storage resources of the cryptographic algorithm bearer device, and the other is that it cannot support online dynamic configuration
[0007] In terms of key-dependent variable S-boxes, RC4, Twofish and other algorithms adopt the design method of key-dependent S-boxes, but there are S-boxes that rely on random key exchange or multi-round iterations, and their cryptographic properties are uncontrollable. , can not give a theoretical circle with practical guiding significance and other design defects
[0008] In general, there are few researches on the S-box parametric design method in the current public information, and it is necessary to further improve its characteristics and capabilities in supporting online replacement configuration, safety and controllability, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • S-box parameterization design method based on bit AND operation and storage medium
  • S-box parameterization design method based on bit AND operation and storage medium
  • S-box parameterization design method based on bit AND operation and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] This embodiment provides a kind of S-box parametric design method based on bit-and operation, comprising the following steps:

[0062] CSH1: For the selected S-box size n, randomly select F 2 n-2 → F 2 The Boolean function f 1 , f 2 , f 1 , f 2 The algebraic degree is greater than or equal to 2 and its algebraic normal form does not contain 1-degree terms and constant terms; specifically, f 1 , f 2 Both include 2 U A non-zero Boolean function where U=2 n-2 -n+1;

[0063] CSH2: n-bit input data to S-box (x 0 ,x 1 ,x 2 ,...,x n-2 ,x n-1 ), traverse {0,1,…,2 in turn n -1} The n-bit binary vectors corresponding to all integer values ​​{(0,0,0,…,0,0),(0,0,0,…,0,1),…,(1,1,1 ,…,1,1)}, an n-bit binary vector (x 0 ,x 1 ,x 2 ,...,x n-2 ,x n-1 ), first perform multiple rounds of n-branched generalized Feistel structure round transformation, and then perform nonlinear transformation, and perform bit combination on the operation results to obtain n The value o...

Embodiment 2

[0089] This embodiment is on the basis of embodiment 1:

[0090] For the current mainstream S-boxes in domestic and foreign cryptographic algorithms, set n=8, through the above-mentioned steps CSH1 to CSH3 in Embodiment 1, obtain the 8-bit S-box parameterization example commonly used in the actual algorithm, namely:

[0091] Denote the 8-bit input data of the S box as (x 0 ,x 1 ,x 2 ,x 3 ,x 4 ,x 5 ,x 6 ,x 7 ), the 8-bit output data of the S box is denoted as (y 0 ,y 1 ,y 2 ,y 3 ,y 4 ,y 5 ,y 6 ,y 7 ), the 14-bit variable control parameter is denoted as (CS 0 ,CS 1 ,CS 2 ,CS 3 ,CS 4 ,CS 5 ,CS 6 ,CS 7 ,CS 8 ,CS 9 ,CS 10 ,CS 11 ,CS 12 ,CS 13 ), the 8-bit intermediate variable is denoted as (t 0 ,t 1 ,t 2 ,t 3 ,t 4 ,t 5 ,t 6 ,t 7 ), the 2-bit intermediate variable is denoted as (T 0 , T 1 ), specifically including steps QCSH1 to QCSH3:

[0092] QCSH1: For the selected S-box specification n=8, randomly select F 2 6 → F 2 The Boolean function...

Embodiment 3

[0106] This embodiment is on the basis of embodiment 1:

[0107] Considering the resource lightweight requirements of the hardware implementation of the cryptographic algorithm of the resource-constrained device and the equivalent gate, this embodiment implements f in Embodiment 1 1 , f 2 Make the following qualifications: f 1 , f 2 The algebraic degree of is 2 and its algebraic normal form contains only 2 terms of degree 2. Utilize the method that this embodiment 1 provides to produce hardware to realize equivalent gate low 8 8 parameterized S-boxes, searched by computer programs, under the above-mentioned limited conditions, according to the design method in this embodiment 1, 52 new 8-bit lightweight S-boxes can be found, and their differential uniformity is not greater than 16. The linearity is not lower than 96.

[0108] One of the 52 types of 8-bit lightweight S-boxes is specifically given below, and a 5-bit parameter (CS0 ,CS 1 ,CS 2 ,CS 3 ,CS 4 ) control to g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication encryption, and discloses an S-box parameterization design method based on bit AND operation and a storage medium, and the method comprises the steps: randomly selecting Boolean functions f1 and f2 from F2n-2 to F2 for a selected S-box specification n, inputting data to n bits of an S box, sequentially traversing n-bit binary vectors corresponding to all integer values {0, 1,..., 2n-1}; for the n-bit binary vector corresponding to any integer value i, firstly carrying out multiple rounds of round transformation of n generalized Feistel structures, then carrying out nonlinear transformation, carrying out bit combination on an operation result to obtain a numerical value of an S box of an nn specification in the integer i, and finally outputting the S box. The parameterized S box obtained by the invention has excellent cryptographic properties and lower software and hardware implementation cost, and can provide rich choices for parameterized obfuscation components of a modular variable cryptographic algorithm.

Description

technical field [0001] The invention relates to the technical field of communication encryption, in particular to a bit-and operation-based S-box parameterized design method and a storage medium. Background technique [0002] The invention relates to the technical field of communication encryption, in particular to a parametric design method of an obfuscation component S-box in symmetric cryptographic algorithms such as block ciphers, sequence ciphers, and hash algorithms. [0003] The design of existing symmetric cryptographic algorithms at home and abroad mainly adopts the "confusion" + "diffusion" principle proposed by Shannon in 1949. The relationship is so complex that an attacker cannot get any information about the plaintext from the ciphertext, or any information about the key from the plaintext pair. [0004] The "confusion" component generally uses a non-linear substitution S box (Substitution Box). The S-box first appeared in the block cipher algorithm Lucifer, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
CPCH04L9/0631H04L9/0625
Inventor 张文政董新锋王金波申兵周宇胡建勇苗旭东穆道光
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products