Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

S-box parametric design method and storage medium based on bit-and operation

A parametric design, bit technology, applied in encryption devices with shift registers/memory, digital transmission systems, secure communication devices, etc. , uncontrollable cryptographic properties, etc., to achieve the effects of good cryptographic properties, good compatibility and easy portability, and good cryptographic properties

Active Publication Date: 2022-03-18
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure the security strength of the cryptographic algorithm and its components, if the componentized variable cryptographic algorithm realizes the parameterization of the algorithm components by replacing the non-linear fixed table, the off-line preset method will be the main method, in order to achieve the change amount of the security strength setting , the number of S-boxes that need to be pre-stored is generally large, and there are two weaknesses: one is that it occupies a large amount of storage resources of the cryptographic algorithm bearer device, and the other is that it cannot support online dynamic configuration
[0007] In terms of key-dependent variable S-boxes, RC4, Twofish and other algorithms adopt the design method of key-dependent S-boxes, but there are S-boxes that rely on random key exchange or multi-round iterations, and their cryptographic properties are uncontrollable. , can not give a theoretical circle with practical guiding significance and other design defects
[0008] In general, there are few researches on the S-box parametric design method in the current public information, and it is necessary to further improve its characteristics and capabilities in supporting online replacement configuration, safety and controllability, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • S-box parametric design method and storage medium based on bit-and operation
  • S-box parametric design method and storage medium based on bit-and operation
  • S-box parametric design method and storage medium based on bit-and operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] This embodiment provides a kind of S-box parametric design method based on bit-and operation, comprising the following steps:

[0062] CSH1: For the selected S-box size n, randomly select F 2 n-2 → F 2 The Boolean function f 1 , f 2 , f 1 , f 2 The algebraic degree is greater than or equal to 2 and its algebraic normal form does not contain 1-degree terms and constant terms; specifically, f 1 , f 2 Both include 2 U A non-zero Boolean function where U=2 n-2 -n+1;

[0063] CSH2: n-bit input data to S-box (x 0 ,x 1 ,x 2 ,...,x n-2 ,x n-1 ), traverse {0,1,…,2 in turn n -1} The n-bit binary vectors corresponding to all integer values ​​{(0,0,0,…,0,0),(0,0,0,…,0,1),…,(1,1,1 ,…,1,1)}, an n-bit binary vector (x 0 ,x 1 ,x 2 ,...,x n-2 ,x n-1 ), first perform multiple rounds of n-branched generalized Feistel structure round transformation, and then perform nonlinear transformation, and perform bit combination on the operation results to obtain n The value o...

Embodiment 2

[0089] This embodiment is on the basis of embodiment 1:

[0090] For the current mainstream S-boxes in domestic and foreign cryptographic algorithms, take n=8, and obtain the 8-bit S-box parameterization example commonly used in the actual algorithm through the above-mentioned steps CSH1 to CSH3 in Embodiment 1, namely:

[0091] Denote the 8-bit input data of the S box as (x 0 ,x 1 ,x 2 ,x 3 ,x 4 ,x 5 ,x 6 ,x 7 ), the 8-bit output data of the S box is denoted as (y 0 ,y 1 ,y 2 ,y 3 ,y 4 ,y 5 ,y 6 ,y 7 ), the 14-bit variable control parameter is denoted as (CS 0 ,CS 1 ,CS 2 ,CS 3 ,CS 4 ,CS 5 ,CS 6 ,CS 7 ,CS 8 ,CS 9 ,CS 10 ,CS 11 ,CS 12 ,CS 13 ), the 8-bit intermediate variable is denoted as (t 0 ,t 1 ,t 2 ,t 3 ,t 4 ,t 5 ,t 6 ,t 7 ), the 2-bit intermediate variable is denoted as (T 0 , T 1 ), specifically including steps QCSH1 to QCSH3:

[0092] QCSH1: For the selected S-box specification n=8, randomly select F 2 6 → F 2 The Boolean func...

Embodiment 3

[0106] This embodiment is on the basis of embodiment 1:

[0107] Considering the resource lightweight requirements of the hardware implementation of the cryptographic algorithm of the resource-constrained device and the equivalent gate, this embodiment implements f in Embodiment 1 1 , f 2 Make the following qualifications: f 1 , f 2 The algebraic degree of is 2 and its algebraic normal form contains only 2 terms of degree 2. Utilize the method that this embodiment 1 provides to produce hardware to realize equivalent gate low 8 8 parameterized S-boxes, searched by computer programs, and under the above-mentioned limited conditions, according to the design method in this embodiment 1, 52 new 8-bit lightweight S-boxes can be found, whose differential uniformity is not greater than 16, non- The linearity is not lower than 96.

[0108] One of the 52 types of 8-bit lightweight S-boxes is specifically given below, and a 5-bit parameter (CS0 ,CS 1 ,CS 2 ,CS 3 ,CS 4 ) control...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of communication encryption. The present invention discloses a S-box parameterized design method and storage medium based on bit-and operations. The method includes: randomly selecting F for the selected S-box specification n 2 n‑2 → F 2 The Boolean function f 1 , f 2 , for the n-bit input data of the S box, traverse {0,1,...,2 n ‑1} The n-bit binary vectors corresponding to all integer values, for the n-bit binary vectors corresponding to any integer value i, first perform multiple rounds of n-branched generalized Feistel structure round transformation, and then perform nonlinear transformation, and calculate the result Perform bit combination to obtain the value of the S-box of nn specification in the integer i, and finally output the S-box. The parameterized S-box obtained by the present invention has excellent cryptographic properties, and at the same time has low software and hardware implementation costs, and can provide abundant choices for parameterized obfuscation components of componentized variable cryptographic algorithms.

Description

technical field [0001] The invention relates to the technical field of communication encryption, in particular to a bit-and operation-based S-box parameterized design method and a storage medium. Background technique [0002] The invention relates to the technical field of communication encryption, in particular to a parametric design method of an obfuscation component S-box in symmetric cryptographic algorithms such as block ciphers, sequence ciphers, and hash algorithms. [0003] The design of existing symmetric cryptographic algorithms at home and abroad mainly adopts the "confusion" + "diffusion" principle proposed by Shannon in 1949. The relationship is so complex that an attacker cannot get any information about the plaintext from the ciphertext, or any information about the key from the plaintext pair. [0004] The "confusion" component generally uses a non-linear substitution S box (Substitution Box). The S-box first appeared in the block cipher algorithm Lucifer, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0631H04L9/0625
Inventor 张文政董新锋王金波申兵周宇胡建勇苗旭东穆道光
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products