Abstract

In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes. Continuously developed for decades, S-boxes are constantly evolving in terms of the design criteria for both security requirements and software/hardware performances. PEIGEN is aimed to be a platform covering a comprehensive check-list of design criteria of S-boxes appearing in the literature. To do so, the security requirements are first intensively surveyed, existing tools of S-boxes are then comprehensively compared, and finally our platform PEIGEN is presented. The survey part is aimed to be a systematic reference for the theoretical study of S-boxes. The platform is aimed to be an assistant tool for the experimental study and practical use of S-boxes. PEIGEN not only integrates most of the features in existing tools, but also equips with functionalities to evaluate new security-related properties, improves the efficiency of the search algorithms for optimized implementations in several aspects. With the help of this powerful platform, many interesting observations are made in-between the security notations, as well as on the S-boxes used in the existing symmetrickey cryptographic primitives. PEIGEN will become an open platform and welcomes contributions from all parties to help the community to facilitate the research and use of S-boxes.

Highlights

  • The substitution-box, or S-box for short, is commonly used in the design of symmetric cryptography primitives to offer non-linearity

  • Given a set of n-bit S-boxes and the specific implementation configuration, Peigen can provide their implementations under various techniques, which are good with respect to different merits: 1. Bitslice gate complexity (BGC), Gate equivalent complexity (GEC), and Multiplicative complexity (MC): outputs implementations optimized for area and code size, i.e., with minimized number of gates/equivalent gates under different implementation techniques, or with minimized number of non-linear operations; 2

  • For readers who are interested in the resulting summary on cryptographic properties of existing S-boxes, details are provided in the supplementary materials, which provide concisely summarized and thoroughly detailed evaluations

Read more

Summary

Introduction

The substitution-box, or S-box for short, is commonly used in the design of symmetric cryptography primitives to offer non-linearity. To make a better trade-off between the security and performance, there is a line of research developing tools for finding the optimal implementations. In the later part of this paper, we follow the line of research in developing tools for evaluating and implementing S-box. Security and implementation aspects are hard to consider simultaneously This motivates us to present a platform named Peigen for evaluating the security properties, finding optimal implementations for given S-boxes, and generating all suitable S-boxes when the security and performance requirements are given. When finding implementations and generating new n-bit S-boxes, it is more efficient than existing tools for n = 3, 4 It only supports 3 ≤ n ≤ 8-bit S-boxes, which is mainly because of the application of specific optimization tricks, it can be extended to support larger n.

Notations
Preliminaries
S-box Design Criteria
Resistance to Differential Attack
Resistance to Linear Attack
Resistance to Boomerang Attack
Resistance to Algebraic Attacks
Resistance to Truncated Differential and Subspace Trail Attacks
Resistance to Cube or Cube-like Attacks
Hash Function Settings
Others
For Linear Layers only Composed of Bit-Permutation
For Linear Layers Using Binary Orthogonal Matrices
Implementation Criteria
Invariant Properties under Simple Transformations
Relations
The Peigen Platform
Existing Tools on S-box
Method
Functionalities of Peigen
Evaluating
Implementing
Generating
Pre-computation
Other amendments:
Future Work on Peigen
Summarizations on Cryptographic Properties of Existing S-boxes
Implemented S-boxes
Generated S-boxes
Observations and Discussions on Inclusive and Exclusive Criteria
Conclusion and Future Work
A A Complete List of Notations
B Examples for Some Notations
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call