Construction of Side Channel Attack Resistant S-Boxes Using Genetic Algorithms Based on Coordinate Functions

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 157

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JECEI-10-1_012

تاریخ نمایه سازی: 1 آذر 1400

Abstract:

kground and Objectives: Substitution-box (S-Box) is one of the essential components creating confusion and nonlinear properties in cryptography. To strengthen a cipher against various attacks, including side channel attacks, these boxes need to have numerous security properties. In this paper, a novel S-Box construction method is introduced aimed at improving the resistance of S-Boxes against power analysis attacks.Methods: In the preprocessing phase of this approach, a suitable initial S-Box with some basic security properties was generated by adopting a fast algorithm. Then, in the main stage, using the initial S-Box, we generate new S-Boxes which not only have the properties of the initial S-Box but also have significantly improved under another set of security properties. To do this, new S-Boxes were generated using a genetic algorithm on a particular subset of the linear combination set of coordinate functions of the initial S-Box.Results: The performed experiments demonstrated that the values of all security properties of these new S-Boxes, especially the measures of transparency order, signal-to-noise ratio, confusion coefficient, bijection property, fixed point, and opposite fixed points, have been substantially improved. For example, our experiments indicate that ۷۰, ۲۲۰, ۲۰۷۱, ۴۳, and ۴۰۶ S-Boxes are found better than the initial S-Box, respectively, in the dimensions of ۴×۴ through ۸×۸Conclusion: In this paper, a new S-Box construction method is introduced where the properties related to side channel attacks are improved, without destroying other security features. Besides, some results obtained from generated S-Boxes in the dimensions of ۴×۴ through ۸×۸ demonstrated that the generated S-Boxes are not only improved relative to the initial S-Box, but also in certain cases, considerably better than some well-known S-Boxes.

Authors

B. Khadem

Faculty of Computer Engineering, Imam Hussein Comprehensive University, Tehran, Iran

S. Rajavzadeh

Faculty of Mathematics, Payam-e-Noor University (PNU) Graduate Center, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • C. Luo, et al., "Power analysis attack of an AES ...
  • H. Wang, T. Peyrin, “Boomerang switch in multiple rounds, Application ...
  • M. Safkhani, "Cryptanalysis of R۲AP an ultralightweight authentication protocol for ...
  • K. Chakraborty, et al, "Redefining the transparency order," Des. Codes ...
  • D. Tang, W. Zhang, X. Tang, "Construction of balanced Boolean ...
  • A. Anees, Y-P.P. Chen, "Designing secure substitution boxes based on ...
  • G. Tang, X. Liao, "A method for designing dynamical S-boxes ...
  • R. Yin, et al, "Designing key-dependent chaotic S-box with larger ...
  • L. Budaghyan, et al, "On upper bounds for algebraic degrees ...
  • Y. Wang, et al, "A novel method to design S-box ...
  • D. Lambić, "A novel method of S-box design based on ...
  • A. Razaq, et al, "A novel method for generation of ...
  • L. Budaghyan, C. Carlet, "CCZ-equivalence of bent vectorial functions and ...
  • A. Canteaut, L. Perrin, "On CCZ-equivalence, extended-affine equivalence, and function ...
  • B. Khadem, R. Ghasemi, "Improved algorithms in parallel evaluation of ...
  • Y. Xu, C. Wu, "On the primary constructions of vectorial ...
  • C. Carlet, C. Ding, "Nonlinearities of S-boxes," Finite Fields Appl., ...
  • P. Mishra, S. Sarkar, I. Gupta, "Determining the minimum degree ...
  • C. Carlet, "Characterizations of the differential uniformity of vectorial functions ...
  • B. Mazumdar, D. Mukhopadhyay, I. Sengupta, "Constrained search for a ...
  • S. Guilley, P. Hoogvorst, R. Pacalet, "Differential power analysis model ...
  • T. Siegenthaler, "Correlation-immunity of nonlinear combining functions for cryptographic applications," ...
  • C-K. Wu, D. Feng, "Boolean functions and their applications in ...
  • D. E. Knuth, "The art of computer programming," Vol. ۳. ...
  • J. Daemen, V. Rijmen, "The design of Rijndael." Information security ...
  • S. Picek, "Applications of evolutionary computation to cryptology," [Sl: sn, ...
  • L. Grassi, M. Schofnegger, "Mixture Integral Attacks on Reduced-Round AES ...
  • N. Sugio, Y. Igarashi, T. Kaneko, "Integral cryptanalysis of reduced-round ...
  • Y. Zheng, X.M. Zhang, "On relationships among avalanche, nonlinearity, and ...
  • S. Picek, et al, "On using genetic algorithms for intrinsic ...
  • C. Carlet, "On highly nonlinear S-boxes and their inability to ...
  • J. Detombe, S. Tavares "Constructing large cryptographically strong S-boxes," in ...
  • S. Picek, et al, "Confused by confusion: Systematic evaluation of ...
  • E. Prouff, "DPA attacks and S-boxes," in Proc. International Workshop ...
  • C. Carlet, et al, "Generalized correlation analysis of vectorial Boolean ...
  • H. Isa, N. Jamil, M. R. Z'aba. "S-box construction from ...
  • C. Carlet, K. Feng, "An infinite class of balanced vectorial ...
  • Y. Fei, Q. Luo, A.A. Ding, "A statistical model for ...
  • S. Picek, et al, "S-box, SET, match: a toolbox for ...
  • نمایش کامل مراجع