Open Access   Article Go Back

A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks

Avijit Datta1 , Dipanjan Bhowmik2 , Sharad Sinha3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 7-13, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.713

Online published on May 31, 2019

Copyright © Avijit Datta, Dipanjan Bhowmik, Sharad Sinha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Avijit Datta, Dipanjan Bhowmik, Sharad Sinha, “A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.7-13, 2019.

MLA Style Citation: Avijit Datta, Dipanjan Bhowmik, Sharad Sinha "A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks." International Journal of Computer Sciences and Engineering 7.5 (2019): 7-13.

APA Style Citation: Avijit Datta, Dipanjan Bhowmik, Sharad Sinha, (2019). A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks. International Journal of Computer Sciences and Engineering, 7(5), 7-13.

BibTex Style Citation:
@article{Datta_2019,
author = {Avijit Datta, Dipanjan Bhowmik, Sharad Sinha},
title = {A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {7-13},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4190},
doi = {https://doi.org/10.26438/ijcse/v7i5.713}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.713}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4190
TI - A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks
T2 - International Journal of Computer Sciences and Engineering
AU - Avijit Datta, Dipanjan Bhowmik, Sharad Sinha
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 7-13
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
559 618 downloads 191 downloads
  
  
           

Abstract

In recent times, there exist several approaches for differential-style attacks like truncated differential attack, high-level differential attack, boomerang attack etc. This paper involves the study of boomerang-style attack on S-boxes and a new SAC analysis approach to test the strength of S-boxes against such attacks. The proposed analysis is tested on each input elements of 8 S-boxes of DES and 8 input elements on the S-box of AES. The vulnerability factor n⁄2 has been measured by calculating all 1`s of every column from the generated SAC matrix. Finally a comparison of standard deviation, coefficient of variance and other factors show the way towards the conclusion.

Key-Words / Index Term

Block Cipher, S-box, Differential Cryptanalysis, Boomerang attack, Truncated Differential

References

[1] Wagner D. (1999) The Boomerang Attack. In: Knudsen L. (eds) Fast Software Encryption. FSE 1999. Lecture Notes in Computer Science, vol 1636. Springer, Berlin, Heidelberg
[2] Cid C., Huang T., Peyrin T., Sasaki Y., Song L. (2018) Boomerang Connectivity Table: A New Cryptanalysis Tool. In: Nielsen J., Rijmen V. (eds) Advances in Cryptology – EUROCRYPT 2018. EUROCRYPT 2018. Lecture Notes in Computer Science, vol 10821. Springer, Cham
[3] Choy J., Yap H. (2009) Impossible Boomerang Attack for Block Cipher Structures. In: Takagi T., Mambo M. (eds) Advances in Information and Computer Security. IWSEC 2009. Lecture Notes in Computer Science, vol 5824. Springer, Berlin, Heidelberg
[4] Kim, Jongsung & Moon, Dukjae & Lee, Wonil & Hong, Seokhie & Lee, Sangjin & Jung, Seokwon. (2002). Amplified boomerang attack against reduced-round SHACAL. SIACRYPT 2002, LNCS 2501, pp. 243–253, 2002.c©Springer-Verlag Berlin Heidelberg 2002.doi: 10.1007/3-540-36178-2_15.
[5] Koo, Bonwook & Yeom, Yongjin & Song, Junghwan. (2010). Related-Key Boomerang Attack on Block Cipher SQUARE. IACR Cryptology ePrint Archive. 2010. 73. 10.1587/transfun.E94.A.3.
[6] H. Handschuh, D. Naccache, SHACAL, NESSIE project, October 2001.
[7] Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18.Springer, Heidelberg (2009)
[8] Avijit Datta, Dipanjan Bhowmik, Sharad Sinha, "A New Approach towards Confusion Analysis of S-boxes using Truncated Differential Cryptanalysis", International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.249-256, 2019.
[9] Biham, E., & Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1), 3–72. doi:10.1007/bf00630563
[10] Lai X., Massey J.L., Murphy S. (1991) Markov Ciphers and Differential Cryptanalysis. In: Davies D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg
[11] Cheung, Jennifer Miuling. "The design of S-boxes." PhD diss., Sciences, 2010.
[12] C. Adams and S. Tavares. The structured design of cryptographically good s-boxes.Journal of Cryptology, 3(1):27–41, 1990.
[13] J. Cobas and J. Brugos. Complexity-theoretical approaches to the design and analysis of cryptographical boolean functions. InComputer Aided Systems Theory–EUROCAST2005, Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany, 2005.
[14] A.Datta, D.Bhowmick, S. Sinha, “A Novel Technique for Analysing Confusion in S-boxes.” International Journal of Innovative Research in Computer and Communication Engineering, 2016. 4(6): p. 11608-11615.
[15] A.Datta, D.Bhowmick, S. Sinha, “Implementation of SAC Test for Analyzing Confusion in an S-box Using a Novel Technique.” International Journal of Scientific Research in Computer Science Applications and Management Studies, Vol. 7, Issue 3, No. 182
[16] D.Bhowmick, A.Datta, S. Sinha. “A Bit-Level Block Cipher Diffusion Analysis Test.” Springer International Publishing Switzerland 2015: S.C.Satpathy et. al. (eds), Proc of 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014-Col. I, Advances in Intelligent Systems and Computing 327. pp: 667-674.
[17] P. Sharma, D. Mishra, V.K. Sarthi, P. Bhatpahri, R. Shrivastava, "Visual Encryption Using Bit Shift Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.57-61, 2017