Paper 2019/528
Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)
Xavier Bonnetain, Léo Perrin, and Shizhu Tian
Abstract
S-boxes are functions with an input so small that the simplest way to specify them is their lookup table (LUT). Unfortunately, some algorithm designers exploit this fact to avoid providing the algorithm used to generate said lookup table. In this paper, we provide tools for finding the hidden structure in an S-box or to identify it as the output of a complex generation process rather than a random sample.
We introduce various "anomalies". These real numbers are such that a property with an anomaly equal to
Note: The paper was updated to take feedback from the Asiacrypt'19 reviewers into account.
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- A major revision of an IACR publication in ASIACRYPT 2019
- Keywords
- Reverse-engineeringVector space searchBCTKolmogorov complexityStreebogKuznyechikShannon effectAnomaly.
- Contact author(s)
-
leo perrin @ inria fr
xavier bonnetain @ inria fr
tianshizhu @ iie ac cn - History
- 2019-09-10: revised
- 2019-05-20: received
- See all versions
- Short URL
- https://ia.cr/2019/528
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/528, author = {Xavier Bonnetain and Léo Perrin and Shizhu Tian}, title = {Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/528}, year = {2019}, url = {https://eprint.iacr.org/2019/528} }