S-box is the basic component of symmetric cryptographic algorithms, and its cryptographic properties play a key role in security of the algorithms. In this paper we give the distributions of Walsh spectrum and the distributions of autocorrelation functions for (n + 1)-bit S-boxes in [12]. We obtain the nonlinearity of (n + 1)-bit S-boxes, and one necessary and sufficient conditions of (n + 1)-bit S-boxes satisfying m-order resilient. Meanwhile, we also give one characterization of (n + 1)-bit S-boxes satisfying t-order propagation criterion. Finally, we give one relationship of the sum-of-squares indicators between an n-bit S-box S0 and the (n + 1)-bit S-box S (which is constructed by S0).
Abstract-Unified Impossible Differential (UID) cryptanalysis is a systematic method to find impossible differentials for block ciphers and there are large amount of cryptanalysis results coming out by using it. ARIA is a Korean block cipher expecting no impossible differential chains on four or more rounds. In this paper, we apply UID to ARIA and 89136 four rounds impossible differential chains are found. With the optimization of the conflict searching algorithms, UID gets better results compared with former cryptanalysis results. Moreover, we conclude that no impossible differential chains with number of rounds larger than four can be found by the UID method.
Abstract-The CAESAR competition is launched in 2013 which aims to find some authenticated encryption with good security and performance. Among these submissions, LAC is designed in a unique way with leaked-state structure. In this paper, based on birthday paradox,we find a forgery attack on LAC in nonce-misused case with time complexity 2 28 . Moreover, we generalize the attack on normal version of leaked-state authenticated encryption and conclude some suggestions on how to use such structure.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.