Product Code Database
Example Keywords: mario kart -television $82-157
barcode-scavenger
   » » Wiki: S-box
Tag Wiki 'S-box'.
Tag

In , an S-box ( substitution-box) is a basic component of symmetric key algorithms which performs substitution. In , they are typically used to obscure the relationship between the key and the , thus ensuring property of confusion. Mathematically, an S-box is a nonlinear vectorial Boolean function.

In general, an S-box takes some number of input , m, and transforms them into some number of output bits, n, where n is not necessarily equal to m.

(2026). 9783642178771, Springer.
An m× n S-box can be implemented as a with 2 m words of n bits each. Fixed tables are normally used, as in the Data Encryption Standard (DES), but in some the tables are generated dynamically from the key (e.g. the Blowfish and the encryption algorithms).


Example
One good example of a fixed table is the S-box from DES (S5), mapping 6-bit input into a 4-bit output:

Given a 6-bit input, the 4-bit output is found by selecting the row using the outer two bits (the first and last bits), and the column using the inner four bits. For example, an input " 01101 1" has outer bits " 01" and inner bits "1101"; the corresponding output would be "1001".

(2026). 9780387950341, Springer. .


Analysis and properties
When DES was first published in 1977, the design criteria of its S-boxes were kept secret to avoid compromising the technique of differential cryptanalysis (which was not yet publicly known). As a result, research in what made good S-boxes was sparse at the time. Rather, the eight S-boxes of DES were the subject of intense study for many years out of a concern that a backdoor (a known only to its designers) might have been planted in the cipher. As the S-boxes are the only nonlinear part of the cipher, compromising those would compromise the entire cipher.

The S-box design criteria were eventually published (in ) after the public rediscovery of differential cryptanalysis, showing that they had been carefully tuned to increase resistance against this specific attack such that it was no better than brute force. Biham and Shamir found that even small modifications to an S-box could significantly weaken DES. Gargiulo's "S-box Modifications and Their Effect in DES-like Encryption Systems" p. 9.

Any S-box where any linear combination of output bits is produced by a of the input bits is termed a perfect S-box. RFC 4086. Section 5.3 "Using S-boxes for Mixing"

S-boxes can be analyzed using linear cryptanalysis and differential cryptanalysis in the form of a Linear approximation table (LAT) or and Difference Distribution Table (DDT) or autocorrelation table and spectrum. Its strength may be summarized by the nonlinearity (bent, almost bent) and differential uniformity (perfectly nonlinear, almost perfectly nonlinear).

(2026). 9783642284960, Springer.


See also


Further reading


Sources


External links

Page 1 of 1
1
Page 1 of 1
1

Account

Social:
Pages:  ..   .. 
Items:  .. 

Navigation

General: Atom Feed Atom Feed  .. 
Help:  ..   .. 
Category:  ..   .. 
Media:  ..   .. 
Posts:  ..   ..   .. 

Statistics

Page:  .. 
Summary:  .. 
1 Tags
10/10 Page Rank
5 Page Refs
1s Time