RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2019 Issue 12, Pages 101–107 (Mi pdma447)

This article is cited in 2 papers

Mathematical Methods of Cryptography

On algorithmic implementation of 16-bit S-boxes with ARX and Butterfly structures

S. M. Komissarov

National Engineering Physics Institute "MEPhI", Moscow

Abstract: Implementations of non-linear mappings of vector space $V_n$ (s-boxes $n \times n$) as lookup-tables are memory intensive. It requires $n2^n$ bits to store $n$-bit s-box. That is why the existing block ciphers use s-boxes of relatively small size ($8\times8$ bit — AES, Kuznyechik, $6\times4$ bit — DES). New constructions of $16$-bit algorithmically implementable s-boxes with improved performance and cryptographic properties (in comparison with the existing methods) are proposed. The first method is based on ARX (Add-Rotate-XOR) structure, using low-cost computations in software and hardware. The second method is based on butterfly structure, using $8$-bit precomputed s-boxes to build $16\times16$ ones. Maximum expected differential probability, maximum expected linear probability and minimum nonlinear order over all linear combinations of the components of proposed s-boxes with ARX structure are $ 18/2^{16} $, $ 764/2^{15} $ and $15$, respectively and of suggested s-boxes with Butterfly structure are $ 10/2^{16} $, $ 512/2^{15} $ and $15$, respectively. It is established that the use of the proposed $16$-bit s-boxes in the round substitutions of AES and Kuznyechik block ciphers significantly lowers the upper bounds of differential and linear probabilities for two and four rounds of these algorithms.

Keywords: $16$-bit s-box, algorithmic implementation of s-boxes, ARX, Butterfly, maximum differential probability, maximum linear probability, nonlinear order.

UDC: 519.1

DOI: 10.17223/2226308X/12/32



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024