Abstract
The S-boxes used in the DES are the major cryptographic component of the system. Any structure which they possess can have far reaching implications for the security of the algorithm. Structure may exist as a result of design principles intended to strengthen security. Structure could also exist as a “trapdoor” for breaking the system. This paper examines some properties which the S-boxes satisfy and attempts to determine a reason for such structure to exist.
This work performed at Sandia National Laboratories supported by the U.S. Department of Energy under contract number DE-AC04-76DP00789.
This work performed while the author was visiting Bell Communications Research.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Dennis K. Branstead, Jason Gait, and Stuart Katzke, “Report of the Workshop on Cryptography in Support of Computer Security,” National Bureau of Standads, September 21–22, 1976, NBSIR 77-1291, September 1977.
Dorothy E.R. Denning, “Cryptography and Data Security,” Addison-Wesley, Menlo Park, California, 1983.
Alan G. Konheim, “Cryptography, A Primer,” John Wiley, New York, 1981.
Lexar Corporation, “An Evaluation of the NBS Data Encryption Standard,” unpublished report, Lexar Corporation, 11611 San Vicente Blvd., Los Angeles, 1976.
National Bureau of Standards, “Encryption Algorithm for Computer Data Protection,” Federal Register, 40, March 17, 1975, pp. 12134–12139.
Adi Shamir, “On the Security of DES,” Advances in Cryptology, Proceedings of Crypto 85, pp.280–281.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1987 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brickell, E.F., Moore, J.H., Purtill, M.R. (1987). Structure in the S-Boxes of the DES (extended abstract). In: Odlyzko, A.M. (eds) Advances in Cryptology — CRYPTO’ 86. CRYPTO 1986. Lecture Notes in Computer Science, vol 263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47721-7_1
Download citation
DOI: https://doi.org/10.1007/3-540-47721-7_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18047-0
Online ISBN: 978-3-540-47721-1
eBook Packages: Springer Book Archive