Randomness Analysis of Key-Derived S-Boxes

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 239)


Although many ciphers use fixed, close to ideal, s-boxes (like AES for example), random s-boxes offer an interesting alternative since they have no underlying structure that can be exploited in cryptanalysis. For this reason, some cryptosystems generate pseudo-random s-boxes as a function of the key (key-derived).

We analyse the randomness properties of key-derived s-boxes generated by some popular cryptosystems like the RC4 stream cipher, and the Blowfish and Twofish block ciphers with the aim of establishing if this kind of s-boxes are indistinguishable from purely random s-boxes.

For this purpose we have developed a custom software framework to generate and evaluate random and key derived s-boxes.


S-Boxes Key-Derived Random RC4 Blowfish Twofish 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adams, C.M., Tavares, S.E.: Designing S-Boxes for Ciphers Resistant to Differential Cryptanalysis. In: Proc. 3rd Symposium on State and Progress of Research in Cryptography, pp. 181–190 (1993)Google Scholar
  2. 2.
    Álvarez, R., McGuire, G., Zamora, A.: The Tangle Hash Function. Submission to the NIST SHA-3 Competition (2008)Google Scholar
  3. 3.
    Álvarez, R., Vicent, J.F., Zamora, A.: Improving the Message Expansion of the Tangle Hash Function. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 183–189. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  4. 4.
    Álvarez, R., McGuire, G.: S-Boxes, APN Functions and Related Codes. In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, vol. 23, pp. 49–62. IOS Press (2009)Google Scholar
  5. 5.
    Fuller, J., Millan, W.: On linear redundancy in the AES S-Box. Cryptology ePrint Archive, Report 2002/111Google Scholar
  6. 6.
    Fuller, J., Millan, W., Dawson, E.: Multi-objective Optimisation of Bijective S-boxes. In: Congress on Evolutionary Computation, vol. 2, pp. 1525–1532 (2004)Google Scholar
  7. 7.
    The Go Programming Language,
  8. 8.
    Hussain, I., Shah, T., Gondal, M.A., Khan, W.A.: Construction of Cryptographically Strong 8x8 S-boxes. World Applied Sciences Journal 13(11), 2389–2395 (2011)Google Scholar
  9. 9.
    Jing-Mei, L., Bao-Dian, W., Xiang-Guo, C., Xin-Mei, W.: Cryptanalysis of Rijndael S-box and improvement. Applied Mathematics and Computation 170, 958–975 (2005)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Kavut, S.: Results on rotation-symmetric S-boxes. Information Sciences 201, 93–113 (2012)MathSciNetMATHCrossRefGoogle Scholar
  11. 11.
    Klein, A.: Attacks on the RC4 stream cipher. Designs, Codes and Cryptography 48(3), 269–286 (2008)MathSciNetMATHCrossRefGoogle Scholar
  12. 12.
    Mister, S., Adams, C.: Practical S-Box Design. In: Selected Areas in Cryptography (1996)Google Scholar
  13. 13.
    Murphy, S., Robshaw, M.J.B.: Key-Dependent S-Boxes and Differential Cryptanalysis. Designs, Codes and Cryptography 27(3), 229–255 (2002)MathSciNetMATHCrossRefGoogle Scholar
  14. 14.
    Provos, N., Mazeries, D.: Bcrypt Algorithm. USENIX (1999)Google Scholar
  15. 15.
    Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  16. 16.
    Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish encryption algorithm: a 128-bit block cipher. John Wiley & Sons (1999)Google Scholar
  17. 17.
    Youssef, A.M., Tavares, S.E.: Resistance of Balanced S-boxes to Linear and Differential Cryptanalysis. Information Processing Letters 56(5), 249–252 (1995)MathSciNetMATHCrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Dpt. of Computer Science and Artificial Intelligence (DCCIA)University of Alicante (Campus de San Vicente)AlicanteSpain

Personalised recommendations