Skip to main content

Cryptographic Uncertainness: Some Experiments on Finite Semifield Based Substitution Boxes

  • Chapter
  • First Online:
The Mathematics of the Uncertain

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 142))

  • 1253 Accesses

Abstract

Substitution boxes (S-boxes) are an important part of the design of block ciphers. They provide nonlinearity and so the security of the cipher depends strongly on them. Some block ciphers use S-boxes given by lookup tables (e.g., DES) where as others use S-boxes obtained from finite field operations (e.g., AES). As a generalization of the latter, finite semifields (i.e., finite nonassociative division rings) have been suggested as algebraic structures from which S-boxes with good cryptographic properties might be obtained. In this paper we present the results of experiments on the construction of S-boxes from finite semifields of orders 256 and 64, using the left and right inverses of these rings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Incidentally, let us mention that we had the privilege of learning the basic aspects of Probability, Statistics and Information Theory from Pedro himself, in two courses delivered at University of Oviedo some twenty years ago.

References

  1. Albert AA (1960) Finite division algebras and finite planes. In: Bellman R, Hall M Jr (eds) Combinatorial analysis-proceedings of symposia in applied mathematics, vol 10. SIAM/AMS, Providence

    Google Scholar 

  2. Boneh D, Shoup V (2015) A graduate course in applied cryptography. https://crypto.stanford.edu/~dabo/cryptobook/

  3. Combarro EF, Rúa IF, Ranilla J (2011) New advances in the computational exploration of semifields. Int J Comput Math 88(9):1990–2000

    Article  MathSciNet  MATH  Google Scholar 

  4. Cordero M, Wene GP (1999) A survey of finite semifields. Discret Math 208(209):125–137

    Article  MathSciNet  MATH  Google Scholar 

  5. Dumas JG, Orfila JB (2014) Generating S-boxes from semifields pseudo-extensions. arXiv:1411.2503

  6. Figueroa R, Salzberg PM, Shiue PJ-S (1994) A family of cryptosystems based on combinatorial properties of finite geometries. In: Mullen GL, Shiue PJ-S (eds) Contemporary mathematics, vol 168. AMS, Providence

    Google Scholar 

  7. Gil Álvarez P (1996) Las matemáticas de lo incierto. Servicio de publicaciones, Universidad de Oviedo. http://digibuo.uniovi.es/dspace/bitstream/10651/28625/1/matematicasincierto.pdf

  8. Goldreich O (2001) Foundations of cryptography. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  9. Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci 28(2):270–299

    Article  MathSciNet  MATH  Google Scholar 

  10. Kalka A (2012) Non-associative public-key cryptography. arXiv:1210.8270

  11. Knuth DE (1965) Finite semifields and projective planes. J Algebra 2:182–217

    Article  MathSciNet  MATH  Google Scholar 

  12. Lavrauw M, Polverino O (2011) Finite semifields and Galois geometry. In: De Beule J, Storme L (eds) Current research topics in galois geometry. NOVA Academic Publishers, Hauppauge

    Google Scholar 

  13. Malekian E, Zakerolhosseini A (2010) A non-associative lattice-based public key cryptosystem. Secur Commun Netw 5(2):145–163

    Article  Google Scholar 

  14. Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    Book  MATH  Google Scholar 

  15. Mister S, Adams C (1996) Practical S-box design. In: Tavares S, Meijer H (eds) SAC’96, 3rd Annual works selected areas in cryptography. Queen’s University, Kingston. http://sacworkshop.org/proc/SAC_96_005.pdf

  16. Rúa IF (2004) Anillos no asociativos en codificación y criptografía. Ph.D. thesis. University of Oviedo

    Google Scholar 

  17. Rúa IF, Combarro EF, Ranilla J (2009) Classification of semifields of order 64. J Algebra 322:4011–4029

    Article  MathSciNet  MATH  Google Scholar 

  18. Rúa IF, Combarro EF, Ranilla J (2012) Determination of division algebras with 243 elements. Finite Fields Their Appl 18:1148–1155

    Article  MathSciNet  MATH  Google Scholar 

  19. Saarinen M-JO (2012) Cryptographic analysis of all \(4 \times 4\)-bit S-boxes. In: Knudsen LR, Wu H (eds) Selected areas in cryptography, vol 7118. Lecture notes in computer science. Springer, Berlin

    Google Scholar 

  20. Shannon C (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423

    Article  MathSciNet  MATH  Google Scholar 

  21. Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  22. Stinson DR (2006) Cryptography: theory and practice, 3rd edn. Chapman and Hall/CRC, London

    MATH  Google Scholar 

Download references

Acknowledgements

I.F. Rúa is partially supported by MINECO-13-MTM2013-45588-C3-1-P, and Principado de Asturias Grant GRUPIN14-142. E.F. Combarro is partially supported by MINECO-16-TEC2015-67387-C4-3-R.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ignacio F. Rúa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rúa, I.F., Combarro, E.F. (2018). Cryptographic Uncertainness: Some Experiments on Finite Semifield Based Substitution Boxes. In: Gil, E., Gil, E., Gil, J., Gil, M. (eds) The Mathematics of the Uncertain. Studies in Systems, Decision and Control, vol 142. Springer, Cham. https://doi.org/10.1007/978-3-319-73848-2_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73848-2_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73847-5

  • Online ISBN: 978-3-319-73848-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics