Reconstructing an S-box from its Difference Distribution Table

In this paper we study the problem of recovering a secret S-box from its difference distribution table (DDT). While being an interesting theoretical problem on its own, the ability to recover the S-box from the DDT of a secret S-box can be used in cryptanalytic attacks where the attacker can obtain...

Full description

Bibliographic Details
Main Authors: Orr Dunkelman, Senyang Huang
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2019-06-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
DDT
LAT
Online Access:https://ojs-speed.ub.rub.de/index.php/ToSC/article/view/8319
id doaj-e712a0645172441a9183ae92d0568178
record_format Article
spelling doaj-e712a0645172441a9183ae92d05681782021-04-02T11:48:59ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2019-06-012019210.13154/tosc.v2019.i2.193–217Reconstructing an S-box from its Difference Distribution TableOrr Dunkelman0Senyang Huang1Department of Computer Science, University of HaifaDepartment of Computer Science, University of Haifa In this paper we study the problem of recovering a secret S-box from its difference distribution table (DDT). While being an interesting theoretical problem on its own, the ability to recover the S-box from the DDT of a secret S-box can be used in cryptanalytic attacks where the attacker can obtain the DDT (e.g., in Bar-On et al.’s attack on GOST), in supporting theoretical analysis of the properties of difference distribution tables (e.g., in Boura et al.’s work), or in some analysis of S-boxes with unknown design criteria (e.g., in Biryukov and Perrin’s analysis). We show that using the well established relation between the DDT and the linear approximation table (LAT), one can devise an algorithm different from the straightforward guess-and-determine (GD) algorithm proposed by Boura et al. Moreover, we show how to exploit this relation, and embed the knowledge obtained from it in the GD algorithm. We tested our new algorithm on random S-boxes of different sizes, and for random 14-bit bijective S-boxes, our results outperform the GD attack by several orders of magnitude. https://ojs-speed.ub.rub.de/index.php/ToSC/article/view/8319S-boxDDTLATthe sign determination problem
collection DOAJ
language English
format Article
sources DOAJ
author Orr Dunkelman
Senyang Huang
spellingShingle Orr Dunkelman
Senyang Huang
Reconstructing an S-box from its Difference Distribution Table
IACR Transactions on Symmetric Cryptology
S-box
DDT
LAT
the sign determination problem
author_facet Orr Dunkelman
Senyang Huang
author_sort Orr Dunkelman
title Reconstructing an S-box from its Difference Distribution Table
title_short Reconstructing an S-box from its Difference Distribution Table
title_full Reconstructing an S-box from its Difference Distribution Table
title_fullStr Reconstructing an S-box from its Difference Distribution Table
title_full_unstemmed Reconstructing an S-box from its Difference Distribution Table
title_sort reconstructing an s-box from its difference distribution table
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2019-06-01
description In this paper we study the problem of recovering a secret S-box from its difference distribution table (DDT). While being an interesting theoretical problem on its own, the ability to recover the S-box from the DDT of a secret S-box can be used in cryptanalytic attacks where the attacker can obtain the DDT (e.g., in Bar-On et al.’s attack on GOST), in supporting theoretical analysis of the properties of difference distribution tables (e.g., in Boura et al.’s work), or in some analysis of S-boxes with unknown design criteria (e.g., in Biryukov and Perrin’s analysis). We show that using the well established relation between the DDT and the linear approximation table (LAT), one can devise an algorithm different from the straightforward guess-and-determine (GD) algorithm proposed by Boura et al. Moreover, we show how to exploit this relation, and embed the knowledge obtained from it in the GD algorithm. We tested our new algorithm on random S-boxes of different sizes, and for random 14-bit bijective S-boxes, our results outperform the GD attack by several orders of magnitude.
topic S-box
DDT
LAT
the sign determination problem
url https://ojs-speed.ub.rub.de/index.php/ToSC/article/view/8319
work_keys_str_mv AT orrdunkelman reconstructingansboxfromitsdifferencedistributiontable
AT senyanghuang reconstructingansboxfromitsdifferencedistributiontable
_version_ 1721571237301321728