2018
DOI: 10.1007/s10623-018-0458-5
|View full text |Cite
|
Sign up to set email alerts
|

Nonlinear diffusion layers

Abstract: In the practice of block cipher design, there seems to have grown a consensus about the diffusion function that designers choose linear functions with large branch numbers to achieve provable bounds against differential and linear cryptanalysis. In this paper, we propose two types of nonlinear functions as alternative diffusing components. One is based on a nonlinear code with parameters (16,256,6) which is known as a Kerdock code. The other is a general construction of nonlinear functions based on the T-funct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…The bound becomes more meaningful with such parameters. [LRL18] that the use of non-linear permutation layers may indeed increase security against differential/linear attacks.…”
Section: Our Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The bound becomes more meaningful with such parameters. [LRL18] that the use of non-linear permutation layers may indeed increase security against differential/linear attacks.…”
Section: Our Resultsmentioning
confidence: 99%
“…These public permutations are then extended to a keyed permutation on wn-bit inputs for some integer w by iterating the following steps: S-boxes are typically highly non-linear, and, in fact, serve as the only source of nonlinearity in many blockciphers. There is no a priori restriction on the (non-)linearity of the Permutation step, and the use and advantages of non-linear permutations was recently explored [LRL18]. Though, modern blockciphers still tend to use linear or affine mappings for the Permutation step [Bir11], which involves a simple key-mixing step followed by an invertible linear or affine transformation.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, diffusion layers are usually implemented with linear mappings, such as the MDS matrix in Rijndael [8] or other similar transformations [18]. However, there has been a recent interest also in nonlinear diffusion layers [19], which integrate confusion and diffusion. Thus, superposition S-boxes might be interesting for this specific application.…”
Section: S-boxes Generated By Ocamentioning
confidence: 99%
“…Therefore, we can confirm the conclusion of our conference paper [26]: nonlinear OCA cannot be used to design S-boxes in the substitution layer of SPN ciphers. Still, we remark that these S-boxes might be useful in the design of nonlinear diffusion layers [19], since it is not required to reach a nonlinearity close to the theoretical upper bounds in that use case. Indeed, the goal of a nonlinear diffusion layer is to provide extra confusion in addition to that already given by a classic substitution layer.…”
Section: Exhaustive Search Experimentsmentioning
confidence: 99%
“…In addition, special matrices were also used as permutation functions in the diffusion layer such as AES cipher [46]. Recently, Yunwen et al [47] proposed two types of nonlinear functions as alternative diffusing components. The first type relies on a nonlinear code, which is known as a Kerdock code and the second type relies on the T-functions.…”
Section: Early Work On Permutation For Ciphering Stagesmentioning
confidence: 99%