S-box classification and selection in symmetric-key algorithms

2016
Şahin, Hacı Ali
Side-channel analysis(SCA) attack is one of popular attacks which is mainly interested in environmental effects of embedded devices such as power, time and temperature. Since power analysis attack is one of the most efficient SCA attacks and it poses a threat for current cryptographic algorithms, we are mainly interested in certain applications of it, namely differential and correlation power analysis. Also, we share our observations on behaviours of attacks for different cases. The number of bits used in model and the number of traces are critical parameters which determine efficiencies of attacks. In our experiment, we see that the number of bits used in model and the number of traces are directly proportional to efficiencies of algorithms. However, they also increase time complexities of algorithms. Therefore, these shoul d be determined in terms of algorithms, the quality of traces and computer that runs algorithm. Moreover, s-boxes are the main component of symmetric-key algorithms which provide resistance against cryptanalysis methods. Main focus of studies in s-boxes is the classification of n n s-boxes for n 2, 3, 4, 5, 6, 7 and 8. Affine equivalence provides researchers with classifying all s-boxes and understanding influences of s-boxes into cryptography. However, current technology and classification algorithms limit us to classify permutations only for small n values. Until now, only 4x4 permutations are classified and listed completely by algorithms generated by De Canni`ere. Selection of s-boxes by considering only cryptanalysis is not enough to generate cryptographic algorithms. Implementation of cryptographic algorithms on embedded devices can cause leakages and may not simply provide secure system. Therefore, new countermeasure methods may need to be applied into algorithm to preve nt embedded devices from leakages. However, these methods may cause high complexities and can damage performances of algorithms because of gates used in s-box implementations. Therefore, we aim to classify 5x5 permutations and to analyse each class in terms of their cryptographic properties. 5x5 quadratic permutations are classified into 75 class and properties of all quadratic classes are listed in terms of critical properties. 

Suggestions

Analysis of recent attacks on SSL/TLS protocols
Özden, Duygu; Cenk, Murat; Department of Cryptography (2016)
Transport Layer Security(TLS) and its predecessor Secure Socket Layer(SSL) are two important cryptographic, certificate based protocols that satisfy secure communication in a network channel. They are widely used in many areas such as online banking systems, online shopping, e-mailing, military systems or governmental systems. Being at the center of secure communication makes SSL and TLS become the target of attackers and an important field of study for researchers. So many vulnerabilities and attacks towar...
A simple and effective mechanism for stored video streaming with TCP transport and server-side adaptive frame discard
Gurses, E; Akar, Gözde; Akar, N (Elsevier BV, 2005-07-15)
Transmission control protocol (TCP) with its well-established congestion control mechanism is the prevailing transport layer protocol for non-real time data in current Internet Protocol (IP) networks. It would be desirable to transmit any type of multimedia data using TCP in order to take advantage of the extensive operational experience behind TCP in the Internet. However, some features of TCP including retransmissions and variations in throughput and delay, although not catastrophic for non-real time data...
Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies
Vazifehdan, Javad; Prasad, R. Venkatesha; Onur, Ertan; Niemegeers, Ignas (Elsevier BV, 2011-10-27)
Although many energy-aware routing schemes have been proposed for wireless ad hoc networks, they are not optimized for networks with heterogeneous power supplies, where nodes may run on battery or be connected to the mains (grid network). In this paper, we propose several energy-aware routing algorithms for such ad hoc networks. The proposed algorithms feature directing the traffic load dynamically towards mains-powered devices keeping the hop count of selected routes minimal. We unify these algorithms into...
A VERSATILE MICROCOMPUTER INTERFACE AND PERIPHERAL DEVICES - AN APPLICATION IN DEUTERIUM LAMP BACKGROUND CORRECTION GRAPHITE-FURNACE ATOMIC-ABSORPTION SPECTROMETRY
GOKMEN, A; YALCIN, S (1992-01-01)
A versatile interface card for Apple IIe computer and various peripheral devices are designed to control instruments which generates transient signals like in graphite furnace atomic spectrometer. The interface card consists of a multiplexed analog-to-digital converter, a digital-to-analog converter, and a timer/counter chip. The timer/counter chip with 16 built-in registers can be programmed in many modes which provides a time base for real-time measurements. A stepper motor runs under the control of ti...
A new approach for the scalable intrusion detection in high-speed networks
Şahin, Ümit Burak; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2007)
As the networks become faster and faster, the emerging requirement is to improve the performance of the Intrusion Detection and Prevention Systems (IDPS) to keep up with the increased network throughput. In high speed networks, it is very difficult for the IDPS to process all the packets. Since the throughput of IDPS is not improved as fast as the throughput of the switches and routers, it is necessary to develop new detection techniques other than traditional techniques. In this thesis we propose a rule-ba...
Citation Formats
H. A. Şahin, “S-box classification and selection in symmetric-key algorithms,” M.S. - Master of Science, Middle East Technical University, 2016.