Abstract
The notion of confusion coefficient (CC) is a property that attempts to characterize the confusion property of cryptographic algorithms against differential power analysis. In this article, we establish a relationship between CC and the transparency order (TO) for any Boolean function and deduce some relationships between the sum-of-squares of CC, signal-to-noise ratio, and TO. We also give a tight upper bound and a tight lower bound on the sum-of-squares of CC for balanced s-plateaued functions. Finally, the results generalized a lower bound on the sum-of-squares of CC of Boolean functions with the Hamming weight k.
1 Introduction
Side-channel analysis (SCA) is a very powerful technique for block ciphers [1]. Differential power analysis (DPA) is one of the effective methods of SCA. To improve the resistance of a block cipher to DPA, the substitution boxes (
(1) Signal-to-noise ratio (SNR) following [2] was proposed by Guilley at CARDIS conference in 2004. First, they built a complete model of information leakage based on the framework of traditional cryptographic analysis, so that the attacker could obtain the autocorrelation value of Hamming weight of the guessed key value.
(2) In 2005, transparency order (TO) was introduced for
(3) In 2012, confusion coefficient (CC) was presented when they studied the confusion property of cryptographic algorithms in the study by Fei et al. [5]. Based on the results of the study by Fei et al. [5], Picek et al. [6] calculated the nonlinearity of S-boxes of different sizes in 2014 and obtained the variance of CC. In the same year, Qiu et al. [7] revised the original CC and gave a new definition of CC in order to reduce the dimension and the number of CC.
The organization of this article is as follows. In Section 2, the basic concepts and notions are presented. In Section 3, we deduce the relationship between TO and CC. In Section 4, we derive the lower bound on the sum of squares of CC from TO and sum of squares of Boolean functions and give the relationships between CC, SNR and TO. We also investigate the upper bound and lower bound on the sum-of-squares of CC for a s-plateaued function and discuss the lower bound on the sum-of-squares of CC of Boolean function with the Hamming weight
2 Preliminaries
Let
For any function
where
The Hamming distance between two functions
Any
where
The nonlinearity of an
Let
If
The two indicators
Let
TO of
where
is the cross-correlation between
This article only focus on the case when
The next definition gives the distribution of the Walsh spectra for a three-valued Boolean function.
Let
The SNR of
Let
where
Carlet et al. [8] studied the intrinsic resiliency of S-boxes against SCA and further gave the concrete form of CC for a Boolean function
where
3 Relationship between TO and CC
We first discuss the relationship between TO and CC.
Lemma 1
[9] Let
According to Lemmas 1 and 2, we obtain Theorem 1.
Corollary 1
Let
Proof
By Lemma 1, we have
and from Lemma 2, we have
According to Corollary 1, we can find that the smaller CC of a Boolean function is, the smaller the upper bound of TO is.
4 Some research results of sum-of-squares of CC
4.1 Bounds on the sum-of-squares of CC of one Boolean function
For the convenience, for a given
Lemma 3
[12] Let
Theorem 1
Let
Proof
We know the Walsh spectrum of
From the definition of TO
Based on Lemma 3,
Thus,
According to Theorem 1, we can find that the bigger the TO and the
4.2 Relationships between
K
f
(
k
*
)
, SNR, and TO
In this section, we give the relationships between the
Lemma 4
[12] Let
Theorem 2
Let
Proof
By Lemma 4,
Clearly,
Therefore,
Hence,
Based on Theorem 2, we know that the lower bound of sum-of-squares of CC is directly proportional to TO and inversely proportional to SNR for a Boolean function; thus, these indicators cannot be the best at the same time.
4.3 Bounds on the sum-of-squares of CC of s-plateaued function
Further, recall that
Lemma 6
[12] Let
Theorem 3
Let
Proof
By Lemma 4, we know that
According to the condition and Lemma 5, we know that
Based on Lemma 2, Lemma 6, and the condition, we have
Thus, this result is proved.□
Example 1
If
n | Lower bound on
|
Upper bound on
|
---|---|---|
1 | 0.0625 | 0.0625 |
3 | 0.1328 | 0.1563 |
5 | 0.5020 | 0.5313 |
|
Lower bound on
|
Upper bound on
|
---|---|---|
2 | 0.125 | 0.125 |
4 | 0.2656 | 0.3125 |
6 | 1.0039 | 1.0625 |
4.4 Bounds on the sum-of-squares of CC of Boolean function with the Hamming weight
k
Finally, we discuss some properties of CC of Boolean function with the hamming weight
Lemma 7
[11] Let
Theorem 4
Let
Proof
By Lemma 7, we know that:
Example 2
We can deduce that
Lower bound on
|
Lower bound on
|
---|---|
3 | 0.1563 |
4 | 0.2734 |
5 | 0.5196 |
6 | 1.0176 |
7 | 2.0167 |
5 Conclusion
In this article, we give the relationship between CC and TO. And we also give the relationships between sum-of-squares of CC, TO, and SNR of Boolean function. Furthermore, we give the upper and lower bound on the sum-of-squares of CC of s-plateaued function and the lower bound on sum-of-squares of CC of Boolean function with the Hamming weight
-
Funding information: This study was supported by the Natural Science Foundation of Anhui Higher Education institutions of China (No. KJ2020ZD008) and Graduate Innovation Fund of Huaibei Normal University (No. yc2021022).
-
Conflict of interest: Authors state no conflict of interest.
References
[1] Kocher P, Jaffe J, Jun B. Differential power analysis. Advances in Cryptology-CRYPTOa99. LNCS 1666. Berlin: Springer; 1999. p. 388–397. 10.1007/3-540-48405-1_25Suche in Google Scholar
[2] Guilley S, Hoogvorst P, Pacalet R. Differential power analysis model and some results. In Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 and TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications(CARDIS), Toulouse, France, 2004. p. 127–142. 10.1007/1-4020-8147-2_9Suche in Google Scholar
[3] Prouff E. DPA attacks and s-boxes. Fast Software Encryption-FSE 2005. LNCS 3557. Berlin, Heidelberg: Springer; 2005. p. 424–441. 10.1007/11502760_29Suche in Google Scholar
[4] Chakraborty K, Sarkar S, Maitra S, Mazumdar B, Mukhopadhyay D, Prouff E. Redefining the transparency order. Designs Codes Cryptography. 2017;82(1):95–115. 10.1007/s10623-016-0250-3Suche in Google Scholar
[5] Fei Y, Luo Q, Ding AA. A statistical model for DPA with novel algorithmic confusion analysis. International Workshop on Cryptographic Hardware and Embedded Systems. Berlin, Heidelberg: Springer; 2012. p. 233–250. 10.1007/978-3-642-33027-8_14Suche in Google Scholar
[6] Picek S, Papagiannopoulos K, Ege B, Batina L, Jakobovic D. Confused by confusion: systematic evaluation of DPA resistance of various s-boxes. In: Meier W, Mukhopadhyay D. (eds). Progress in Cryptology-INDOCRYPT 2014, LNCS 8885. 2014. p. 374–390. 10.1007/978-3-319-13039-2_22Suche in Google Scholar
[7] Qiu S, Bai GQ, Chen HY. One-dimensional confusion coefficient for block cipher. J Cryptol Res. 2014;1(2):124–133. Suche in Google Scholar
[8] Carlet C, de Chérisey É, Gulley S, Kavut S, Tang D. Intrinsic resiliency of S-boxes against Side-channel Attacks-best and Worst Scenarios. IEEE Trans Informa Forensic Secur. 2021;16:203–218. 10.1109/TIFS.2020.3006399Suche in Google Scholar
[9] Zhang XM, Zheng YL. Auto-correlations and new bounds on the nonlinearity of Boolean functions. EUROCRYPT’96 Proceedings, LNCS. Vol. 1070. Berlin, Heidelberg: Springer-Verlag; 1996. p. 294–306. 10.1007/3-540-68339-9_26Suche in Google Scholar
[10] Wang QC, Stanica P. Transparency order for Boolean functions: analysis and construction. Designs Codes Cryptography. 2019;87(9):2043–2059. 10.1007/s10623-019-00604-1Suche in Google Scholar
[11] Zhou Y, Wang WQ, Xiao GZ. Global avalanche characteristics and nonlinearity of Boolean function with the Hamming weight k. J Electron Inform Technol. 2009;31(2):435–438. Suche in Google Scholar
[12] Zhou Y, Hu JY, Miao XD, Han Y, Zhang F. On the confusion coefficient of Boolean functions. J Math Cryptol. 2022;16:1–13. 10.1515/jmc-2021-0012Suche in Google Scholar
[13] Zhou Y, Zhao W, Chen ZX, et al. On the signal-to-noise ratio for Boolean functions. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020;E103.A(12). 10.1587/transfun.2020EAL2037Suche in Google Scholar
[14] Crama E, Hammer PL. Boolean models and methods in mathematics, computer science, and engineering. Cambridge, UK: Cambridge University Press; 2010. 10.1017/CBO9780511780448Suche in Google Scholar
© 2023 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Artikel in diesem Heft
- Regular Articles
- Plactic key agreement (insecure?)
- Algebraic and quantum attacks on two digital signature schemes
- A construction of encryption protocols over some semidirect products
- A code-based hybrid signcryption scheme
- Provable security against generic attacks on stream ciphers
- Access structures determined by uniform polymatroids
- Further research results on confusion coefficient of Boolean functions
Artikel in diesem Heft
- Regular Articles
- Plactic key agreement (insecure?)
- Algebraic and quantum attacks on two digital signature schemes
- A construction of encryption protocols over some semidirect products
- A code-based hybrid signcryption scheme
- Provable security against generic attacks on stream ciphers
- Access structures determined by uniform polymatroids
- Further research results on confusion coefficient of Boolean functions