{"title":"An expanded set of design criteria for substitution boxes and their use in strengthening DES-like cryptosystems","authors":"M. H. Dawson, S. Tavares","doi":"10.1109/PACRIM.1991.160713","DOIUrl":null,"url":null,"abstract":"The security of DES-like cryptosystems depends heavily on the strength of the substitution boxes (S-boxes) used. The design of new S-boxes is therefore an important concern in the creation of new and more secure cryptosystems. The full set of design criteria for the S-boxes of DES has never been released and a complete set has yet to be proposed in the open literature. A unified S-box design framework is introduced based on information theory and illustrates how it can be used to strengthen and design the S-boxes used in DES-like cryptosystems.<<ETX>>","PeriodicalId":289986,"journal":{"name":"[1991] IEEE Pacific Rim Conference on Communications, Computers and Signal Processing Conference Proceedings","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1991] IEEE Pacific Rim Conference on Communications, Computers and Signal Processing Conference Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PACRIM.1991.160713","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
The security of DES-like cryptosystems depends heavily on the strength of the substitution boxes (S-boxes) used. The design of new S-boxes is therefore an important concern in the creation of new and more secure cryptosystems. The full set of design criteria for the S-boxes of DES has never been released and a complete set has yet to be proposed in the open literature. A unified S-box design framework is introduced based on information theory and illustrates how it can be used to strengthen and design the S-boxes used in DES-like cryptosystems.<>