Abstract
This letter presents a simple yet effective method for transforming Boolean functions that do not satisfy the strict avalanche criterion (SAC) into ones that satisfy the criterion. Such a method has a wide range of applications in designing cryptographically strong functions, including substitution boxes (S-boxes) employed by common key block encryption algorithms.
Original language | English |
---|---|
Pages (from-to) | 37-41 |
Number of pages | 5 |
Journal | Information Processing Letters |
Volume | 50 |
Issue number | 1 |
DOIs | |
Publication status | Published - 8 Apr 1994 |
Keywords
- Boolean functions
- Cryptography
- Security in digital systems
- Strict avalanche criterion (SAC)
- Substitution boxes (S-boxes)