This letter presents a simple yet effective method for transforming Boolean functions that do not satisfy the strict avalanche criterion (SAC) into ones that satisfy the criterion. Such a method has a wide range of applications in designing cryptographically strong functions, including substitution boxes (S-boxes) employed by common key block encryption algorithms.
|Number of pages||5|
|Journal||Information Processing Letters|
|Publication status||Published - 8 Apr 1994|
- Boolean functions
- Security in digital systems
- Strict avalanche criterion (SAC)
- Substitution boxes (S-boxes)