Improving the strict avalanche characteristics of cryptographic functions

Jennifer Seberry*, Xian Mo Zhang, Yuliang Zheng

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)

Abstract

This letter presents a simple yet effective method for transforming Boolean functions that do not satisfy the strict avalanche criterion (SAC) into ones that satisfy the criterion. Such a method has a wide range of applications in designing cryptographically strong functions, including substitution boxes (S-boxes) employed by common key block encryption algorithms.

Original languageEnglish
Pages (from-to)37-41
Number of pages5
JournalInformation Processing Letters
Volume50
Issue number1
DOIs
Publication statusPublished - 8 Apr 1994

Keywords

  • Boolean functions
  • Cryptography
  • Security in digital systems
  • Strict avalanche criterion (SAC)
  • Substitution boxes (S-boxes)

Fingerprint

Dive into the research topics of 'Improving the strict avalanche characteristics of cryptographic functions'. Together they form a unique fingerprint.

Cite this