Cryptography Reference
In-Depth Information
Table 3.5 S-box S 4
S 4 0123456789101112131415
0
07 13 14 03 00 06 09 10 01 02 08 05 11 12 04 15
1
13 08 11 05 06 15 00 03 04 07 02 12 01 10 14 09
2
10 06 09 00 12 11 07 13 15 01 03 14 05 02 08 04
3
03 15 00 06 10 01 13 08 09 04 05 11 12 07 02 14
Table 3.6 S-box S 5
S 5 0123456789101112131415
0
02 12 04 01 07 10 11 06 08 05 03 15 13 00 14 09
1
14 11 02 12 04 07 13 01 05 00 15 10 03 09 08 06
2
04 02 01 11 10 13 07 08 15 09 12 05 06 03 00 14
3
11 08 12 07 01 14 02 13 06 15 00 09 10 04 05 03
Table 3.7 S-box S 6
S 6 0123456789101112131415
0
12 01 10 15 09 02 06 08 00 13 03 04 14 07 05 11
1
10 15 04 02 07 12 09 05 06 01 13 14 00 11 03 08
2
09 14 15 05 02 08 12 03 07 00 04 10 01 13 11 06
3
04 03 02 12 09 05 15 10 11 14 01 07 06 00 08 13
Table 3.8 S-box S 7
S 7 0123456789101112131415
0
04 11 02 14 15 00 08 13 03 12 09 07 05 10 06 01
1
13 00 11 07 04 09 01 10 14 03 05 12 02 15 08 06
2
01 04 11 13 12 03 07 14 10 15 06 08 00 05 09 02
3
06 11 13 08 01 04 10 07 09 05 00 15 14 02 03 12
Table 3.9 S-box S 8
S 8 0123456789101112131415
0
13 02 08 04 06 15 11 01 10 09 03 14 05 00 12 07
1
01 15 13 08 10 03 07 04 12 05 06 11 00 14 09 02
2
07 11 04 01 09 12 14 02 00 06 10 13 15 03 05 08
3
02 01 14 07 04 10 08 13 15 12 09 00 03 05 06 11
to speculation, in particular with respect to the possible existence of a secret back
door or some other intentionally constructed weakness, which could be exploited by
the NSA. However, now we know that the S-boxes were designed according to the
criteria listed below.
1. Each S-box has six input bits and four output bits.
2. No single output bit should be too close to a linear combination of the input bits.
3. If the lowest and the highest bits of the input are fixed and the four middle bits
are varied, each of the possible 4-bit output values must occur exactly once.
4. If two inputs to an S-box differ in exactly one bit, their outputs must differ in at
least two bits.
Search WWH ::




Custom Search