Skip to main content
placeholder image

Improving the strict avalanche characteristics of cryptographic functions

Journal Article


Abstract


  • This letter presents a simple yet effective method for transforming Boolean functions that do not satisfy the strict avalanche criterion (SAC) into ones that satisfy the criterion. Such a method has a wide range of applications in designing cryptographically strong functions, including substitution boxes (S-boxes) employed by common key block encryption algorithms. © 1994.

Publication Date


  • 1994

Citation


  • Seberry, J., Zhang, X. M., & Zheng, Y. (1994). Improving the strict avalanche characteristics of cryptographic functions. Information Processing Letters, 50(1), 37-41. doi:10.1016/0020-0190(94)90042-6

Scopus Eid


  • 2-s2.0-0028768217

Web Of Science Accession Number


Start Page


  • 37

End Page


  • 41

Volume


  • 50

Issue


  • 1

Abstract


  • This letter presents a simple yet effective method for transforming Boolean functions that do not satisfy the strict avalanche criterion (SAC) into ones that satisfy the criterion. Such a method has a wide range of applications in designing cryptographically strong functions, including substitution boxes (S-boxes) employed by common key block encryption algorithms. © 1994.

Publication Date


  • 1994

Citation


  • Seberry, J., Zhang, X. M., & Zheng, Y. (1994). Improving the strict avalanche characteristics of cryptographic functions. Information Processing Letters, 50(1), 37-41. doi:10.1016/0020-0190(94)90042-6

Scopus Eid


  • 2-s2.0-0028768217

Web Of Science Accession Number


Start Page


  • 37

End Page


  • 41

Volume


  • 50

Issue


  • 1