Skip to Main content Skip to Navigation
Master thesis

Towards the Reverse-Engineering of the CaveTable

Abstract : This report focuses on the S-Box used in CMEA . The purpose is to find the generation process of this S-Box. Such knowledge is important since a weak design process usually results in vulnerability against attacks. Many of them have already been published against CMEA. The attackers used the statistical bias in the S-Box to develop their attack. We want to know what caused such a statistical bias, so that this method may be avoided later on. In order to find a structure in this S-Box, we first recall the high level structure that has already been found before. We then look at several properties, such as the linear and differential properties and the hardware related properties, and finally, the relations with other cryptographic algorithms. Our results show that the TU structure is likely just a consequence of the S-Box being generated from thirty-two 4×4 permutations being concatenated. The properties of the tables components involved in the structure are all consistent with those of pseudo-random permutations. Hence, the S-Box might just be constructed using thirty-two pseudo- randomly generated4×4 permutations.
Document type :
Master thesis
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download
Contributor : Léo Perrin Connect in order to contact the contributor
Submitted on : Monday, September 2, 2019 - 11:24:11 AM
Last modification on : Tuesday, January 11, 2022 - 11:16:05 AM
Long-term archiving on: : Thursday, January 9, 2020 - 8:10:31 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International License


  • HAL Id : hal-02275389, version 1


Sohaïb Ouzineb. Towards the Reverse-Engineering of the CaveTable. Cryptography and Security [cs.CR]. 2019. ⟨hal-02275389⟩



Les métriques sont temporairement indisponibles