50 Years of Crosscorrelation of m-sequences

Size: px
Start display at page:

Download "50 Years of Crosscorrelation of m-sequences"

Transcription

1 50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 1 / 61

2 Outline Basic introduction to m-sequences Autocorrelation of m-sequences Crosscorrelation of m-sequences Gold Sequences and applications Overview over 50 year history of crosscorrelation of m-sequence Relations to Bent functions / APN functions/ AB functions etc. Conclusions and open problems Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 2 / 61

3 Basic introduction to m-sequences May 25, 2016 Stephen Wolfram states in his blog: Solomon Golomb ( ) The Most-Used Mathematical Algorithm Idea in History An octillion. A billion billion billion. That s a fairly conservative estimate of the number of times a cellphone or other device somewhere in the world has generated a bit using a maximum length linear-feedback shift register sequence. It s probably the single most-used mathematical algorithm idea in history. And the main originator of this idea was Solomon Golomb, who died on May 1 - and whom I knew for 35 years. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 3 / 61

4 Generating m-sequences Linear recurrence (over F p ) s t+n + c n 1 s t+n c 0 s t = 0 Characteristic polynomial f(x) = x n + c n 1 x n c 0 Select f(x) such that f(x) is irreducible of degree n f(x) divides x pn 1 1 f(x) do not divide x r 1 for any r, 1 r < p n 1 Then f(x) generates an m-sequence {s t } = s 0, s 1, s 2, of period p n 1. Example The binary m-sequence generated by s t+4 + s t+1 + s t = 0 is: {s t } = Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 4 / 61

5 Binary m-sequences s t+4 = s t+1 + s t {S t } = f(x) = x 4 + x + 1 Period ε = 2 n 1 (if the characteristic polynomial f(x) has degree n) Balanced (except for a missing 0) Run property s t+τ s t = s t+γ If gcd(d, 2 n 1) = 1, then its decimation {s dt } is also an m-sequence {s 2t } = {s t+µ } for some µ The trace mapping is: T r : F 2 n Let f(α) = 0 then (after suitable cyclic shift) F 2 where T r(x) = n 1 i=0 x2i s t = T r(α t ) Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 5 / 61

6 Correlation of Sequences Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 6 / 61

7 Correlation of Sequences Let {a t } and {b t } be sequences of period ε over the alphabet F p. Crosscorrelation Then crosscorrelation between {a t } and {b t } at shift τ is ε 1 at+τ bt θ a,b (τ) = ω where t=0 ω = exp 2πi/p Autocorrelation Then autocorrelation of {a t } at shift τ is ε 1 at+τ at θ a,a (τ) = ω where t=0 ω = exp 2πi/p Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 7 / 61

8 Ideal Two-Level Autocorrelation Theorem Let {s t } be an m-sequence of period p n 1. The autocorrelation is { p C 1 (τ) = n 1 if τ = 0 (mod p n 1) 1 if τ 0 (mod p n 1). Proof. Let τ 0 (mod p n 1). Then since m-sequences are balanced: C 1 (τ) = = p n 2 t=0 p n 2 t=0 = 1 st+τ st ω ω st+γ Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 8 / 61

9 Golomb s influence on the early applications of m-sequence Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 9 / 61

10 Golomb Randomness Postulates Golomb Randomness Postulates Run = Consecutive runs of 0 s or 1 s Block = Runs of 1 s Gap = Run of zeros R1: The number of 0 s and 1 s differ by at most 1 during the period of the sequence. R2: Half of the runs in a full cycle have length 1, one 1/4 of all runs have length 2, 1/8 have length 3 etc., as long as the number of runs exceed one. Moreover, for each of these length there are equally many gaps and blocks. R3: The out of phase autocorrelation of the sequence always has the same value. The Golomb randomness postulates are modelled after the m-sequences. {s t } : Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 10 / 61

11 Golomb s Influence on m-sequences Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 11 / 61

12 Golomb s influence on m-sequences Applications of m-sequences in the 1960s Interplanetary ranging system (1958) Orbit determination of Explorer I Signal sent back from Explorer I was modulated by an m-sequence Determining the position of Venus (1961) Bounced signal from Venus and detected return signal. Improved accuracy of location of Venus by a factor of 10 3 Experiment verifying Einstein General Relativity Theory Major Prizes Experiment designed (1960) Experiment performed using Mars Mariner 9 (1969). Shannon Award 1985 National Medal of Science 2013 Franklin Medal 2016 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 12 / 61

13 Crosscorrelation of m-sequences Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 13 / 61

14 Crossscorrelation of m-sequences Basic results on crosscorrelation of m-sequences Let {s t } be an m-sequence of period p n 1 Let {s dt } be a decimated m-sequence i.e., gcd(d, p n 1) = 1 The crosscorrelation between the two m-sequences is C d (τ) = p n 2 t=0 ω s dt s t+τ = 1 + x F p n ω T r(xd +ax) where α is a primitive element in F p n and a = α τ. In the case d = p i (mod p n 1) then C d (τ) is two-valued (autocorrelation) In all other cases at least three values occur when τ = 0, 1,, p n 2 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 14 / 61

15 Three valued crosscorrelation: Gold sequences Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 15 / 61

16 Three-Valued Crosscorrelation: The Gold Cases Theorem (Gold(1968)) n gcd(n,k) Let d = 2 k + 1 and e = gcd(n, k) where is odd. Then C d (τ) has three-valued crosscorrelation with distribution: n+e 2 occurs 2 n e 1 2 n e 2 2 times 1 occurs 2 n 2 n e 1 times 1 2 n+e 2 occurs 2 n e n e 2 2 times In particular when gcd(k, n) = 1 then the values of C d (τ) + 1 are belong to {0, ±2 n+1 2 }. x F 2 n ( 1) T r(xd +ax) Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 16 / 61

17 Three-Valued Crosscorrelation: The Gold Case (Proof) The simplest proof of the Gold case uses the squaring technique. We illustrate the method for d = 2 k + 1 where n is odd and gcd(n, k) = 1. Let g a (x) = T r(x 2k +1 + ax), then Hence, g a (x) + g a (x + u) + g a (u) = T r(x 2k +1 + (x + u) 2k +1 + u 2k +1 ) (C d (τ) + 1) 2 = x,y F 2 n = u F 2 n = T r(x 2k u + xu 2k ) = T r(x 2k (u + u 22k )) ( 1) ga(x)+ga(y) = ( 1) ga(u) { 0, 2 n+1 } x,u F 2 n ( 1) T r(x2k (u+u 22k )) x F 2 n ( 1) ga(x)+ga(x+u) since L(u) = 0 has at most 2 solutions in F 2 n when gcd(n, k) = 1 and n is odd. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 17 / 61

18 Applications of sequences to CDMA CDMA In Code-Division Multiple Access (CDMA) one needs large families F with good correlation properties Parameters of sequence families Parameters of a familiy are denote (ε,m, θ max ) ε is the period of the sequences in F M is the size of the family (# of cyclically distinct sequences in F ) θ max is the maximal (nontrivial) value of the auto- or crosscorrelation of the sequences in F (except when sequences are the same and shift τ = 0) Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 18 / 61

19 Gold family Gold sequences (Example m=3) (s t ) : (s 3t ) : (s t +s 3t ) : (s t +s 3t+1 ) : (s t +s 3t+6 ) : M= F =9 θ max =5 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 19 / 61

20 The Gold family - Example The Gold family The Gold family is used in GPS and in the 3G standard for wireless communication. Construction of the Gold sequence family Let {s t } be a binary m-sequence of period 2 n 1 where n is odd, d = 2 k + 1 and gcd(k, n) = 1 G = {s t } {s dt } {{s t+τ s dt } τ = 0, 1,, 2 n 2} The parameters of the Gold family G is: ε = 2 n 1 is period of the sequences in the family M = 2 n + 1 is the size of the family G θ max = 2 (n+1)/2 is the maximal value of the nontrivial auto- or crosscorrelation of the sequences in G The Gold family is optimal since no other family of sequences of the same length and size can have a lower θ max Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 20 / 61

21 Long Scrambling Code Generator c long,1,n MSB LSB c long,2,n Gold sequence family is based upon on sequences generated by x 25 + x and x 25 + x 3 + x 2 + x + 1 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 21 / 61

22 3G Scrambling Code P. V. Kumar Data Control Spreading Walsh Gain code factor I Q j Short Scrambling code ç W-CDMA Uplink 2 ç T. Helleseth A. R. Calderbank A. R. Hammons Jr., ``Large Families of Quaternary Sequences with Low Correlation,'' IEEE Trans. Inform. Theory, March d(i) + mod n addition multiplication mod 2 3 mod mod b(i) a(i) 2 mod 4 + z n (i) Mapper cshort,1,n(i) cshort,2,n(i) Short scrambling code generator ç Short Scrambling Code Family S(2) used in W-CDMA Scrambling code design for 3G Wireless Cellular Communication Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 22 / 61

23 Short Scrambling Code d(i) mod mod n addition multiplication mod b(i) mod 4 + z n (i) Mapper cshort,1,n(i) cshort,2,n(i) a(i) mod Family S(2) of sequences (mod 4) Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 23 / 61

24 Distribution of the crosscorrelation of m-sequences and open problem Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 24 / 61

25 Some Properties of C d (τ) Some properties of C d (τ) C d (τ) is a real number C d (τ) and C d (τ) have the same distribution when d d = 1 (mod p n 1) or d = d p i (mod p n 1) τ (C d(τ) + 1) = p n τ (C d(τ) + 1) 2 = p 2n τ C d(τ) k = (p 1) k + 2( 1) k 1 + a k p 2n where a k is the number of nonzero solutions x i F p n of x 1 + x x k 1 +1 = 0 x d 1 + x d x d k 1 +1 = 0 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 25 / 61

26 When is C d (τ) Two-Valued? Theorem If d {1, p, p 2,, p n 1 } (i.e., when the two m-sequences are cyclically distinct) then C d (τ) is at least 3-valued. Proof. Suppose C d (τ) has two values x and y occurring r and s times respectively. Then r + s = p n 1 τ C d(τ) = rx + sy = 1 τ C d(τ) 2 = rx 2 + sy 2 = p 2n p n 1 This leads to the equation (eliminating r and s) (p n x (x + 1))(p n y (y + 1)) = p 2n (2 p n ) For p = 2 this is a Diophantine equation with no valid integer solutions. (Note {x, y} = { 1, p n 1}) corresponds to two-weight autocorrelation.. For p > 2 the result follows similarly from divisibility properties in Z[ω]. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 26 / 61

27 Three-valued Crosscorrelation of m-sequences The crosscorrelation C d (τ) is known to be three-valued in the cases: (Gold 1968): d = 2 k + 1, n gcd(n,k) odd (Kasami 1968), (Welch 1960 s): d = 2 2k 2 k + 1, n gcd(n,k) odd Welch s conjecture: (Canteaut, Charpin, Dobbertin (2000)) d = 2 n , n odd Niho s conjecture: (Hollmann and Xiang (2001), Dobbertin (1999)) d = 2 n n when n = 1 (mod 4) = 2 n n when n = 3 (mod 4) Cusick and Dobbertin (1996) d = 2 n n when n = 2 (mod 4) = 2 n when n = 2 (mod 4) Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 27 / 61

28 The 4-Valued Conjecture Conjecture (Helleseth 1971, 1976) Let p be any prime. If n = 2 i then C d (τ) takes on at least 4 values. Theorem (Katz 2012) The conjecture is true for p = 2 and p = 3. The case p > 3 is still open Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 28 / 61

29 Preferred Pair of Binary m-sequences Preferred Pair A pair of binary m-sequences of period 2 n 1 is called a preferred pair if the crosscorrelation function takes on the three values 1, 1 2 n+2 2, n+2 2 for n even 1, 1 2 n+1 2, n+1 2 for n odd Theorem A preferred pair exists for all n 0 (mod 4). The following theorem was conjectured but Sarwate and Pursley (1980) and proved by McGuire and Calderbank Theorem (McGuire and Calderbank 1995) For n = 0 (mod 4) no preferred pair of m-sequences do exist. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 29 / 61

30 The C d (τ) = 1 conjecture Conjecture (Helleseth 1971, 1976) For any d 1 (mod p 1) then C d (τ) = 1 for some τ The conjecture is equivalent to proving one of the following two statements: (1) ω T r(xd bx) = 1 for some nonzero b. (2) The system of equations x x 0 + αx α q 2 x q 2 = 0 x d 0 + x d x d q 2 = 0 has exactly q q 3 solutions x i F p n where q = p n. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 30 / 61

31 Correlation Function Known 3-valued Correlation Function C d (τ) over F 2 n No. d-decimation Condition Remarks 1 2 k + 1 n/ gcd(n, k) odd Gold, k 2 k + 1 n/ gcd(n, k) odd Kasami, n/2 2 (n+2)/4 + 1 n 2 (mod 4) Cusick et al., n/ n 2 (mod 4) Cusick et al., (n 1)/2 + 3 n odd Canteaut et al., (n 1)/2 + 2 (n 1)/4 1 n 1 (mod 4) Hollmann et al., (n 1)/2 + 2 (3n 1)/4 1 n 3 (mod 4) Hollmann et al., 2001 Remarks: (1) No. 5 is the Welch s conjecture; (2) Nos. 6 and 7 are the Niho s conjectures Open Problem Show that the table contains all decimations with 3-valued correlation function. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 31 / 61

32 Correlation Function Known 3-valued Correlation Function C d (τ) over F p n No. d-decimation Condition Remarks 1 (p 2k + 1)/2 n/ gcd(n, k) odd Trachtenberg, p 2k p k + 1 n/ gcd(n, k) odd Trachtenberg, (n 1)/2 + 1 n odd Dobbertin et al., (n 1)/4 + 1 n 1 (mod 4) Katz and Langevin (3n 1)/4 + 1 n 3 (mod 4) Katz and Langevin 2013 Remarks: (1) Nos. 1 and 2 are due to Helleseth for even n; (2) The result obtained by Xia et al. (IEEE IT 60(11), 2014) is covered by No. 1. The 3-valued correlation function in No. 4 and No. 5 was conjectured by Dobbertin et al. in Open Problems Show that the table contains all decimations with 3-valued correlation function for p > 3. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 32 / 61

33 Crosscorrelation function of Niho Exponents Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 33 / 61

34 Niho Exponent Let p be a prime, n = 2m a positive integer and q = p m. Let F q denote the finite field with q elements. Niho Exponent A positive integer d is called a Niho exponent (with respect to F q 2) if there exists some 0 j n 1 such that d p j (mod q 1) Normalized form: j = 0, i.e., d = (q 1)s + 1. Equivalence class: cyclotomic coset, inverse, etc. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 34 / 61

35 Niho exponents Niho exponents and solutions of equations Let n = 2m and d = 1 (mod 2 m 1). Then each x F 2 n can be uniquely written as x = yz where y F 2 m and z U = {z z 2m +1 = 1}. Then C d (τ) = ( 1) T rn(xd +ax) = = x F 2 n x F 2 n y U x F 2 n y U ( 1) T rn(y(zd +az)) ( 1) T rm(y(zd +az+z d +a 2m z 1 )) = (2 m 1)N + (2 m + 1 n) 1 = m (N 1) where N = {z U z d + az + z d + a 2m z 1 = 0}. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 35 / 61

36 Correlation Function Known 4-valued Correlation Function C d (τ) over F 2 n No. d-decimation Condition Remarks 1 2 n/2+1 1 n 0 (mod 4) Niho, (2 n/2 + 1)(2 n/4 1) + 2 n 0 (mod 4) Niho, (n/2+1)r 1 2 r 1 n 0 (mod 4) Dobbertin, n +2 s+1 2 n/ s 1 n 0 (mod 4) Helleseth et al., (2 n/2 1) 2r 2 r ±1 + 1 n 0 (mod 4) Dobbertin et al., 2006 Remarks: (1) All are the Niho type decimations; (2) No. 5 covers previous four cases. Conjecture (Dobbertin, Helleseth et al., 2006) No. 5 covers all 4-valued cross correlation for Niho type decimation. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 36 / 61

37 Correlation Function Known 4-valued Correlation Function C d (τ) over F p n No. d-decimation Condition Remarks 1 2 p n/2 1 p n/2 2 (mod 3) Helleseth, k + 1 n = 3k, k odd Zhang et al., k + 2 n = 3k, k odd Zhang et al., 2013 Remarks: (1) No. 1 is a Niho type decimation; (2) Nos. 2 and 3 are due to Zhang et al. if gcd(k, 3) = 1 and due to Xia et al. if gcd(k, 3) = 3. Open Problem Find new 4-valued C d (τ) for any prime p. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 37 / 61

38 Correlation Function Known 5 or 6-valued Correlation Function C d (τ) over F 2 n No. d-decimation Condition Remarks 1 2 n/2 + 3 n 0 (mod 2) Helleseth, n/2 2 n/4 + 1 n 0 (mod 8) Helleseth, n i n 0 (mod 2) Helleseth, n/2 + 2 n/4 + 1 n 0 (mod 4) Dobbertin, 1998 Remarks: (1) No. 1 was conjectured by Niho; (2) No. 3 is of Niho type if n/2 is odd. Open Problem (Dobbertin, Helleseth et al., 2006) Determine the cross correlation distribution of C d (τ) for the Niho type decimation d = 3 (2 n/2 1) + 1. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 38 / 61

39 Correlation Function Known 5 or 6-valued Correlation Function C d (τ) over F p n No. d-decimation Condition Remarks 1 (p n 1)/2 + p i p n 1 (mod 4) Helleseth, (p n 1)/3 + p i p 2 (mod 3) Helleseth, p n/2 p n/4 + 1 p n/4 2 (mod 3) Helleseth, k + 1 n = 3k, k even Zhang et al., k + 2 n = 3k, k even Zhang et al., 2013 Remarks: (1) No. 1 is of Niho type if n/2 is odd; (2) Nos. 4 and 5 are due to Zhang et al. if gcd(k, 3) = 1 and due to Xia et al. if gcd(k, 3) = 3. Open Problem (Dobbertin, Helleseth and Martinsen, 1999) Determine the cross correlation distribution of C d (τ) for the Niho type decimation d = 3 (3 n/2 1) + 1. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 39 / 61

40 Crosscorrelation Function: Recent Results Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 40 / 61

41 Correlation Function: Recent Results Let k be a positive integer and N k denote the number of solutions to x 1 + x x k = 0, x d 1 + x d x d k = 0. Question: How to determine the values of N k? Open Problem (Dobbertin, Helleseth et al., 2006) Determine the cross correlation distribution of C d (τ) for the Niho type decimation d = 3 (2 n/2 1) + 1. Solved! (surprising connection with the Zetterberg code) by Xia, L., Zeng and Helleseth 2016 (IEEE IT, 62(12), 2016) Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 41 / 61

42 Correlation Function: Recent Results Open Problem (Dobbertin, Helleseth and Martinsen, 1999) Determine the cross correlation distribution of C d (τ) for the Niho type decimation d = 3 (3 n/2 1) + 1. Solved! by Xia, Li, Zeng and Helleseth 2017 (it is available on arxiv). Future Work Determine the cross correlation distribution of C d (τ) for the Niho type decimation d = 3 (p n/2 1) + 1 for p > 3. This case is much more complicated! Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 42 / 61

43 Bent Functions From Niho Exponents Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 43 / 61

44 Bent Functions From Niho Exponents Bent functions have significant applications in cryptography and coding theory. Walsh Transform Let f(x) be a function from F 2 n to F 2. The Walsh transform of f(x) is defined by f(λ) = ( 1) f(x)+tr(λx), λ F 2 n. x F 2 n Bent Function A function f(x) from F 2 n λ F 2 n. to F 2 is called Bent if f(λ) = 2 n/2 for any Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 44 / 61

45 Bent Functions From Niho Exponents Problem Description Let f(x) be a function from F 2 n to F 2 defined by f(x) = 2 n 2 i=1 Tr(a i x i ), a i F 2 n. Then how to choose a i and i such that f(x) is Bent? Remarks Known infinite classes of Boolean Bent functions: 1 Monomial Bent: only 5 classes 2 Binomial Bent: only about 6 classes 3 Polynomial form: quadratic form, Dillon type and Niho type Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 45 / 61

46 Constructions of Bent Functions of Niho Type Known Constructions of Niho Bent Functions Table: Known Niho Bent Functions No. Class of Functions Authors Year 1 Tr n 1 (ax (2m 1) ) 2 Tr n 1 (ax (2m 1) bx (2m 1)3+1 ) Dobbertin et al Tr n 1 (ax (2m 1) bx (2m 1) ) Dobbertin et al Tr n 1 (ax (2m 1) bx (2m 1) ) Dobbertin et al Tr n 1 (ax (2m 1) r 1 1 i=1 x (2m 1) i 2 r +1 ) Leander, Kholosha 2006 Remarks: (1) No. 1 is trivial; (2) No. 3 is covered by No. 5 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 46 / 61

47 Binomial Bent Functions A simple family of binomial bent functions which have a quite complex dual bent functions are due to Helleseth and Kholosha (2010). Theorem (Helleseth and Kholosha (2010)) Let n = 4k. Then p-ary function f(x) given by f(x) = Tr n ( x p3k +p 2k p k +1 + x 2) is a weakly regular bent function and ˆf(y) = p 2k ω Tr k(x 0)/4, where x 0 is a unique root in GF(p k ) of the polynomial y p2k +1 + (y 2 + X) (p2k +1)/2 + y pk (p 2k +1) + (y 2 + X) pk (p 2k +1)/2. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 47 / 61

48 APN functions and AB functions Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 48 / 61

49 Almost Perfect Nonlinear (APN) Functions Definition A function f: F 2 n F 2 n is almost perfect nonlinear (APN) if for all a, b F 2 n, a 0, the equation f(x + a) f(x) = b has at most two solutions x F 2 n. More generally such an f is called a differentially 2-uniform function Optimal resistant against the differential attack Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 49 / 61

50 A Simple APN Example f(x) = x 3 Theorem The function f(x) = x 3 is APN Proof. Let be defined over F 2 n. Then f(x) = x 3 f(x + a) + f(x) = x 2 a + xa 2 + a 3 = b which has at most two solutions x F 2 n for any a 0 and b F 2 n. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 50 / 61

51 The Walsh Transform The nonlinearity NL(F ) of an (n, m) function F can be expressed by means of the Walsh transform. The Walsh transform of F at (α, β) F 2 n F 2 m is defined by W F (α, β) = x F 2 n and the Walsh spectrum of F is the set ( 1) T rm 1 (βf (x))+t rn 1 (αx) {W F (α, β) : α F 2 n, β F 2 m}. Then NL(F ) = 2 n max W F (α, β). α F 2 n,β F 2 m The Walsh spectrum of AB functions consists of three values 0, ±2 n+1 2. The Walsh spectrum of a bent function is {±2 n 2 }. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 51 / 61

52 Connections between (APN) and (AB) Functions Theorem (Chabaud and Vaudenay (1994)) Any AB function is APN. A short proof for this fact for power functions is: Proof. Let θ(a, b) = a,b F 2 n ( 1)T r(bxd +ax). Then (θ(a, b)) 4 = 2 2n N(u, v) 2 a,b F 2 n u,v F 2 n where N(u, v) is the number of solutions of f(x + u) + f(x) = v Using the three-valued crosscorrelation distribution for AB functions gives a relation N(1, v) 2 = 2 n+1 and N(1, v) = 2 n v F 2 n v F 2 n it follows that x d is APN since N(1, v) = 0 or N(1, v) 2. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 52 / 61

53 APN Power Functions Table 1a. Known APN power functions x d on F 2 n Functions Exponents d Conditions d (x d ) Gold 2 i + 1 gcd(i, n) = 1 2 Kasami 2 2i 2 i + 1 gcd(i, n) = 1 i + 1 Welch 2 t + 3 n = 2t Niho 2 t + 2 t 2 1, t even n = 2t + 1 (t + 2)/2 2 t + 2 3t+1 2 1, t odd t + 1 Inverse 2 2t 1 n = 2t + 1 n 1 Dobbertin 2 4i + 2 3i + 2 2i + 2 i 1 n = 5i i + 3 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 53 / 61

54 AB Power Functions Table 1b. Known AB power functions x d on F 2 n Functions Exponents d Conditions d (x d ) Gold 2 i + 1 gcd(i, n) = 1 2 Kasami 2 2i 2 i + 1 gcd(i, n) = 1 i + 1 Welch 2 t + 3 n = 2t Niho 2 t + 2 t 2 1, t even n = 2t + 1 (t + 2)/2 2 t + 2 3t+1 2 1, t odd t + 1 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 54 / 61

55 Other Relations to Crosscorrelation Decimations Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 55 / 61

56 Sequences and the S-box in AES Kloosterman sum The crosscorrelation between m-sequence {s t } and the reverse sequence {s t } corresponds to the famous Kloosterman sum C 1 (τ) = x 0 ω T r(ax+x 1 ) Bound for Kloosterman sum is C 1 (τ) + 1 2p n 2 The AES S-box is based on f(x) = x 1 for n = 8. The nonlinearity between T r(x 1 ) and T r(ax) is C 1 (τ) The S-box for is 4 uniform (not APN), the best possible known for a permutation for n = 8 The S-box is not AB, but uniformity and nonlinearity is the best possible known for n = 8 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 56 / 61

57 Sequences with Ideal Autocorrelation Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 57 / 61

58 Sequences with ideal autocorrelation: Kasami-Exponent Property of APN power functions Let f(x) = x d be a binary APN power mapping of F 2 n. Then (x + 1) d + x d = b has two solutions for 2 n 1 values of b and 0 solutions for the 2 n 1 other values of b. Theorem (Dillon and Dobbertin (2004)) Let d = 2 2k 2 k + 1 where gcd(k, n) = 1 and define the binary sequence {s t } such that { 1 if (x + 1) s t = d + x d = b has 2 solutions 0 if (x + 1) d + x d = b has 0 solutions The {s t } is balanced and has two-level ideal autocorrelation. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 58 / 61

59 Ternary sequences: Ideal Autocorrelation The Lin sequence Let p = 3 and n odd. Let α be a primitive element of F p n. Let {s t } be the ternary m-sequence where s t = T r(α t ). Then the sequence u t = s t + s (2 3 (n 1)/2 +1)t has two-level autocorrelation. Remarks This result was conjecture by Lin in The result was proved by Gong et al and Arasu et al Note that the decimation d = 2 3 (n 1)/2 + 1 gives a three-valued crosscorrelation. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 59 / 61

60 USC note Note on a USC Lab at the EE Department Theory is when you know everything but nothing works. Practice is when everything works but no one knows why. In our lab theory and practice are combined nothing works and no one knows why. Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 60 / 61

61 Thank You! Questions? Comments? Suggestions? Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation of m-sequences 5th ICMCTA-2017, Estonia 61 / 61

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences A joint work with Chunlei Li, Xiangyong Zeng, and Tor Helleseth Selmer Center, University of Bergen

More information

with Good Cross Correlation for Communications and Cryptography

with Good Cross Correlation for Communications and Cryptography m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

New Ternary and Quaternary Sequences with Two-Level Autocorrelation

New Ternary and Quaternary Sequences with Two-Level Autocorrelation New Ternary and Quaternary Sequences with Two-Level Autocorrelation Honggang Hu Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, Canada Email. h7hu@uwaterloo.ca

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

Some Results on the Known Classes of Quadratic APN Functions

Some Results on the Known Classes of Quadratic APN Functions Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, and Bo Sun Department of Informatics, University of Bergen Postboks 7803, N-5020, Bergen, Norway {Lilya.Budaghyan,Tor.Helleseth,Nian.Li,Bo.Sun}@uib.no

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

Low Correlation Sequences for CDMA

Low Correlation Sequences for CDMA Indian Institute of Science, Bangalore International Networking and Communications Conference Lahore University of Management Sciences Acknowledgement Prof. Zartash Afzal Uzmi, Lahore University of Management

More information

Nonlinear Functions A topic in Designs, Codes and Cryptography

Nonlinear Functions A topic in Designs, Codes and Cryptography Nonlinear Functions A topic in Designs, Codes and Cryptography Alexander Pott Otto-von-Guericke-Universität Magdeburg September 21, 2007 Alexander Pott (Magdeburg) Nonlinear Functions September 21, 2007

More information

Sequences and Linear Codes from Highly Nonlinear Functions

Sequences and Linear Codes from Highly Nonlinear Functions Sequences and Linear Codes from Highly Nonlinear Functions Chunlei Li Dissertation for the degree of philosophiae doctor(phd) at the University of Bergen 2014 Dissertation date: June 16th A C K N O W

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

A class of quadratic APN binomials inequivalent to power functions

A class of quadratic APN binomials inequivalent to power functions A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander November 30, 2006 Abstract We exhibit an infinite class of almost perfect nonlinear quadratic

More information

Fourier Spectra of Binomial APN Functions

Fourier Spectra of Binomial APN Functions Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra

More information

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva JOURNAL SCIENCE EDUCATION INNOVATION, VOL. 2. 2014 Association Scientific and Applied Research International Journal Original Contribution ISSN 1314-9784 A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES

More information

Topic 3. Design of Sequences with Low Correlation

Topic 3. Design of Sequences with Low Correlation Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The

More information

Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform

Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA

More information

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012 6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 9, SEPTEMBER 2012 A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Fellow,

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin Guang Gong INRIA, B.P. 105, 78153 Le Chesnay Cedex, France, Pascale.Charpin@inria.fr Department of Electrical and Computer

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin

On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering On the Binary Sequences of Period

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment

Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1,

More information

Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity

Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Guang Gong Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada Email:

More information

Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields

Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields Zilong Wang and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo Waterloo,

More information

On the normality of p-ary bent functions

On the normality of p-ary bent functions Noname manuscrit No. (will be inserted by the editor) On the normality of -ary bent functions Ayça Çeşmelioğlu Wilfried Meidl Alexander Pott Received: date / Acceted: date Abstract In this work, the normality

More information

On a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code

On a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code 680 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 [13] B. R. McDonald, Finite Rings with Identity. New York: Marcel Dekker, 1974. [14] F. J. MacWilliams and N. J. A. Sloane, The Theory

More information

On the Existence and Constructions of Vectorial Boolean Bent Functions

On the Existence and Constructions of Vectorial Boolean Bent Functions On the Existence and Constructions of Vectorial Boolean Bent Functions Yuwei Xu 1, and ChuanKun Wu 1 1 State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy

More information

Constructing new APN functions from known ones

Constructing new APN functions from known ones Constructing new APN functions from known ones Lilya Budaghyan a, Claude Carlet b, and Gregor Leander c a Department of Mathematics University of Trento ITALY b Department of Mathematics University of

More information

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

Characterizations of the differential uniformity of vectorial functions by the Walsh transform Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis

More information

A New Approach to Permutation Polynomials over Finite Fields

A New Approach to Permutation Polynomials over Finite Fields A New Approach to Permutation Polynomials over Finite Fields Xiang-dong Hou Department of Mathematics and Statistics University of South Florida Coding, Cryptology and Combinatorial Designs Singapore,

More information

arxiv: v3 [math.nt] 19 Nov 2018

arxiv: v3 [math.nt] 19 Nov 2018 arxiv:1805.10452v3 [math.nt] 19 Nov 2018 WEIL SUMS OF BINOMIALS: PROPERTIES, APPLICATIONS, AND OPEN PROBLEMS DANIEL J. KATZ Abstract. We present a survey on Weil sums in which an additive character of

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Céline Blondeau, Anne Canteaut and Pascale Charpin* Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 149 Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin* INRIA Paris-Rocquencourt, Project-Team SECRET,

More information

Special Monomial Maps: Examples, Classification, Open Problems

Special Monomial Maps: Examples, Classification, Open Problems Special Monomial Maps: Examples, Classification, Open Problems Gohar Kyureghyan Otto-von-Guericke University of Magdeburg, Germany Fq12 - Saratoga July 14, 2015 Outline Special maps yielding small Kakeya

More information

Vectorial Boolean Functions for Cryptography

Vectorial Boolean Functions for Cryptography Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter

More information

On Boolean functions which are bent and negabent

On Boolean functions which are bent and negabent On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra

More information

THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1

THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 J. Appl. Math. & Informatics Vol. 31(2013), No. 1-2, pp. 179-188 Website: http://www.kcam.biz THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 JI-MI YIM, SUNG-JIN CHO, HAN-DOO KIM, UN-SOOK CHOI

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

arxiv: v3 [cs.it] 14 Jun 2016

arxiv: v3 [cs.it] 14 Jun 2016 Some new results on permutation polynomials over finite fields Jingxue Ma a, Tao Zhang a, Tao Feng a,c and Gennian Ge b,c, a School of Mathematical Sciences, Zhejiang University, Hangzhou 310027, Zhejiang,

More information

Optimal Ternary Cyclic Codes From Monomials

Optimal Ternary Cyclic Codes From Monomials 5898 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 59, NO 9, SEPTEMBER 2013 Optimal Ternary Cyclic Codes From Monomials Cunsheng Ding, Senior Member, IEEE, and Tor Helleseth, Fellow, IEEE Abstract Cyclic

More information

The simplest method for constructing APN polynomials EA-inequivalent to power functions

The simplest method for constructing APN polynomials EA-inequivalent to power functions The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8]

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

Almost Difference Sets and Their Sequences With Optimal Autocorrelation

Almost Difference Sets and Their Sequences With Optimal Autocorrelation 2934 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001 Almost Difference Sets Their Sequences With Optimal Autocorrelation K. T. Arasu, Cunsheng Ding, Member, IEEE, Tor Helleseth,

More information

If a Generalised Butterfly is APN then it Operates on 6 Bits

If a Generalised Butterfly is APN then it Operates on 6 Bits If a Generalised Butterfly is APN then it Operates on 6 Bits Anne Canteaut 1, Léo Perrin 1, Shizhu Tian 1,2,3 1 Inria, Paris, France. 2 State Key Laboratory of Information Security, Institute of Information

More information

Low Correlation Zone Sequences

Low Correlation Zone Sequences Low Correlation Zone Sequences Jung-Soo Chung and Jong-Seon No Department of Electrical Engineering and Computer Science, Institute of New Media and Communications, Seoul National University, Seoul 151-744,

More information

On the Cross-correlation of a Ternary m-sequence of Period 3 4k+2 1 and Its Decimated Sequence by (32k+1 +1) 2

On the Cross-correlation of a Ternary m-sequence of Period 3 4k+2 1 and Its Decimated Sequence by (32k+1 +1) 2 On the Cross-correlation of a Ternary m-sequence of Period 3 4k+2 1 and Its Decimated Sequence by (32k+1 +1) 2 8 Sung-Tai Choi, Tae-Hyung Lim, Jong-Seon No, 1 and Habong Chung 2 1 Department of EECS, INMC,

More information

Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets

Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets Claude Carlet LAGA, Department of Mathematics, University of Paris 8 and Paris 13 and CNRS, Saint Denis cedex

More information

On more bent functions from Dillon exponents

On more bent functions from Dillon exponents AAECC DOI 10.1007/s0000-015-058-3 ORIGINAL PAPER On more bent functions from Dillon exponents Long Yu 1 Hongwei Liu 1 Dabin Zheng Receive: 14 April 014 / Revise: 14 March 015 / Accepte: 4 March 015 Springer-Verlag

More information

Design of Pseudo-Random Spreading Sequences for CDMA Systems

Design of Pseudo-Random Spreading Sequences for CDMA Systems Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,

More information

New Polyphase Sequence Families with Low Correlation Derived from the Weil Bound of Exponential Sums

New Polyphase Sequence Families with Low Correlation Derived from the Weil Bound of Exponential Sums New Polyphase Sequence Families with Low Correlation Derived from the Weil Bound of Exponential Sums Zilong Wang 1, Guang Gong 1 and Nam Yul Yu 1 Department of Electrical and Computer Engineering, University

More information

Dickson Polynomials that are Involutions

Dickson Polynomials that are Involutions Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.

More information

Nonlinear Shi, Registers: A Survey and Open Problems. Tor Helleseth University of Bergen NORWAY

Nonlinear Shi, Registers: A Survey and Open Problems. Tor Helleseth University of Bergen NORWAY Nonlinear Shi, Registers: A Survey and Open Problems Tor Helleseth University of Bergen NORWAY Outline ntroduc9on Nonlinear Shi> Registers (NLFSRs) Some basic theory De Bruijn Graph De Bruijn graph Golomb

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

Stream Ciphers and Number Theory

Stream Ciphers and Number Theory Stream Ciphers and Number Theory Revised Edition Thomas W. Cusick The State University of New York at Buffalo, NY, U.S.A. Cunsheng Ding The Hong Kong University of Science and Technology China Ari Renvall

More information

On Welch-Gong Transformation Sequence Generators

On Welch-Gong Transformation Sequence Generators On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario

More information

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori A conjecture about Gauss sums and bentness of binomial Boolean functions Jean-Pierre Flori arxiv:608.05008v2 [math.nt] 9 Aug 206 Abstract In this note, the polar decomposition of binary fields of even

More information

On The Nonlinearity of Maximum-length NFSR Feedbacks

On The Nonlinearity of Maximum-length NFSR Feedbacks On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main

More information

Fast Discrete Fourier Spectra Attacks on Stream Ciphers

Fast Discrete Fourier Spectra Attacks on Stream Ciphers Fast Discrete Fourier Spectra Attacks on Stream Ciphers Guang Gong, Sondre Rønjom, Tor Helleseth, and Honggang Hu Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario,

More information

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Primitive and normal polynomials over a finite field are, of course, particular examples of irreducible polynomials over

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA September 2008 Outline of this talk Difference sets and almost difference sets Cyclotomic classes Introduction of binary sequences with optimal autocorrelation

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

Polynomials on F 2. cryptanalysis. Y. Aubry 1 G. McGuire 2 F. Rodier 1. m with good resistance to. 1 IML Marseille 2 University College Dublin

Polynomials on F 2. cryptanalysis. Y. Aubry 1 G. McGuire 2 F. Rodier 1. m with good resistance to. 1 IML Marseille 2 University College Dublin Polynomials on F 2 m with good resistance to cryptanalysis Y Aubry 1 G McGuire 2 F Rodier 1 1 IML Marseille 2 University College Dublin Outline APN functions A lower bound for the degree of an APN polynomial

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

Semifields, Relative Difference Sets, and Bent Functions

Semifields, Relative Difference Sets, and Bent Functions Semifields, Relative Difference Sets, and Bent Functions Alexander Pott Otto-von-Guericke-University Magdeburg December 09, 2013 1 / 34 Outline, or: 2 / 34 Outline, or: Why I am nervous 2 / 34 Outline,

More information

Hyper-bent Functions

Hyper-bent Functions Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

Some Results on the Arithmetic Correlation of Sequences

Some Results on the Arithmetic Correlation of Sequences Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are

More information

New quaternary sequences of even length with optimal auto-correlation

New quaternary sequences of even length with optimal auto-correlation . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2018, Vol. 61 022308:1 022308:13 doi: 10.1007/s11432-016-9087-2 New quaternary sequences of even length with optimal auto-correlation Wei SU

More information

Helleseth, T. & Kumar, P.V. Pseudonoise Sequences Mobile Communications Handbook Ed. Suthan S. Suthersan Boca Raton: CRC Press LLC, 1999

Helleseth, T. & Kumar, P.V. Pseudonoise Sequences Mobile Communications Handbook Ed. Suthan S. Suthersan Boca Raton: CRC Press LLC, 1999 Helleseth, T. & Kumar, P.V. Pseudonoise Sequences Mobile Communications Handbook Ed. Suthan S. Suthersan Boca Raton: CRC Press LLC, 1999 c 1999byCRCPressLLC Pseudonoise Sequences Tor Helleseth University

More information

Even Periodic and Odd Periodic Complementary Sequence Pairs from Generalized Boolean Functions

Even Periodic and Odd Periodic Complementary Sequence Pairs from Generalized Boolean Functions Even Periodic and Odd Periodic Complementary Sequence Pairs from Generalized Boolean Functions Yang Yang 1,2,3 Xiaohu Tang 1 and Guang Gong 2 1 Institute of Mobile Communications, Southwest Jiaotong University

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

APN Power Functions Over GF(2 n ) for Infinitely Many n

APN Power Functions Over GF(2 n ) for Infinitely Many n APN Power Functions Over GF( n ) for Infinitely Many n David Jedlicka University of Texas at Austin Department of Mathematics Austin, TX 7871 USA jedlicka@math.utexas.edu July 11, 005 Abstract I present

More information

Complete characterization of generalized bent and 2 k -bent Boolean functions

Complete characterization of generalized bent and 2 k -bent Boolean functions Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean

More information

On the p-ranks and Characteristic Polynomials of Cyclic Difference Sets

On the p-ranks and Characteristic Polynomials of Cyclic Difference Sets Designs, Codes and Cryptography, 33, 23 37, 2004 # 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. On the p-ranks and Characteristic Polynomials of Cyclic Difference Sets JONG-SEON NO

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet 1 and Stjepan Picek 1, 2 1 LAGA, Department of Mathematics, University of Paris 8 (and Paris

More information

Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves

Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves by Richard Moloney A dissertation presented to University College Dublin in partial fulfillment of the requirements

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has

More information

Boolean Functions Whose Restrictions are Highly Nonlinear

Boolean Functions Whose Restrictions are Highly Nonlinear Boolean Functions Whose Restrictions are Highly Nonlinear Constanza Riera Høgskolen i Bergen Nygårdsgt. Bergen 58, Norway Email: csr@hib.no Matthew G. Parker Selmer Centre, nst. for nformatikk University

More information

FOR a positive integer n and a prime p, let F p n be

FOR a positive integer n and a prime p, let F p n be 1 Several new classes of Boolean functions with few Walsh transform values Guangkui Xu, Xiwang Cao, Shangding Xu arxiv:1506.0886v1 [cs.it] Jun 2015 Abstract In this paper, several new classes of Boolean

More information

FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory

FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory A. Rajagopal Dept. of E&C, K.L. Sudha Dept.of E&C, Dundi Ajay Dept. of E&C, ABSTRACT Pseudo Noise (PN) sequences are defined

More information

Trace Representation of Legendre Sequences

Trace Representation of Legendre Sequences C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and

More information

Construction X for quantum error-correcting codes

Construction X for quantum error-correcting codes Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

Nonlinear Equivalence of Stream Ciphers

Nonlinear Equivalence of Stream Ciphers Sondre Rønjom 1 and Carlos Cid 2 1 Crypto Technology Group, Norwegian National Security Authority, Bærum, Norway 2 Information Security Group, Royal Holloway, University of London Egham, United Kingdom

More information

A construction of bent functions from plateaued functions

A construction of bent functions from plateaued functions A construction of bent functions from lateaued functions Ayca Cesmelioglu, Wilfried Meidl To cite this version: Ayca Cesmelioglu, Wilfried Meidl. A construction of bent functions from lateaued functions.

More information

Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs

Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering Binary Sequence Pairs with

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute

More information

Open problems on cyclic codes

Open problems on cyclic codes Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6

More information