Structures of cryptographic functions with strong avalanche characteristics

Size: px
Start display at page:

Download "Structures of cryptographic functions with strong avalanche characteristics"

Transcription

1 University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1995 Structures of cryptographic functions with strong avalanche characteristics Jennifer Seberry University of Wollongong, jennie@uow.edu.au Xian-Mo Zhang University of Wollongong, xianmo@uow.edu.au Yuliang Zheng University of Wollongong, yuliang@uow.edu.au Publication Details Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of cryptographic functions with strong avalanche characteristics, Advances in Cryptography, ASIACRYPT'94, eds Josef Pieprzyk and Reihaneh Safavi-Naini, Vol 917, Lecture Notes in Computer Science, Springer-Verlag, (1995), Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: research-pubs@uow.edu.au

2 Structures of cryptographic functions with strong avalanche characteristics Abstract This paper studies the properties and constructions of non linear functions, which are a core component of cryptographic primi- tives including data encryption algorithms and one-way hash function. A main contribution of this paper is to reveal the relationship between nonlinearity and propagation characteristic, two critical indicators of the cryptographic strength of a Boolean function. In particular, (we prove that (i) if f, a Boolean function on V n, satisfies the propagation criterion with respect to all but a subset R of vectors in V n, then the nonlinearity of f satisfies N f 2 n / 2 (n+t)-1, where t is the rank of R, and (ii) When R > 2, the nonzero vectors in R are linearly dependent. Furthermore we show that (iii) if R = 2 then n must be odd, the nonlinearity of f satisfies N f = 2 n / 2 (n-1), and the nonzero vector in R must be a linear struc- ture of f. (iv) there exists no function on V n such that R = 3 (v) if R = 4 then n must be even, the nonlinearity of f satisfies N f = 2 n / 2 n, and the nonzero vectors in R must be linear structures of f. (vi) if R = 5 then n must be odd, the nonlinearity of f is N f = 2 n / 2 (n-1), the four nonzero vectors denoted by β1, β2, β3 and β4 are related by the equation β1 β2 β3 β4 = 0 and none of the four vectors is a linear structure of f. (vii) there exists no function on V n such that R = 6. We also discuss the structures of functions with R = 2,4,5. In particular we show that these functions have close relationships with bent functions, and can be easily constructed from the latter. Disciplines Physical Sciences and Mathematics Publication Details Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of cryptographic functions with strong avalanche characteristics, Advances in Cryptography, ASIACRYPT'94, eds Josef Pieprzyk and Reihaneh Safavi-Naini, Vol 917, Lecture Notes in Computer Science, Springer-Verlag, (1995), This conference paper is available at Research Online:

3 Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract) Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng Department of Computer Science University of Wollongong, Wollongong, NSW 2522, Australia fjennie, xianmo, Abstract. This paper studies the properties and constructions of nonlinear functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contribution of this paper is to reveal the relationship between nonlinearity and propagation characteristic, two critical indicators of the cryptographic strength of a Boolean function. In particular, we provethat (i) if f, a Boolean function on V n, satises the propagation criterion with respect to all but a subset < of vectors in V n, then the nonlinearity off satises N f 2 n;1 ; (n+t);1, where t is the rank of <, and (ii) When j<j > 2, the nonzero vectors in < are linearly dependent. Furthermore we show that (iii) if j<j =2thenn must be odd, the nonlinearity off satises N f = 2 n;1 ; (n;1), and the nonzero vector in < must be a linear structure of f. (iv) there exists no function on V n such that j<j =3. (v) if j<j = 4 then n must be even, the nonlinearity off satises N f = 2 n;1 ; n, and the nonzero vectors in < must be linear structures of f. (vi) if j<j =5thenn must be odd, the nonlinearity off is N f =2 n;1 ; (n;1), the four nonzero vectors in <, denoted by 1, 2, 3 and 4, are related by the equation = 0, and none of the four vectors is a linear structure of f. (vii) there exists no function on V n such that j<j =6. We also discuss the structures of functions with j<j = In particular we show that these functions have close relationships with bent functions, and can be easily constructed from the latter. 1 Introduction Cryptographic techniques for information authentication and data encryption require Boolean functions with a number of critical properties that distinguish them from linear (or ane) functions. Among the properties are high nonlinearity, high degree of propagation, few linear structures, high algebraic degree etc. These properties are often called nonlinearity criteria. An important topic

4 is to investigate relationships among the various nonlinearity criteria. Progress in this direction has been made in [9], where connections have been revealed among the strict avalanche characteristic (SAC), dierential characteristics, linear structures and nonlinearity, of quadratic functions. In this paper we carry on the investigation initiated in [9] and bring together nonlinearity and propagation characteristic of a Boolean function (quadratic or non-quadratic). These two cryptographic criteria are seemly quite separate, in the sense that the former indicates the minimum distance between a Boolean function and all the ane functions whereas the latter forecasts the avalanche behavior of the function when some input bits to the function are complemented. We further extend our investigation into the structures of cryptographic functions. A short summary of the results is presented in Table 1. Due to the limit on space, detailed proofs will be left to the full version of the paper. 2 Basic Denitions We consider Boolean functions from V n to GF (2) (or simply functions on V n ), V n is the vector space of n tuples of elements from GF (2). The truth table of a function f on V n is a (0 1)-sequence dened by(f( 0 ) f( 1 ) ::: f( 2 n ;1 )), and the sequence of f is a (1 ;1)-sequence dened by((;1) f (0) (;1) f (1) ::: (;1) f ( 2n;1) ), where 0 =(0 ::: 0 0), 1 =(0 ::: 0 1), :::, 2 n;1 ;1 =(1 ::: 1 1). The matrix of f is a (1 ;1)-matrix of order 2 n dened by M =((;1) f (ij ) ). f is said to be balanced if its truth table contains an equal number of ones and zeros. An ane function f on V n is a function that takes the form of f(x 1 ::: x n )= a 1 x 1 a n x n c, where a j c 2 GF (2), j = 1 2 ::: n. Furthermore f is called a linear function if c =0. Denition 1. The Hamming weight of a (0 1)-sequence s, denoted by W (s), is the number of ones in the sequence. Given two functions f and g on V n, the Hamming distance d(f g) between them is dened as the Hamming weight of the truth table of f(x) g(x), where x =(x 1 ::: x n ). The nonlinearity of f, denoted by N f, is the minimal Hamming distance between f and all ane functions on V n, i.e., N f = min i=1 2 ::: 2 n+1 d(f ' i ) where ' 1, ' 2, :::, ' 2 n+1 are all the ane functions on V n. Now we introduce the denition of propagation criterion. Denition 2. Let f be a function on V n.wesaythatf satises 1. the propagation criterion with respect to if f(x) f(x ) is a balanced function, where x =(x 1 ::: x n ) and is a vector in V n. 2. the propagation criterion of degree k if it satises the propagation criterion with respect to all 2 V n with 1 W () k.

5 The above denition for propagation criterion is from [7]. Further work on the topic can be found in [6]. Note that the strict avalanche criterion (SAC) introduced by Webster and Tavares [10, 11] is equivalent to the propagation criterion of degree 1 and that the perfect nonlinearity studied by Meier and Staelbach [4] is equivalent to the propagation criterion of degree n where n is the number of the coordinates of the function. While the propagation characteristic measures the avalanche eect of a function, the linear structure is a concept that in a sense complements the former, namely, it indicates the straightness of a function. Denition 3. Let f be a function on V n. A vector 2 V n is called a linear structure of f if f(x) f(x ) is a constant. By denition, the zero vector in V n is a linear structure of all functions on V n. It is not hard to see that the linear structures of a function f form a linear subspace of V n. The dimension of the subspace is called the linearity dimension of f. We note that it was Evertse who rst introduced the notion of linear structure (in a sense broader than ours) and studied its implication on the security of encryption algorithms [3]. A(1 ;1)-matrix H of order m is called a Hadamard matrix if HH t = mi m, where H t is the transpose of H and I m is the identity matrix of order m. A Sylvester-Hadamard matrix of order 2 n, denoted by H n, is generated by the following recursive relation H 0 =1 H n = Hn;1 H n;1 n =1 2 :::: H n;1 ;H n;1 Denition 4. A function f on X V n is called a bent function if 2 ; n 2 (;1) f (x)h xi = 1 x2vn for all 2 V n. Here h xi is the scalar product of and x, namely, h xi P = n i=1 b ix i, and f(x) h xi is regarded as a real-valued function. Bent functions can be characterized in various ways [1, 2,8,12]. In particular the following four statements are equivalent: (i) f is bent. (ii) h `i = n for any ane sequence ` of length 2 n, where is the sequence of f. (iii) f satises the propagation criterion with respect to all non-zero vectors in V n. (iv) M, the matrix of f, is a Hadamard matrix. Bent functions on V n exist only when n is even. Another important property of bent functions is that they achieve the highest possible nonlinearity 2 n;1 ; n;1.

6 3 Propagation Characteristic and Nonlinearity Given two sequences a = (a 1 ::: a m ) and b = (b 1 ::: b m ), their componentwise product is dened by a b =(a 1 b 1 ::: a m b m ). Let f be a function on V n. For a vector 2 V n, denote by () the sequence of f(x ). Thus (0) is the sequence of f itself and (0) () is the sequence of f(x) f(x ). Set () =h(0) ()i the scalar product of (0) and (). Obviously, () = 0 if and only if f(x) f(x ) is balanced, i.e., f satises the propagation criterion with respect to. On the other hand, if j()j =2 n, then f(x) f(x ) is a constant and hence is a linear structure of f. Let M =((;1) f (ij ) ) be the matrix of f and be the sequence of f. Due to a very pretty result by R. L. McFarland (see Theorem 3.3 of [2]), M can be decomposed into M =2 ;n H n diag(h `0i h `2n ;1 i)h n where `i is the ith row of H n, a Sylvester-Hadamard matrix of order 2 n. By Lemma 2 of [8], `i is the sequence of a linear function dened by ' i (x) =h i xi, where i is the ith vector in V n according to the ascending alphabetical order. Clearly MM T =2 ;n H n diag(h `0i 2 h `2n ;1 i 2 )H n : (1) On the other hand, we always have MM T =(( i j )) where i j =0 1 ::: 2 n ; 1. Let S be a set of vectors in V n. The rank of S is the maximum number of linearly independent vectors in S. Note that when S forms a linear subspace of V n, its rank coincides with its dimension. Lemma 6 of [8] states that the distance between two functions f 1 and f 2 on V n can be expressed as d(f 1 f 2 )=2 n;1 ; 1 2 h f1 f2 i, where f1 and f2 are the sequences of f 1 and f 2 respectively. As an immediate consequence we have: Lemma 5. The nonlinearity of a function f on V n can be calculated by N f =2 n;1 ; 1 2 maxfjh `iij 0 i 2 n ; 1g where is the sequence of f and `0, :::, `2n ;1 functions on V n. are the sequences of the linear Now weprove a central result of this paper: Theorem 6. Let f be afunction on V n that satises the propagation criterion with respect to all but a subset < of vectors in V n. Then the nonlinearity of f satises N f 2 n;1 ; (n+t);1, where t is the rank of <.

7 It was observed by Nyberg in Proposition 3 of [5] (see also a detailed discussion in [9]) that knowing the linearity dimension, say `, of a function f on V n, the nonlinearity of the function can be expressed as N f =2`N r, where N r is the nonlinearity of a function obtained by restricting f on an (n ; `)-dimensional subspace of V n. Therefore, in a sense Theorem 6 is complementary to Proposition 3 of [5]. In the next section we discuss an interesting special case where j<j = 2. More general cases where j<j > 2, which need very dierent proof techniques, will be fully discussed in the later part of the paper. 4 Functions with j<j = 2 Since < consists of two vectors, a zero and a nonzero, it forms a one-dimensional subspace of V n. The following result on splitting a power of 2 into two squares will be used in later discussions. Lemma 7. Let n 2 be apositive integer and 2 n = p 2 +q 2 where both p 0 and q 0 are integers. Then p =2 1 2 n and q =0when n is even, and p = q =2 1 2 (n;1) when n is odd. Now we can prove Theorem 8. If f, a function on V n, satises the propagation criterion with respect to all but two (a zero and a nonzero) vectors in V n, then (i) n must be odd, (ii) the nonzero vector where the propagation criterion is not satised must be a linear structure of f and (iii) the nonlinearity of f satises N f =2 n;1 ; (n;1). A further examination of the proof for Theorem 8 reveals that a function with j<j = 2 has a very simple structure as described below. Corollary 9. A function f on V n satises the propagation criterion with respect to all but two (a zero and a nonzero) vectors in V n, if and only if there exists a nonsingular linear matrix of order n over GF (2), say B, such that g(x) =f(xb) can be written as g(x) =cx n h(x 1 ::: x n;1 ) where h is a bent function on V n;1 and c is a constant in GF (2). By Theorem 8 and Corollary 9, functions on V n that satisfy the propagation criterion with respect to all but two vectors in V n exist only if n is odd, and such a function can always be (informally) viewed as being obtained by repeating twice abent function on V n;1 (subject to a nonsingular linear transformation on the input coordinates). When < has more than two vectors, it does not necessarily form a linear subspace of V n. Therefore discussions presented in this section do not directly apply to the more general case. Nevertheless, using a dierent technique, we show in the next section a signicant result on the structure of <, namely, the nonzero vectors in < with j<j > 2 are linearly dependent.

8 5 Linear Dependence in < The following result on vectors will be used in the proof of the main result in this section. Lemma 10. Let 1 ::: k be linear functions on V n which are linearly independent. Set Q = k 3 75 and P = 2 64 `1. `k where i is the truth table and `i is the sequence of i, i =1 ::: k. Then (i) each vector in V k appears as a column in Q precisely 2 n;k times and (ii) each k-dimensional (1 ;1)-vector appears as a column in P precisely 2 n;k times. Proof. Note that (i) and (ii) are equivalent. Clearly, any nonzero linear combination of ' 1 ::: ' k is a nonzero linear function and thus it is balanced. Consequently, this lemma is equivalent to Lemma 7 of [9]. ut Next we show the linear dependence of nonzero vectors in <. Theorem 11. Suppose that f, a function on V n, satises the propagation criterion with respect to all but k +1 vectors 0 1 ::: k in V n, where k>1. Then 1 ::: k are linearly dependent, namely, there exist k constants c 1 ::: c k 2 GF (2), not all of which are zeros, such that c 1 1 c k k =0. Proof. The theorem is obviously true if k > n.now we prove the theorem for k n by contradiction. Assume that 1 ::: k are linearly independent. Let be the sequence of f. Compare the rst row ofthetwo sides of (1), we have (( 0 ) ( 1 ) ::: ( 2 n ;1 )) = 2 ;n (h `0i 2 ::: h `2n ;1 i 2 )H n where j is the jth vector in V n in the ascending alphabetical order. Equivalently we have (( 0 ) ( 1 ) ::: ( 2 n ;1 ))H n =(h `0i 2 ::: h `2n ;1 i 2 ) (2) Now letp be a matrix that consists of the 0th, 1 th, :::, k th rows of H n. Here we regard i as an integer. Set a 2 j = h `ji 2, j =0 1 ::: 2 n ; 1. Note that () =0if 62 f0 1 ::: k g. Hence (2) can be written as ((0) ( 1 ) ::: ( k ))P =(a 2 0 a2 1 ::: a2 2 n ;1) (3) where 0 in (3) is identical to 0 in (2). 3 75

9 Write P =(p ij ), i =0 1 :::k, j =0 1 ::: 2 n ; 1. As the top row ofp is (1 1 ::: 1), a 2 j in (3) can be expressed as (0) + kx i=1 p ij ( i )=a 2 j j =0 1 ::: 2 n ; 1. Let P be the submatrix of P obtained by removing the top row from P.Aswas mentioned earlier, the i th rowofh n is the sequence of a linear function dened by i (x) =h i xi (see Lemma 2 of [8]). The linear independence of the vectors 1 ::: k implies the linear independence of the linear functions 1 (x) = h 1 xi ::: k (x) = h k xi. By Lemma 10, each k-dimensional (1 ;1)-vector appears in P, as a column vector, precisely 2 n;k times. Thus for each xedj there exists a j 0 such that (p 1j ::: p kj )=;(p 1j0 ::: p kj0 )and hence (0) + kx i=1 p ij0 ( i )=a 2 j0 : Adding together both sides of the abovetwo equations, wehave2(0) = a 2 j +a 2 j0. Hence a 2 j + a2 j0 =2n+1. There are two cases to be considered: n even and n odd. Case 1: n is even. By Lemma 7, a 2 j = a2 j0 =2n. This implies that h `ji =2 n for any xed j, which in turn implies that f is bent and that it satises the propagation criterion with respect to every nonzero vector in V n (see also the equivalent statements about bent functions in Section 2). This clearly contradicts the fact that f does not satisfy the propagation criterion with respect to 1 ::: k. Case 2: n is odd. Again by Lemma 7, a 2 j = 2n+1 or 0. If a 2 j = 2n+1, then P P k i=1 p ij( i )=2 n. Otherwise if a 2 j = 0, then k i=1 p ij( i )=;2 n.thus we can write kx i=1 p ij ( i )=c j 2 n (4) where c j = 1, j =0 1 ::: 2 n ; 1. For each xed j rewrite (4) as p 1j ( 1 )+ kx i=2 p ij ( i )=c j 2 n : From Lemma 10, there exists a j 1 such that p ij1 = p 1j and p ij1 = ;p ij, i = 2 ::: k. Note that p 1j1 ( 1 )+ kx i=2 p ij1 ( i )=c j1 2 n : Adding the above two equations together, we have 2p 1j ( 1 )=(c j + c j1 )2 n :

10 As f does not satisfy the propagation criterion with respect to 1, we have ( 1 ) 6= 0andc j + c j0 6= 0. This implies c j + c j0 = 2, and hence ( 1 )=2 n. By the same reasoning, we can prove that ( j )=2 n, j =2 ::: k.thus we can write (( 1 ) ::: ( k ))=2 n (b 1 ::: b k ) where each b j = 1. By Lemma 10, there exists an s such that (p 1s ::: p ks )=(b 1 ::: b k ): This gives us kx p is ( i )= kx b i ( i )= kx i=1 i=1 i=1 b i b i 2 n = k2 n : (5) Since k>1, (5) contradicts (4). Summarizing Cases 1 and 2, we conclude that the assumption that 1 ::: k are linearly independent is wrong. This proves the theorem. ut We believe that Theorem 11 is of signicant importance, as it reveals for the rst time the interdependence among the vectors where the propagation criterion is not satised by f. Of particular interest is the case when < = f0 1 ::: k g forms a linear subspace of V n. Recall that linear structures form a linear subspace. Therefore, when < is a subspace, a nonzero vector in < is a linear structure if and only if all other nonzero vectors are linear structures of f. In the following sections we examine the cases when j<j = Functions with j<j = 3 When j<j =3,thetwo distinct nonzero vectors in < can not be linearly dependent. By Theorem 11 we have Theorem 12. There exists no function that does not satisfy the propagation criterion with respect to only three vectors. 7 Functions with j<j = 4 Next we consider the case when j<j = 4. Similarly to the case of j<j = 2, the rst step we takeistointroduce a result on splitting a power of 2 into four, but not two, squares. Lemma 13. Let n 3 be apositive integer and 2 n = P 4 j=1 p2 j where each p j 0 is an integer. Then (i) p 2 1 = p 2 2 =2 n;1, p 3 = p 4 =0,ifn is odd (ii) p 2 1 =2 n, p 2 = p 3 = p 4 =0or p 2 1 = p 2 2 = p 2 3 = p 2 4 =2 n;2,ifn is even.

11 Now we can prove akey result on the case of j<j =4. Theorem 14. If f, a function on V n, satises the propagation criterion with respect to all but four vectors (0, 1 2, 3 )inv n. Then (i) < = f g forms a two-dimensional linear subspace ofv n, (ii) n must be even, (iii) 1 2 and 3 must be linear structures of f, (iv) the nonlinearity of f satises N f =2 n;1 ; n. As a result we have Corollary 15. A function f on V n satises the propagation criterion with respect to all but four vectors in V n if and only if there exists a nonsingular linear matrix of order n over GF (2), say B, such that g(x) =f(xb) can be written as g(x) =c 1 x n;1 c 2 x n h(x 1 ::: x n;2 ) where c 1 and c 2 are constants in GF (2), and h is a bent function on V n;2. In [8], it has been shown that repeating twice or four times a bent function on V n, n even, results in a function on V n;1 or V n;2 that satises the propagation criterion with respect to all but two or four vectors in V n;1 or V n;2.combining Corollaries 15 and 9 with results shown in [8], we conclude that the methods of repeating bent functions presented in [8] generate all the functions that satisfy the propagation criterion with respect to all but two or four vectors. 8 Functions with j<j = 5 Let f be a function on V n with j<j = 5 and let < = f g. In the full paper we show the following result: Theorem 16. Let f be aboolean function on V n that satises the propagation criterion with respect to all but a subset < = f g. Then (i) n is odd, (ii) =0, (iii) j( j )j =2 n;1, j = , and three ( j ) have the same sign while the remaining has a dierent sign, and (iv) the nonlinearity of f satises N f =2 n;1 ; (n;1). Recall that when j<j = 2 or 4, all nonzero vectors in < are linear structures of f, and the structure of f is very simple it can be (informally) viewed as the two- or four-repetition of a bent function on V n;1 or V n;2.incontrast, when j<j =5,none of the nonzero vectors in < is a linear structure of f. Thus if a non-bent function does not possess linear structures, then j<j must be at least 5. In this sense, functions with j<j = 5 occupy a very special position in our understanding of the structures of functions.

12 8.1 Constructing Functions with j<j = 5 The structure of a function with j<j = 5 is not as simple as the cases when j<j < 5. Unlike the case with j<j = 2 or 4, there seem to be a number of dierent ways to construct functions with j<j = 5. The purpose of this section is to demonstrate one of such construction methods. We start with n = 5. Let!(y) be a mapping from V 2 into V 3, dened as follows Set!(0 0) = (1 0 0)!(0 1) = (0 1 0)!(1 0) = (1 1 0)!(1 1) = (0 1 1): f 5 (z) =f 5 (y x) =h!(y) xi (6) where y 2 V 2 and x 2 V 3, z =(y x). Obviously f 5 is a function on V 5 and f 5 (0 0 x 1 x 2 x 3 )=x 1 f 5 (0 1 x 1 x 2 x 3 )=x 2 Hence f 5 can be explicitly expressed as f 5 (1 0 x 1 x 2 x 3 )=x 1 x 2 f 5 (1 1 x 1 x 2 x 3 )=x 2 x 3 : f 5 (y 1 y 2 x 1 x 2 x 3 )=(1 y 1 )(1 y 2 )x 1 (1 y 1 )y 2 x 2 y 1 (1 y 2 )(x 1 x 2 ) y 1 y 2 (x 2 x 3 ) (7) Let `100, `010, `110, `011 denote the sequences of ' 100 (x 1 x 2 x 3 )=x 1, ' 010 (x 1 x 2 x 3 )= x 2, ' 110 (x 1 x 2 x 3 )=x 1 x 2, ' 011 (x 1 x 2 x 3 )=x 2 x 3 respectively, where each ' is regarded as a linear function on V 3. By Lemma 1 of [8], `100, `010, `110, `011 are four dierent rows of H 3. By Lemma 2 of [8], the sequence of f 5 is Let () denote the sequence of =(`100 `010 `110 `011 ): f 5 (z ) =h!(y ) x i where 2 V 2 and 2 V 3, =( ). We now consider () =h ()i. Case 1: 6= 0. In this case we have f 5 (z) f 5 (z ) =h!(y)!(y ) xih!(y ) i: Note that!(y)!(y ) is a nonzero constant vector in V 3 for any xed y 2 V 2. Thus f 5 (z) f 5 (z ) is a nonzero linear function on V 3 for any xed y 2 V 2 and hence it is balanced. This proves that () =0with =( ) and 6= 0. Case 2: = 0. In this case f 5 (z) f 5 (z ) =h!(y) i

13 is balanced for =(0 1 1), (1 0 0) and (1 1 1). In other words, () = 0, if =(0 ) and =(0 1 1), (1 0 0) or (1 1 1). It is straightforward to verify that () =2 4, ;2 4, ;2 4 and ;2 4 with =(0 ) and =(0 0 1), (0 1 0), (1 0 1) and (1 1 0) respectively. Obviously (0) = 2 5. Thus f 5 satises the propagation criterion with respect to all but ve vectors in V 5. With f 5 as a basis, we now construct functions with j<j = 5 over higher dimensional spaces. Let t 5 be odd and s be even. And let g be a function on V t that satises the propagation criterion with respect to all but ve vectors in V t, and h be a bent function on V s. Set where w =(v u), v 2 V t and u 2 V s.thenwehave f(w) =g(v) h(u) (8) Lemma 17. A function constructed by (8) satises j<j =5. Proof. Let () and () be the sequences of g(v ) and h(u ) respectively. Write () as the sequence of f(w ) =g(v ) h(u ), where =( ). By denition, () =() (), where is the Kronecker product. Hence we have f () =h(0) ()i = h(0) (0) () ()i = h(0) ()ih(0) ()i = h () g () where f, g and h are well dened and the subscripts are used to distinguish the three dierent functions f, g and h. Since h(u) is a bent function, h () 6= 0 if and only if = 0. On the other hand, since g satises the propagation criterion with respect to all but ve vectors 0, and 4 in V t, h () = 0 if and only if 2f g. Thus g () = 0 if and only if =( ) with = 0 and 2f g. This proves that f satises the propagation criterion with respect to all but ve vectors in V t+s. ut A function f constructed by (8) is balanced if g is balanced. As the function f 5 on V 5 dened in (7) is balanced, we have Theorem 18. For any odd n 5, there exists a balanced function satisfying the propagation criterion with respect to all but ve vectors in V n. As an example, set h(x 6 x 7 )=x 6 x 7 and f 7 (x 1 x 2 x 3 x 4 x 5 x 6 x 7 )=f 5 (x 1 x 2 x 3 x 4 x 5 ) h(x 6 x 7 ) where f 5 is dened in (7). Note that h(x 6 x 7 ) is a bent function on V 2, by Theorem 18, f 7 is a balanced function on V 7 that satises j<j =5. To close this section we note that one can also start with constructing a function f 7 on V 7 with j<j =5by using the same method as that for designing f 5.

14 9 Functions with j<j = 6 In the full paper we prove that there is no function with j<j =6. Theorem 19. There exists no function on V n such that j<j =6. 10 Degrees of Propagation In [8] it has been shown that if f is a function on V n with j<j = 2, then, through a nonsingular linear transformation on input coordinates, f can be converted into a function satisfying the propagation criterion of degree n ; 1. Similarly, when j<j = 4, the degree can be 2 n. In this section we show thatwithj<j =5, 3 the degree can be n ; 3. Assume that the four nonzero vectors in < are 1, 2, 3 and 4, and that 1, 2 and 3 are a basis of < = f g. Let B be an nn nonsingular matrix on GF (2) with the property that As 4 = 1 2 3,wehave 1 B =(1 ::: ) 2 B =(1 ::: ) 3 B =(1 ::: ) 4 B =( )B =(1 ::: ): Now let g(x) = f(xb). Then g satises the propagation criterion of degree n ; 3, as the only exceptional vectors are (0 ::: ), (1 ::: ), (1 ::: ), (1 ::: ) and (1 ::: ). These discussions, together with Theorem 18, show that for any odd n 5, there exists balanced functions on V n that satisfy the propagation criterion of degree n ; 3 and do not possess a nonzero linear structure. Table 1 shows structural properties of functions with j<j 6. Acknowledgments The rst author was supported in part by the Australian Research Council under the reference numbers A , A and A , the second author by A , and the third author by A References 1. Adams, C. M., Tavares, S. E.: Generating and counting binary bent sequences. IEEE Transactions on Information Theory IT-36 No. 5 (1990) 1170{ Dillon, J. F.: A survey of bent functions. The NSA Technical Journal (1972) 191{ 215

15 < f0g f0 g f g f g Dimension n even odd even odd e.g. Form cx n c 1x n c 2x n;1 f 5(x 1 ::: x 5) of bent h(x 1 ::: x n;1), h(x 1 ::: x n;2), h(x 6 ::: x n), function h is bent. h is bent. f 5 is dened in (7), h is bent. Nonzero linear No No structure(s) Nonlinearity 2 n;1 ; n;1 2 n;1 ; (n;1) 2 n;1 ; n 2 n;1 ; (n;1) Degree of n n ; n n ; 3 propagation Is < a No. subspace? Yes Yes Yes However, =0. Rank of < Table 1. Structural Properties of Highly Nonlinear Functions (Functions with three or six exceptional vectors do not exist.) 3. Evertse, J.-H.: Linear structures in blockciphers. In Advances in Cryptology - EUROCRYPT'87 (1988) vol. 304, Lecture Notes in Computer Science Springer- Verlag, Berlin, Heidelberg, New York pp. 249{ Meier, W., Staelbach, O.: Nonlinearity criteria for cryptographic functions. In Advances in Cryptology - EUROCRYPT'89 (1990) vol. 434, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 549{ Nyberg, K.: On the construction of highly nonlinear permutations. In Advances in Cryptology - EUROCRYPT'92 (1993) vol. 658, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 92{98 6. Preneel, B., Govaerts, R., Vandewalle, J.: Boolean functions satisfying higher order propagation criteria. In Advances in Cryptology - EUROCRYPT'91 (1991) vol. 547, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 141{ Preneel, B., Leekwijck, W. V., Linden, L. V., Govaerts, R., Vandewalle, J.: Propagation characteristics of boolean functions. In Advances in Cryptology - EURO- CRYPT'90 (1991) vol. 437, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 155{ Seberry, J., Zhang, X. M., Zheng, Y.: Nonlinearity and propagation characteristics of balanced boolean functions. To appear in Information and Computation Seberry, J., Zhang, X. M., Zheng, Y.: Relationships among nonlinearity criteria. Presented at EUROCRYPT' Webster, A. F.: Plaintext/ciphertext bit dependencies in cryptographic system. Master's Thesis, Department of Electrical Engineering, Queen's University, Ontario, Cannada 1985

16 11. Webster, A. F., Tavares, S. E.: On the design of S-boxes. In Advances in Cryptology - CRYPTO'85 (1986) vol. 219, Lecture Notes in Computer Science Springer- Verlag, Berlin, Heidelberg, New York pp. 523{ Yarlagadda, R., Hershey, J. E.: Analysis and synthesis of bent sequences. IEE Proceedings (Part E) 136 (1989) 112{123 This article was processed using the L A TEX macro package with LLNCS style

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

The primary aim of this paper is to introduce a new class of functions to facilitate the design of cryptographically good functions. It turns out that

The primary aim of this paper is to introduce a new class of functions to facilitate the design of cryptographically good functions. It turns out that Plateaued Functions Yuliang Zheng 1 and Xian-Mo Zhang 1 Monash University, Frankston, Melbourne, VIC 3199, Australia yuliang.zheng@monash.edu.au, http://www.pscit.monash.edu.au/~yuliang/ The University

More information

Comments on "Generating and Counting Binary Bent Sequences"

Comments on Generating and Counting Binary Bent Sequences University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1994 Comments on "Generating and Counting Binary Bent Sequences" Claude

More information

Non-Separable Cryptographic Functions

Non-Separable Cryptographic Functions International Symposium on Information Theory and Its Applications Honolulu, Hawaii, USA, November 5 8, 2000 Non-Separable Cryptographic Functions Yuliang Zheng and Xian-Mo Zhang School of Network Computing

More information

On the Symmetric Property of Homogeneous Boolean Functions

On the Symmetric Property of Homogeneous Boolean Functions On the Symmetric Property of Homogeneous Boolean Functions Chengxin Qu, Jennifer Seberry, and Josef Pieprzyk Centre for Computer Security Research School of Information Technology and Computer Science

More information

Hadamard Matrices, Bent Functions and Cryptography. The University of Wollongong. Abstract

Hadamard Matrices, Bent Functions and Cryptography. The University of Wollongong. Abstract Hadamard Matrices, Bent Functions and Cryptography Jennifer Seberry and ian-mo Zhang Department of Computer Science The University of Wollongong Wollongong, NSW 5, AUSTRALIA E-mail: fj.seberry,xianmog@cs.uow.edu.au

More information

Pitfalls in designing substitution boxes

Pitfalls in designing substitution boxes University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1994 Pitfalls in designing substitution boxes Jennifer Seberry University

More information

arxiv:math/ v1 [math.co] 24 Oct 2000

arxiv:math/ v1 [math.co] 24 Oct 2000 arxiv:math/0010220v1 [math.co] 24 Oct 2000 Nonlinearity, Local and Global Avalanche Characteristics of Balanced Boolean Functions Abstract Pantelimon Stănică Auburn University Montgomery, Department of

More information

Nonlinearity and propagation characteristics of balanced boolean functions

Nonlinearity and propagation characteristics of balanced boolean functions University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1994 Nonlinearity and propagation characteristics of balanced boolean

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Algebraic nonlinearity and its applications to cryptography

Algebraic nonlinearity and its applications to cryptography Algebraic nonlinearity and its applications to cryptography Luke O Connor Department of Computer Science University of Waterloo, Ontario, Canada, NL 3G1 Andrew Klapper Department of Computer Science University

More information

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed

More information

Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion

Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1993 Highly nonlinear 0-1 balanced boolean functions satisfying strict

More information

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Some results concerning global avalanche characteristics of two q-ary functions

Some results concerning global avalanche characteristics of two q-ary functions Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand)

More information

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and An average case analysis of a dierential attack on a class of SP-networks Luke O'Connor Distributed Systems Technology Centre, and Information Security Research Center, QUT Brisbane, Australia Abstract

More information

Boolean functions in cryptography

Boolean functions in cryptography University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections Boolean functions in cryptography Cheng-Xin Qu University of Wollongong Recommended

More information

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev Abstract. Low degree annihilators for Boolean functions are of great interest in cryptology because of

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis

How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 How to Find the Sufficient Collision Conditions for Haval-128 Pass

More information

Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis

Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis J. Cryptology (1996) 9: 1 19 1996 International Association for Cryptologic Research Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis Howard M. Heys and Stafford E.

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

Perfect Secret Sharing Schemes from Room Squares

Perfect Secret Sharing Schemes from Room Squares University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1998 Perfect Secret Sharing Schemes from Room Squares G. R. Chaudhry University

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture

More information

On Existence and Invariant of Algebraic Attacks

On Existence and Invariant of Algebraic Attacks On Existence and Invariant of Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

Provable Security Against Differential and Linear Cryptanalysis

Provable Security Against Differential and Linear Cryptanalysis Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Aalto University School of Science and Nokia, Finland kaisa.nyberg@aalto.fi Abstract. In this invited talk, a brief survey on

More information

Hyper-bent Functions

Hyper-bent Functions Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

Some new constructions of orthogonal designs

Some new constructions of orthogonal designs University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 Some new constructions of orthogonal designs

More information

Minimal and Maximal Critical Sets in Room Squares

Minimal and Maximal Critical Sets in Room Squares University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1996 Minimal and Maximal Critical Sets in Room Squares Ghulam Rasool Chaudhry

More information

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions

More information

Dirichlet Product for Boolean Functions

Dirichlet Product for Boolean Functions Dirichlet Product for Boolean Functions Abderrahmane Nitaj 1, Willy Susilo 2 and Joseph Tonien 2 1 Laboratoire de Mathématiques Nicolas Oresme, Université de Caen Normandie, France 2 Centre for Computer

More information

Avalanche Characteristics of Substitution- Permutation Encryption Networks

Avalanche Characteristics of Substitution- Permutation Encryption Networks Avalanche Characteristics of Substitution- Permutation Encryption Networks Howard M. Heys and Stafford E. Tavares, member IEEE Abstract This paper develops analytical models for the avalanche characteristics

More information

Finding good differential patterns for attacks on SHA-1

Finding good differential patterns for attacks on SHA-1 Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University,

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

arxiv: v5 [cs.it] 4 Nov 2009

arxiv: v5 [cs.it] 4 Nov 2009 1 Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables WeiGuo ZHANG and GuoZhen XIAO ISN Lab, Xidian University, Xi an 710071, P.R.China arxiv:0905.0794v5 [cs.it]

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

Smart Hill Climbing Finds Better Boolean Functions

Smart Hill Climbing Finds Better Boolean Functions Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,

More information

Some matrices of Williamson type

Some matrices of Williamson type University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1973 Some matrices of Williamson type Jennifer Seberry University of Wollongong,

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity arxiv:cs/0605139v1 [cs.cr] 30 May 2006 Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity Na Li, Wen-Feng Qi Department of Applied Mathematics, Zhengzhou

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

The Analysis of affinely Equivalent Boolean Functions

The Analysis of affinely Equivalent Boolean Functions The Analysis of affinely Equivalent Boolean Functions Qing-shu Meng Min Yang Huan-guo Zhang Yuzhen Liu October 21, 2005 Abstract By Walsh transform, autocorrelation function, decomposition, derivation

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition) Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational

More information

Atypical usage of one-way hash functions for data integrityisasfollows. The hash-value corresponding to a particular message M is computed at time t 1

Atypical usage of one-way hash functions for data integrityisasfollows. The hash-value corresponding to a particular message M is computed at time t 1 A Fast Cryptographic Hash Function Based on Linear Cellular Automata over GF(q) Miodrag Mihaljevic 1, Yuliang Zheng 2 and Hideki Imai 3 1 Mathematical Institute, Serb. Acad. Sci. & Arts Kneza Mihaila 35,

More information

On Boolean functions which are bent and negabent

On Boolean functions which are bent and negabent On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra

More information

Haar Spectrum of Bent Boolean Functions

Haar Spectrum of Bent Boolean Functions Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

Boolean functions, Hadamard matrices, orthogonal designs applicable to security and communication

Boolean functions, Hadamard matrices, orthogonal designs applicable to security and communication University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2001 Boolean functions, Hadamard matrices, orthogonal designs applicable

More information

Towards Provable Security of Substitution-Permutation Encryption Networks

Towards Provable Security of Substitution-Permutation Encryption Networks Towards Provable Security of Substitution-Permutation Encryption Networks Zhi-Guo Chen and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University at Kingston, Ontario,

More information

VII Selected Topics. 28 Matrix Operations

VII Selected Topics. 28 Matrix Operations VII Selected Topics Matrix Operations Linear Programming Number Theoretic Algorithms Polynomials and the FFT Approximation Algorithms 28 Matrix Operations We focus on how to multiply matrices and solve

More information

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used

More information

K. T. Arasu Jennifer Seberry y. Wright State University and University ofwollongong. Australia. In memory of Derek Breach.

K. T. Arasu Jennifer Seberry y. Wright State University and University ofwollongong. Australia. In memory of Derek Breach. On Circulant Weighing Matrices K. T. Arasu Jennifer Seberry y Department of Mathematics and Statistics Department of Computer Science Wright State University and University ofwollongong Dayton, Ohio{45435

More information

On Welch-Gong Transformation Sequence Generators

On Welch-Gong Transformation Sequence Generators On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario

More information

Rank and Kernel of binary Hadamard codes.

Rank and Kernel of binary Hadamard codes. 1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member, IEEE, and

More information

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and

More information

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata

More information

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Ming Duan 12 and Xuejia Lai 1 1 Department of Computer Science and Engineering, Shanghai Jiao Tong University, China. 2 Basic Courses

More information

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4

More information

Heuristic Design of Cryptographically Strong Balanced Boolean Functions

Heuristic Design of Cryptographically Strong Balanced Boolean Functions Heuristic Design of Cryptographically Strong Balanced Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Center, Queensland University of Technology, GPO Box 2434,

More information

Revisit and Cryptanalysis of a CAST Cipher

Revisit and Cryptanalysis of a CAST Cipher 2017 3rd International Conference on Electronic Information Technology and Intellectualization (ICEITI 2017) ISBN: 978-1-60595-512-4 Revisit and Cryptanalysis of a CAST Cipher Xiao Zhou, Jingwei Li, Xuejia

More information

Maiorana-McFarland class: Degree optimization and algebraic properties

Maiorana-McFarland class: Degree optimization and algebraic properties Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,

More information

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, PP 1638-1651, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member,

More information

Perfect Algebraic Immune Functions

Perfect Algebraic Immune Functions Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, and Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, Beijing 100195, P. R. China meicheng.liu@gmail.com, zhangy@is.iscas.ac.cn,

More information

A construction of Boolean functions with good cryptographic properties

A construction of Boolean functions with good cryptographic properties A construction of Boolean functions with good cryptographic properties Jong H. Chung 1, Pantelimon Stănică 1, Chik-How Tan, and Qichun Wang 1 Department of Applied Mathematics, Naval Postgraduate School,

More information

The amicable-kronecker construction of quaternion orthogonal designs

The amicable-kronecker construction of quaternion orthogonal designs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2011 The amicable-kronecker construction of quaternion orthogonal designs

More information

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi 1,2, Lei Hu 1,2, Siwei Sun 1,2, Ling Song 1,2, Kexin Qiao 1,2, Xiaoshuang Ma 1,2 1 State Key Laboratory of Information

More information

Statistical and Linear Independence of Binary Random Variables

Statistical and Linear Independence of Binary Random Variables Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.

More information

S-box (Substitution box) is a basic component of symmetric

S-box (Substitution box) is a basic component of symmetric JOURNAL OF L A TEX CLASS FILES, VOL., NO., AUGUST 1 Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family Wentan Yi and Shaozhen Chen Abstract This paper investigates

More information

Computing the biases of parity-check relations

Computing the biases of parity-check relations Computing the biases of parity-check relations Anne Canteaut INRIA project-team SECRET B.P. 05 7853 Le Chesnay Cedex, France Email: Anne.Canteaut@inria.fr María Naya-Plasencia INRIA project-team SECRET

More information

Solution to Homework 1

Solution to Homework 1 Solution to Homework Sec 2 (a) Yes It is condition (VS 3) (b) No If x, y are both zero vectors Then by condition (VS 3) x = x + y = y (c) No Let e be the zero vector We have e = 2e (d) No It will be false

More information

Optimal XOR based (2,n)-Visual Cryptography Schemes

Optimal XOR based (2,n)-Visual Cryptography Schemes Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:

More information

Some approaches to construct MDS matrices over a finite field

Some approaches to construct MDS matrices over a finite field 2017 6 Å 31 Å 2 ¹ June 2017 Communication on Applied Mathematics and Computation Vol.31 No.2 DOI 10.3969/j.issn.1006-6330.2017.02.001 Some approaches to construct MDS matrices over a finite field BELOV

More information

Thesis Research Notes

Thesis Research Notes Thesis Research Notes Week 26-2012 Christopher Wood June 29, 2012 Abstract This week was devoted to reviewing some classical literature on the subject of Boolean functions and their application to cryptography.

More information

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies Dierential cryptanalysis o eistel ciphers and dierentially uniorm mappings Anne Canteaut INRIA Projet codes Domaine de Voluceau BP 105 78153 Le Chesnay Cedex rance Abstract In this paper we study the round

More information

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? Alexander Rostovtsev alexander. rostovtsev@ibks.ftk.spbstu.ru St. Petersburg State Polytechnic University Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? In [eprint.iacr.org/2009/117]

More information

Diffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty

Diffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty Information Systems International Conference (ISICO), 2 4 December 2013 Diffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty Rizki Yugitama, Bety Hayat Susanti,

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

Bose's method of differences applied to construct Bhaskar Rao designs

Bose's method of differences applied to construct Bhaskar Rao designs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1998 Bose's method of differences applied to construct Bhaskar Rao designs

More information

An Extended DES. National Chiao Tung University Hsinchu, 300 Taiwan

An Extended DES. National Chiao Tung University Hsinchu, 300 Taiwan JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 349-365 (2002) An Extended DES YI-SHIUNG YEH AND CHING-HUNG HSU * Institute of Computer Science and Information Engineering * Institute of Computer and

More information

On Construction of a Class of. Orthogonal Arrays

On Construction of a Class of. Orthogonal Arrays On Construction of a Class of Orthogonal Arrays arxiv:1210.6923v1 [cs.dm] 25 Oct 2012 by Ankit Pat under the esteemed guidance of Professor Somesh Kumar A Dissertation Submitted for the Partial Fulfillment

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

Correlation Attack to the Block Cipher RC5. and the Simplied Variants of RC6. 3 Fujitsu Laboratories LTD.

Correlation Attack to the Block Cipher RC5. and the Simplied Variants of RC6. 3 Fujitsu Laboratories LTD. Correlation Attack to the Block Cipher RC5 and the Simplied Variants of RC6 Takeshi Shimoyama 3, Kiyofumi Takeuchi y, Juri Hayakawa y 3 Fujitsu Laboratories LTD. 4-1-1 Kamikodanaka, Nakahara-ku, Kawasaki

More information

Generalized Correlation Analysis of Vectorial Boolean Functions

Generalized Correlation Analysis of Vectorial Boolean Functions Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02)

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02) Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 206, v 202) Contents 2 Matrices and Systems of Linear Equations 2 Systems of Linear Equations 2 Elimination, Matrix Formulation

More information

A matrix approach for constructing quadratic APN functions

A matrix approach for constructing quadratic APN functions Noname manuscript No (will be inserted by the editor) A matrix approach for constructing quadratic APN functions Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract We find a

More information

functions. E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS**

functions. E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS** Security Analysis of Cryptographic Algorithms by means of Boolean Functions E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS** * Department of Computer Science National Technical University of

More information

1 Matrices and Systems of Linear Equations

1 Matrices and Systems of Linear Equations Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 207, v 260) Contents Matrices and Systems of Linear Equations Systems of Linear Equations Elimination, Matrix Formulation

More information