Some results concerning global avalanche characteristics of two q-ary functions
|
|
- Alexia Stone
- 5 years ago
- Views:
Transcription
1 Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand) INDIA Abstract. The global avalanche characteristics criteria was first introduced by Zhou et al. (Inform. Sci. 180() (010) 56-65). This article is concerned with some new bounds on global avalanche characteristics of two -ary functions. Based on the above result we obtain a bound on σ f of f B n, in terms of σ f l s of the restricted functions on Z n 1, and construct a class of -ary bent functions from 1-plateaued functions having dijoint Walsh spectra. Keywords: -ary functions; Walsh-Hadamard spectrum (WHT); autocorrelation; -ary bent functions; GAC 1 Introduction Boolean have wide applications in several areas including coding theory, communication systems and cryptography, particularly in stream ciphers and block ciphers. The design of conventional cryptographic systems relies on two fundamental principles: confusion and diffusion, introduced by Shannon [1]. The strict avalanche criteria (SAC) [1, 1] and propagation characteristics (PC) [7] have been studied to measure the local properties of Boolean functions. These properties are closely related to diffusion. In order to study the global properties of a Boolean function, an another criterion: global avalanche characteristics (GAC) has been introduced by Zhang and Zheng [16]. Further, the lower/upper bounds on the two indicators: the sum-of-suares indicator σ f ( n σ f 3n ) and the absolute indicator f (0 f n ) also derived in the same article [16]. The lower bounds on these two indicators for balanced Boolean functions are studied in [14] by Son et al. In order to measure the global avalanche characteristics between any two Boolean functions, a new criterion: the global avalanche characteristics of two Boolean functions (including the sum-of-suares indicator σ f,g and the absolute indicator f,g ) has been proposed by Zhou et al. [18]. The tight lower and the tight upper bounds on the two indicators: 0 f,g n, ( C f,g (0) σ f,g 3n ) also derived in the same article. A subclass of -ary bent functions with optimal values of σ f,g and f,g is identified in Maiorana-McFarland class by Singh et al. [13, Thm. 4.4]. It is also demonstrated in the same article that σ f,g = n if f is -ary bent, the general bounds for SSMI and MI are presented. The SSMI of a -ary s-plateaued function f B n, is n+s [?]. Even the study on the relationship among σ g, σ f and σ f,g relationships of the sum-of-suares indicator between a -ary function and the decomposition -ary functions, etc is still open problem. Thus, based on the above discussion, the following uestions raised: a) What relationship exists among σ f, σ g and σ f,g for any two -ary functions f, g? b) What is a bound on σ f, and what is the link between σ f and σ fl (l Z ), where f = f 0 f 1... f 1? c) What is a construction method of balanced -ary functions with good cryptographic properties? This article present some new bounds on the two indicators: σ f,g and f,g. The relationship among σ f,g, σ f and σ g is also presented.based on the above result we obtain a bound on σ f of f B n, in terms of σ f l s of the restricted functions on Z n 1, and construct a class of -ary bent functions from 1-plateaued functions having dijoint Walsh spectra.
2 Basic definitions and notations Let Z denote the ring of integers modulo. A -ary function is a function from Z n to Z and B n, denotes the set of all such functions. Particularly, B n, = B n (for = ) denotes the set of classical Boolean functions on n variables. The Walsh Hadamard transform (WHT) of f B n, is a complex-valued function H f : Z n C defined as H f (u) = 1 ξ f(x)+ x,u, (.1) n/ x Z n where x, u denotes the usual inner product in Z n. It can be deduced that max{ H f (u) : u Z n } 1 for all f B n,. The set of values {H f (u) : u Z n } is referred to as the Walsh Hadamard spectrum (WHS) of the function f, which satisfies the Parseval s identity [6]: H f (u) = n. (.) u Z n The -ary functions with low absolute values of Walsh-Hadamard coefficients are of special interest in cryptography and coding theory and have many applications in different type of cryptosystems [6, 8, 11]. Kumar et al. [6] introduced the generalization of the notion classical bent Boolean function [8] and referred it as -ary bent function. The -ary function having flat WHS, in absolute, is said to be -ary bent function. A function f B n, is -ary bent if H f (u) = 1 for every u Z n [6, 15]. Alternatively, f is -ary bent if and only if C f (u) = 0 for all u Z n \ {0} [6, 13]. A function f B n, is said to be -ary m-plateaued if and and only if H f (u) = {0, m } for all u Z n. The -ary bent functions can be constructed using -ary m-plateaued functions [, 3]. The sum C f,g (u) = ζ f(x) g(x+u) (.3) x Z n is said to be cross-correlation between f, g B n, at u. In particular, for f = g the sum C f,f (u) = C f (u) is said to be autocorrelation of f at u. Recently, two indicators: the sum-of-suares-modulus indicator (SSMI) σ f,g and the modulus indicator(mi) f,g between two -ary functions f, g B n, [13] are defined by σ f,g = u Z n In particular, the SSMI σ f and MI f of a function f B n, is defined by σ f = u Z n C f,g (u), and f,g = max C f,g (u). (.4) u Z n C f (u), and f = max u Z n \{0} C f (u). (.5) Further analysis their properties are also discussed in the same article. In the following corollary, we summarise the properties discussed in [13,?] which we use to deduce our results. Corollary 1. [13] If f, g B n,, then (a) e Z n C f,g(e) ξ < e, y> = n H f (y)h g (y); and C f,g (e) = y Z n H f (y)h g (y) ξ <e, y>. (b) C f (e) = y Z H n f (y) ξ <e,y> ; and e Z C n f (e) ξ < e, y> = n H f (y). Corollary. [?] If f, g B n, and v Z n, then (a) a Z C n f (a)c g (a)ξ a,v = n u Z H n f (u) H g (u + v). (b) σ f,g = n u Z H n f (u) H g (u) ; and σ f = n u Z H n f (u) 4.
3 3 The new Bounds on σ f,g and δ f,g The proof of [0, Theorem 3.] is obtained for = is very complicated. We provide an alternative proof of the generalization of [0, Theorem 3.] for -ary functions in the following Theorem 1. Let f, g B n,, then σ f,g σ f σ g. (3.1) Proof. Let f, g B n,. Since the Cauchy-Schwarz ineuality for any two vectors x = (x 1, x,..., x n ), y = (y 1, y,..., y n ) R n states that ( n n ) 1 ( ) n 1 x i y i (3.) Therefore, i=1 i=1 x i σ f,g = H f (u) H g (u) i=1 x i u Z n 1 H f (u) 4 H g (u) 4 1 = σ f σ g. (3.3) u Z n u Z n Further, the ineuality ab a+b holds for any two positive real number a, b. Hence we have Corollary 3 below, is the generalization of Theorem 1 of [19] (obtained for = ). Corollary 3. Let f, g B n,, then 0 σ f,g σ f + σ g. (3.4) Let us define f v (x n r,..., x 1 ) = f(x n = v r,..., x n r+1 = v 1, x n r,..., x 1 ) for any v = (v r,..., v 1 ). The following results is obtained by Singh et al [13] Lemma 1. [13, Lemma 3.1] If u Z r, w Z n r and f B n,, then autocorrelation of f at uv is given by C f (uw) = v Z r C fv,f v u (w), where uw is the vector concatenation of u = (u r,..., u 1 ) Z r uw = (u, w) = (u r,..., u 1, w n r,..., w 1 ). and w = (w n r,..., w 1 ) Z n r defined by In the following theorem, we provide a relationship among σ f of f B n, and their restrictions (decomposition -ary functions) f l B n 1,, l {0, 1,..., 1}. Theorem. Let f l B n 1, (l = 0, 1,..., 1), and if a -ary function f : Z Z n 1 Z is expressed by f = f 0 f 1... f 1, i.e., f(x, x n ) = f xn (x), for all x Z n, x n Z. (3.5) Then whenever σ f = σ f0 + σ f σ f =i<j<, C fi,f j (w)c fk,f l (w) = 0 for all i, j, k, l Z such that i k and j l. (3.6)
4 Proof. It is evident that σ f,g = u Z n C f,g(u) = v Z n C f (v)c g (v) for all f, g B n,, see [13, Cor. 4.6]. Let f l B n 1, (l = 0, 1,..., 1) such that and j l, then C fi,f j (w)c fk,f l (w) = 0 for all i, j, k, l Z such that i k σ f = C f (uw) = C fl,f l+u C fz,f z+u u Z u Z l Z z Z = C fl (w)c fz (w) + C fl,f l+u (w)c fz,f z+u l Z z Z u 0 = σ fl,f z + C fl,f l+u (w)c fz,f z+u l Z z Z 1 = σ fi + i=0 1 = σ fi + i=0 1 = σ fi + 4 i=0 which completes the proof. u 0 l Z z Z 0=i<j< + u 0 0=i<j< + u 0 0=i<j<, l Z + u 0 l z,z Z l Z σ fl,f l+u C fl,f l+u (w) C fl,f l+u (w)c fz,f z+u It is to be noted that the smaller value of σ f (i.e., for better GAC) of f correspond to low values of the autocorrelation spectrum of f [16]. From Theorem it is evident that the decomposition of -ary function is important to construct -ary functions with good GAC. Two functions f, g B n, are said to be perfectly uncorrelated if C f,g (u) = 0 for all u Z n. Further, if H f (u)h g (u) = 0 for all u Z n for all u Z n, then f, g are said to be -ary functions with disjoint WHS. It can be seen that two functions with disjoint WHS are always perfectly uncorrelated. These properties are widely used in binary case to construct highly nonlinear balance Boolean functions with good GAC, see [10] and the references therein. The following results are conseuence of Theorem Corollary 4. Let f be a -ary function as defined in (3.5), then 1. σ f = σ f0 + σ f σ f 1 if and only if f i, f j are perfectly uncorrelated for all i j, i, j {0, 1,..., 1}.. 1 i=0 σ f i σ f 1 i=0 σ f i + 4 0=i<j< σ f i,f j. Thus, the concatenated function have minimum SSMI if their decomposition -ary functions are pairwise perfectly uncorrelated. The following are some constructions of -ary functions smaller values for σ f and f. Lemma. Let l be a non negative integer and z l Z m be any fixed vector. Define a -ary function f l : Z n m Z m Z by f l (x, y) = g l (x) + z l, y for all x Z n m, y Z m, (3.8) where g zl B n m,. Then (a) H fl (u, v) = m H gl (u)δ 0 (z + v), where δ 0 (u) = 0 if u 0 and δ 0 (0) = 1. (3.7)
5 (b) H f1 (u, v)h f (u, v) = 0 for all (u, v) Z n m Z m, whenever z 1 z, (c) σ fl = 3m σ gl, (d) If g zl is a -ary bent, then σ fl = n+m and H fl (u, v) = m δ 0 (z + v), that is, f l is m-plateaued -ary function. Proof. Let (u, v) Z n m Z m. Then, H fl (u, v) = 1 n = 1 n (x,y) Z n m Z m x Z n m ζ g l(x)+ u,x ζ f l(x,y)+ u,x + v,y y Z m ζ z l+v,y = m Hgl (u)δ 0 (v + z l ) (3.9) Part (b) follows from the property δ 0 (x)δ 0 (y) = 0 if x y and part (a). Now, using (3.9), we have σ fl = n = n (u,v) Z n m Z m u Z n m v Z m ( m H fl (u, v) 4 ) 4 Hgl (u) 4 δ 0 (v + z l ) = n+m u Z n m H gl (u) 4 = 3m σ gl. Further, if g l -ary is bent, then σ gl = (n m) and H gl (u) = 1 for all u. Hence part (d) follows from part (a) and (c). The following is the construction of (m 1)-plateaued -ary function in n + 1 variables by m-plateaued -ary function in n variables. Construction 1. Let t = n + 1, z l Z m for l {0, 1,..., 1} such that z i z j for all i j. Define a -ary function f : Z n m Z m Z Z by f(x, y, x t ) = f xt (x, y), (3.10) where f l are -ary m-plateaued functions as constructed in (3.8). Then f is (m 1)-plateaued. Theorem 3. Let f B t, as defined in Construction 1, then σ f = t (m 1), that is f is (m 1)-plateaued -ary function. Proof. Since H fi (u, v)h fj (u, v) = 0 for (u, v) Z n m Z m whenever i j and i, j {0, 1,..., 1}. This implies that C fi,f j (u, v) = 0 for all (u, v) Z n m Z m, that is f i, f j are perfectly uncorrelated for all i j. Hence by using Corollary 4 which completes the proof. σ f = n+m+1 = t+(m 1), (3.11) 4 Conclusion The article presents an upper bound on the two indicators: σ f,g and f,g of two -ary functions f and g. A relationship among σ f,g, σ f and σ g is also presented. Based on the above result we obtain a bound on σ f of f B n, in terms of σ f l s of the restricted functions on Z n 1, and construct a class of -ary bent functions from 1-plateaued functions having dijoint Walsh spectra.
6 References 1. C. M. Adams and S. E. Tavers, Generating and counting binary bent seuences, IEEE Trans. Inform. Theory 36 (5) (1990) A. Çeşmelioğlu and W. Meidl, Bent functions of maximal degree, IEEE Trans. Inform. Theory, 58 () (01), pp A. Çeşmelioğlu and W. Meidl, A construction of bent functions from plateaued functions, Des. Codes Cryptogr., 66 (013), pp T. Helleseth, P. V. Kumar, Seuences with Low Correlation, In Handbook of Coding Theory, North-Holland, Amsterdam, (1998), pp X. Hou, -ary bent functions constructed from chain rings, Finite Fields and Applications, 4 (1998), pp P. V. Kumar, R. A. Scholtz, L. R. Welch, Generalized bent functions and their properties, Journal of Combinatoirial Theory, Ser. A 1(40) (1985), pp B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts and J. Vandewalle, Propagation characteristics of Boolean functions, in Advances in Cryptology-Eurocrypt 90, LNCS 437 Springer (1991) O. S. Rothaus, On bent functions, J. Combin. Theory, Ser. A 0 (1976) P. Sarkar and S. Maitra, Constructions of nonlinear Boolean functions with important cryptographic properties, In Advances in Cryptology-Eurocrypt 000, LNCS 1807, Springer (008) P. Sarkar and S. Maitra, Cross-correlation analysis of cryptographically useful Boolean functions, Theory of Computing Systems 35 (00) K-U. Schmidt, Quaternary constant-amplitude codes for multicode CDMA, IEEE Trans. on Inform. Theory, 55 (4)(009) C. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 8 (1949) D. Singh, M. Bhaintwal, B. K. Singh, Some results on -ary bent functions, Int. J. Comput. Math. DOI: / J.J. Son, J. I. Lim, S. Chee and S. H. Sung, Global avalanche characteristics and nonlinearity of balanced Boolean functions, Inform. Proc. Lett. 65 (1998) N. Tokareva, Generalizations of bent functions: A survey, J. Appl. Indust. Math. 5(1) (011) X. M. Zhang and Y. Zheng, GAC-The criterion for global acalanche criteria of cryptographic functions, J. Uni. Comput. Sci. 1(5) (1995) Y. Zheng and X. M. Zhang, Relationship between bent functions and complementary plateaued functions, LNCS 1787 (1999) Y. Zhou, M. Xie and G. Xiao, On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity, Inform. Sci. 180 (010) Y. Zhou, X. Dong, W. Zhang and B. Zeng, New bounds on the sum-of-suares indicator, 7th International Conference on Communications and Networking, CHINACOM-01 China, Y. Zhou, W. Zhang, S. Zhu and G. Xiao, The global avalanche characteristics of two Boolean functions and algebraic immunity, Int. J. Comput. Math. 89(16) (01) A. F. Webster, Plaintext/ciphertext bit dependencies in cryptographic systems, Master s Thesis, Department of Electrical Engineering, Queen s University, Ontario, Canada, 1985.
Some properties of q-ary functions based on spectral analysis
Some properties of q-ary functions based on spectral analysis Deep Singh and Maheshanand Bhaintwal Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee 247667 INDIA deepsinghspn@gmail.com,mahesfma@iitr.ernet.in
More informationarxiv:math/ v1 [math.co] 24 Oct 2000
arxiv:math/0010220v1 [math.co] 24 Oct 2000 Nonlinearity, Local and Global Avalanche Characteristics of Balanced Boolean Functions Abstract Pantelimon Stănică Auburn University Montgomery, Department of
More informationComplete characterization of generalized bent and 2 k -bent Boolean functions
Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean
More informationMaximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer
More informationNon-Separable Cryptographic Functions
International Symposium on Information Theory and Its Applications Honolulu, Hawaii, USA, November 5 8, 2000 Non-Separable Cryptographic Functions Yuliang Zheng and Xian-Mo Zhang School of Network Computing
More informationThird-order nonlinearities of some biquadratic monomial Boolean functions
Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this
More informationOn Cryptographic Properties of the Cosets of R(1;m)
1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract
More informationOn the Symmetric Property of Homogeneous Boolean Functions
On the Symmetric Property of Homogeneous Boolean Functions Chengxin Qu, Jennifer Seberry, and Josef Pieprzyk Centre for Computer Security Research School of Information Technology and Computer Science
More informationFast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function
Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions
More informationarxiv: v5 [cs.it] 4 Nov 2009
1 Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables WeiGuo ZHANG and GuoZhen XIAO ISN Lab, Xidian University, Xi an 710071, P.R.China arxiv:0905.0794v5 [cs.it]
More informationGeneralized hyper-bent functions over GF(p)
Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G
More informationNew Constructions for Resilient and Highly Nonlinear Boolean Functions
New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationSmart Hill Climbing Finds Better Boolean Functions
Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,
More informationConstruction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4
More informationA Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture
More informationWell known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne
Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,
More information1-Resilient Boolean Function with Optimal Algebraic Immunity
1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn
More informationHaar Spectrum of Bent Boolean Functions
Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationCryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur
Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed
More informationOn Boolean functions which are bent and negabent
On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra
More informationTowards Provable Security of Substitution-Permutation Encryption Networks
Towards Provable Security of Substitution-Permutation Encryption Networks Zhi-Guo Chen and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University at Kingston, Ontario,
More informationBalanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata
More informationA New Class of Bent Negabent Boolean Functions
A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com
More informationProvable Security Against Differential and Linear Cryptanalysis
Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Aalto University School of Science and Nokia, Finland kaisa.nyberg@aalto.fi Abstract. In this invited talk, a brief survey on
More informationHeuristic Design of Cryptographically Strong Balanced Boolean Functions
Heuristic Design of Cryptographically Strong Balanced Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Center, Queensland University of Technology, GPO Box 2434,
More informationCOUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS
italian journal of pure and applied mathematics n. 37 2017 (173 182) 173 COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS Shashi Kant Pandey Department of Mathematics University
More informationStructures of cryptographic functions with strong avalanche characteristics
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1995 Structures of cryptographic functions with strong avalanche characteristics
More informationBalanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More informationA New Characterization of Semi-bent and Bent Functions on Finite Fields
A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department
More informationThe Analysis of affinely Equivalent Boolean Functions
The Analysis of affinely Equivalent Boolean Functions Qing-shu Meng Min Yang Huan-guo Zhang Yuzhen Liu October 21, 2005 Abstract By Walsh transform, autocorrelation function, decomposition, derivation
More informationnonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equa
Upper bounds on the numbers of resilient functions and of bent functions Claude Carlet 1 and Andrew Klapper 2 1 INRIA projet CODES, B.P. 105, 78153 Le Chesnay Cedex- France. Claude.Carlet@inria.fr 2 Dept.
More informationAlgebraic nonlinearity and its applications to cryptography
Algebraic nonlinearity and its applications to cryptography Luke O Connor Department of Computer Science University of Waterloo, Ontario, Canada, NL 3G1 Andrew Klapper Department of Computer Science University
More informationGeneralized Correlation Analysis of Vectorial Boolean Functions
Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,
More informationBoolean functions in cryptography
University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections Boolean functions in cryptography Cheng-Xin Qu University of Wollongong Recommended
More informationUniversity of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center
University of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center A DATABASE FOR BOOLEAN FUNCTIONS AND CONSTRUCTIONS OF GENERALIZED COMPLEMENTARY PAIRS by Mohamed
More information9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class
9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class Selçuk Kavut and Melek Diker Yücel arxiv:0808.0684v1 [cs.cr] 5 Aug 2008 Abstract In 2006, 9-variable Boolean functions
More informationCharacterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree
Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree 1 Wei Su Alexander Pott and Xiaohu Tang arxiv:105.6568v1 [cs.it] 30 May 01 Abstract We present
More informationA construction of Boolean functions with good cryptographic properties
A construction of Boolean functions with good cryptographic properties Jong H. Chung 1, Pantelimon Stănică 1, Chik-How Tan, and Qichun Wang 1 Department of Applied Mathematics, Naval Postgraduate School,
More informationAutomorphism group of the set of all bent functions
Automorphism group of the set of all bent functions Natalia N. Tokareva 1 Sobolev Institute of Mathematics, Novosibirsk State University, Novosibirsk, Russian Federation e-mail: tokareva@math.nsc.ru Abstract.
More informationAnalysis of Some Quasigroup Transformations as Boolean Functions
M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference
More informationBENT POLYNOMIALS OVER FINITE FIELDS
BENT POLYNOMIALS OVER FINITE FIELDS ROBERT S COULTER AND REX W MATTHEWS Abstract. The definition of bent is redefined for any finite field. Our main result is a complete description of the relationship
More informationMaiorana-McFarland class: Degree optimization and algebraic properties
Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,
More informationSearching for Cost Functions
Searching for Cost Functions John A. Clark, Jeremy L. Jacob, Susan Stepney Dept. of Computer Science, University of York, Heslington, York, YO10 5DD, UK Email: [jac,jeremy,susan]@cs.york.ac.uk Abstract
More informationSubstitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis
J. Cryptology (1996) 9: 1 19 1996 International Association for Cryptologic Research Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis Howard M. Heys and Stafford E.
More informationOn the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010
Introduction Boolean functions 2nd order nonlinearity Summary ARXH PROSTASIAS_APOLOGISMOS 2010.indd 1 20/04/2011 12:54 ΜΜ On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ
More informationGENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay
Volume X, No. 0X, 0xx, X XX doi:0.3934/amc.xx.xx.xx GENERALIZED NONLINEARITY OF -BOXE ugata Gangopadhyay Department of Computer cience and Engineering, Indian Institute of Technology Roorkee, Roorkee 47667,
More informationSELF DUAL BENT FUNCTIONS
Boolean Functions: Cryptography and Applications Fonctions Booléennes : Cryptographie & Applications BFCA 08 SELF DUAL BENT FUNCTIONS Claude Carlet 1, Lars Eirik Danielsen 2, Matthew Geoffrey Parker 2
More informationOn values of vectorial Boolean functions and related problems in APN functions
On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:
More informationStatistical and Linear Independence of Binary Random Variables
Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.
More informationOn the normality of p-ary bent functions
Noname manuscrit No. (will be inserted by the editor) On the normality of -ary bent functions Ayça Çeşmelioğlu Wilfried Meidl Alexander Pott Received: date / Acceted: date Abstract In this work, the normality
More informationBent Functions of maximal degree
IEEE TRANSACTIONS ON INFORMATION THEORY 1 Bent Functions of maximal degree Ayça Çeşmelioğlu and Wilfried Meidl Abstract In this article a technique for constructing -ary bent functions from lateaued functions
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationHadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used
More informationThe primary aim of this paper is to introduce a new class of functions to facilitate the design of cryptographically good functions. It turns out that
Plateaued Functions Yuliang Zheng 1 and Xian-Mo Zhang 1 Monash University, Frankston, Melbourne, VIC 3199, Australia yuliang.zheng@monash.edu.au, http://www.pscit.monash.edu.au/~yuliang/ The University
More informationConstruction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity
arxiv:cs/0605139v1 [cs.cr] 30 May 2006 Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity Na Li, Wen-Feng Qi Department of Applied Mathematics, Zhengzhou
More informationS-box (Substitution box) is a basic component of symmetric
JOURNAL OF L A TEX CLASS FILES, VOL., NO., AUGUST 1 Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family Wentan Yi and Shaozhen Chen Abstract This paper investigates
More informationConstructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member, IEEE, and
More informationAUTOMATED CREATION AND SELECTION OF CRYPTOGRAPHIC PRIMITIVES
FACULTY OF ENGINEERING THESIS SUBMITTED FOR THE PROGRAMME MASTER OF ARTIFICIAL INTELLIGENCE ACADEMIC YEAR 2005-2006 KATHOLIEKE UNIVERSITEIT LEUVEN AUTOMATED CREATION AND SELECTION OF CRYPTOGRAPHIC PRIMITIVES
More informationTransform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and
Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565
More informationDiffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty
Information Systems International Conference (ISICO), 2 4 December 2013 Diffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty Rizki Yugitama, Bety Hayat Susanti,
More informationMaiorana McFarland Functions with High Second Order Nonlinearity
Maiorana McFarland Functions with High Second Order Nonlinearity Nicholas Kolokotronis 1 and Konstantinos Limniotis 2,3 1 Department of Computer Science and Technology University of Peloponnese End of
More informationConstruction of Some New Classes of Boolean Bent Functions and Their Duals
International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals
More informationEnumeration of Bent Boolean Functions by Reconfigurable Computer
Enumeration of Bent Boolean Functions by Reconfigurable Computer J. L. Shafer S. W. Schneider J. T. Butler P. Stănică ECE Department Department of ECE Department of Applied Math. US Naval Academy Naval
More informationConstructions of bent functions and difference sets KAISA NYBERG. University of Helsinki and Finnish Defence Forces
Constructions of bent functions and difference sets KAISA NYBERG University of Helsinki and Finnish Defence Forces 1. Introduction. Based on the work of Rothaus 1121, Olsen, Scholtz and Welch suggested
More informationOn the Linear Complexity of Feedback Registers
On the Linear Complexity of Feedback Registers (extended abstract) A. H. Chan M. Goresky A. Klapper ru ortheastern University College of Computer Science 360 Huntington Ave. Boston, MA, 02113 ABSTRACT
More informationDirichlet Product for Boolean Functions
Dirichlet Product for Boolean Functions Abderrahmane Nitaj 1, Willy Susilo 2 and Joseph Tonien 2 1 Laboratoire de Mathématiques Nicolas Oresme, Université de Caen Normandie, France 2 Centre for Computer
More informationarxiv: v1 [math.co] 6 Jan 2019
BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS arxiv:1901.02359v1 [math.co] 6 Jan 2019 DANIELE BARTOLI, MARIA MONTANUCCI, AND GIOVANNI ZINI Abstract. We provide constructions of bent functions
More informationOn the k-error linear complexity for p n -periodic binary sequences via hypercube theory
1 On the k-error linear complexity for p n -periodic binary sequences via hypercube theory Jianqin Zhou Department of Computing, Curtin University, Perth, WA 6102 Australia Computer Science School, Anhui
More informationOn The Nonlinearity of Maximum-length NFSR Feedbacks
On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main
More information6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012
6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 9, SEPTEMBER 2012 A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Fellow,
More informationfunctions. E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS**
Security Analysis of Cryptographic Algorithms by means of Boolean Functions E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS** * Department of Computer Science National Technical University of
More informationDPA Attacks and S-Boxes
DPA Attacks and S-Boxes Emmanuel Prouff Oberthur Card Systems 5 rue Auguste Blanche, 9800 Puteaux, France e.prouff@oberthurcs.com Abstract. For the power consumption model called Hamming weight model,
More informationA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION Claudia Peerez Ruisanchez Universidad Autonoma del Estado de Morelos ABSTRACT In this paper is proposed a new algorithm to construct S-Boxes over
More informationCharacterizations on Algebraic Immunity for Multi-Output Boolean Functions
Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong 1, and Mingsheng Wang 3 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China. Graduate School
More informationConstructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, PP 1638-1651, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member,
More informationProvable Security Against Differential and Linear Cryptanalysis
Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University Introduction CRADIC Linear Hull SPN and Two Strategies Highly
More informationHyper-bent Functions
Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca
More informationIN this paper, we exploit the information given by the generalized
4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by
More informationConstructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date
More informationConstruction of Nonlinear Boolean Functions with Important Cryptographic Properties
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties Palash Sarkar 1 and Subhamoy Maitra 2 1 Applied Statistics Unit, Indian Statistical Institute 203, B T Road, Calcutta
More informationCONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial
More informationOn the Arithmetic Walsh Coefficients of Boolean Functions
Designs, Codes, and Cryptography manuscript No. (will be inserted by the editor) On the Arithmetic Walsh Coefficients of Boolean Functions Claude Carlet Andrew Klapper Received: date / Accepted: date Abstract
More informationarxiv: v1 [cs.dm] 20 Jul 2009
New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University
More informationDesign of Pseudo-Random Spreading Sequences for CDMA Systems
Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,
More informationAlmost Boolean Functions: the Design of Boolean Functions by Spectral Inversion
Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion John A Clark and Jeremy L Jacob Department of Computer Science University of York York, YO10 5DD, UK {jac,jeremy}@cs.york.ac.uk
More informationQuadratic Equations from APN Power Functions
IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon
More informationAvalanche Characteristics of Substitution- Permutation Encryption Networks
Avalanche Characteristics of Substitution- Permutation Encryption Networks Howard M. Heys and Stafford E. Tavares, member IEEE Abstract This paper develops analytical models for the avalanche characteristics
More informationHeriot-Watt University
Heriot-Watt University Heriot-Watt University Research Gateway New constructions of resilient functions with strictly almost optimal nonlinearity via nonoverlap spectra functions Wei, Yongzhuang; Pasalic,
More informationComputing the biases of parity-check relations
Computing the biases of parity-check relations Anne Canteaut INRIA project-team SECRET B.P. 05 7853 Le Chesnay Cedex, France Email: Anne.Canteaut@inria.fr María Naya-Plasencia INRIA project-team SECRET
More informationNew Construction of Single Cycle T-function Families
New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is
More informationNew Families of Triple Error Correcting Codes with BCH Parameters
New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract
More informationOn Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA
On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA Kenneth G. Paterson, Member, IEEE Abstract Codes which reduce the peak-to-average power PAPR) in multi-code code division multiple access
More informationOn the Correlation Distribution of Delsarte Goethals Sequences
On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set
More informationCryptographic Properties of the Hidden Weighted Bit Function
Cryptographic Properties of the Hidden Weighted Bit Function Qichun Wang a, Claude Carlet b, Pantelimon Stănică c, Chik How Tan a a Temasek Laboratories, National University of Singapore, 117411, Singapore.
More informationImproved Zero-sum Distinguisher for Full Round Keccak-f Permutation
Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Ming Duan 12 and Xuejia Lai 1 1 Department of Computer Science and Engineering, Shanghai Jiao Tong University, China. 2 Basic Courses
More informationPerfect Algebraic Immune Functions
Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, and Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, Beijing 100195, P. R. China meicheng.liu@gmail.com, zhangy@is.iscas.ac.cn,
More informationImprovements to Correlation Attacks Against Stream. Ciphers with Nonlinear Combiners. Brian Stottler Elizabethtown College
Improvements to Correlation Attacks Against Stream Ciphers with Nonlinear Combiners Brian Stottler Elizabethtown College Spring 2018 1 Background 1.1 Stream Ciphers Throughout the multi-thousand year history
More informationOn Hardware Implementation of Tang-Maitra Boolean Functions
On Hardware Implementation of Tang-Maitra Boolean Functions Mustafa Khairallah 1, Anupam Chattopadhyay 1, Bimal Mandal 2, and Subhamoy Maitra 2 1 Nanyang Technological University, Singapore. mustafam001@e.ntu.edu.sg,
More information