Some results concerning global avalanche characteristics of two q-ary functions

Size: px
Start display at page:

Download "Some results concerning global avalanche characteristics of two q-ary functions"

Transcription

1 Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand) INDIA Abstract. The global avalanche characteristics criteria was first introduced by Zhou et al. (Inform. Sci. 180() (010) 56-65). This article is concerned with some new bounds on global avalanche characteristics of two -ary functions. Based on the above result we obtain a bound on σ f of f B n, in terms of σ f l s of the restricted functions on Z n 1, and construct a class of -ary bent functions from 1-plateaued functions having dijoint Walsh spectra. Keywords: -ary functions; Walsh-Hadamard spectrum (WHT); autocorrelation; -ary bent functions; GAC 1 Introduction Boolean have wide applications in several areas including coding theory, communication systems and cryptography, particularly in stream ciphers and block ciphers. The design of conventional cryptographic systems relies on two fundamental principles: confusion and diffusion, introduced by Shannon [1]. The strict avalanche criteria (SAC) [1, 1] and propagation characteristics (PC) [7] have been studied to measure the local properties of Boolean functions. These properties are closely related to diffusion. In order to study the global properties of a Boolean function, an another criterion: global avalanche characteristics (GAC) has been introduced by Zhang and Zheng [16]. Further, the lower/upper bounds on the two indicators: the sum-of-suares indicator σ f ( n σ f 3n ) and the absolute indicator f (0 f n ) also derived in the same article [16]. The lower bounds on these two indicators for balanced Boolean functions are studied in [14] by Son et al. In order to measure the global avalanche characteristics between any two Boolean functions, a new criterion: the global avalanche characteristics of two Boolean functions (including the sum-of-suares indicator σ f,g and the absolute indicator f,g ) has been proposed by Zhou et al. [18]. The tight lower and the tight upper bounds on the two indicators: 0 f,g n, ( C f,g (0) σ f,g 3n ) also derived in the same article. A subclass of -ary bent functions with optimal values of σ f,g and f,g is identified in Maiorana-McFarland class by Singh et al. [13, Thm. 4.4]. It is also demonstrated in the same article that σ f,g = n if f is -ary bent, the general bounds for SSMI and MI are presented. The SSMI of a -ary s-plateaued function f B n, is n+s [?]. Even the study on the relationship among σ g, σ f and σ f,g relationships of the sum-of-suares indicator between a -ary function and the decomposition -ary functions, etc is still open problem. Thus, based on the above discussion, the following uestions raised: a) What relationship exists among σ f, σ g and σ f,g for any two -ary functions f, g? b) What is a bound on σ f, and what is the link between σ f and σ fl (l Z ), where f = f 0 f 1... f 1? c) What is a construction method of balanced -ary functions with good cryptographic properties? This article present some new bounds on the two indicators: σ f,g and f,g. The relationship among σ f,g, σ f and σ g is also presented.based on the above result we obtain a bound on σ f of f B n, in terms of σ f l s of the restricted functions on Z n 1, and construct a class of -ary bent functions from 1-plateaued functions having dijoint Walsh spectra.

2 Basic definitions and notations Let Z denote the ring of integers modulo. A -ary function is a function from Z n to Z and B n, denotes the set of all such functions. Particularly, B n, = B n (for = ) denotes the set of classical Boolean functions on n variables. The Walsh Hadamard transform (WHT) of f B n, is a complex-valued function H f : Z n C defined as H f (u) = 1 ξ f(x)+ x,u, (.1) n/ x Z n where x, u denotes the usual inner product in Z n. It can be deduced that max{ H f (u) : u Z n } 1 for all f B n,. The set of values {H f (u) : u Z n } is referred to as the Walsh Hadamard spectrum (WHS) of the function f, which satisfies the Parseval s identity [6]: H f (u) = n. (.) u Z n The -ary functions with low absolute values of Walsh-Hadamard coefficients are of special interest in cryptography and coding theory and have many applications in different type of cryptosystems [6, 8, 11]. Kumar et al. [6] introduced the generalization of the notion classical bent Boolean function [8] and referred it as -ary bent function. The -ary function having flat WHS, in absolute, is said to be -ary bent function. A function f B n, is -ary bent if H f (u) = 1 for every u Z n [6, 15]. Alternatively, f is -ary bent if and only if C f (u) = 0 for all u Z n \ {0} [6, 13]. A function f B n, is said to be -ary m-plateaued if and and only if H f (u) = {0, m } for all u Z n. The -ary bent functions can be constructed using -ary m-plateaued functions [, 3]. The sum C f,g (u) = ζ f(x) g(x+u) (.3) x Z n is said to be cross-correlation between f, g B n, at u. In particular, for f = g the sum C f,f (u) = C f (u) is said to be autocorrelation of f at u. Recently, two indicators: the sum-of-suares-modulus indicator (SSMI) σ f,g and the modulus indicator(mi) f,g between two -ary functions f, g B n, [13] are defined by σ f,g = u Z n In particular, the SSMI σ f and MI f of a function f B n, is defined by σ f = u Z n C f,g (u), and f,g = max C f,g (u). (.4) u Z n C f (u), and f = max u Z n \{0} C f (u). (.5) Further analysis their properties are also discussed in the same article. In the following corollary, we summarise the properties discussed in [13,?] which we use to deduce our results. Corollary 1. [13] If f, g B n,, then (a) e Z n C f,g(e) ξ < e, y> = n H f (y)h g (y); and C f,g (e) = y Z n H f (y)h g (y) ξ <e, y>. (b) C f (e) = y Z H n f (y) ξ <e,y> ; and e Z C n f (e) ξ < e, y> = n H f (y). Corollary. [?] If f, g B n, and v Z n, then (a) a Z C n f (a)c g (a)ξ a,v = n u Z H n f (u) H g (u + v). (b) σ f,g = n u Z H n f (u) H g (u) ; and σ f = n u Z H n f (u) 4.

3 3 The new Bounds on σ f,g and δ f,g The proof of [0, Theorem 3.] is obtained for = is very complicated. We provide an alternative proof of the generalization of [0, Theorem 3.] for -ary functions in the following Theorem 1. Let f, g B n,, then σ f,g σ f σ g. (3.1) Proof. Let f, g B n,. Since the Cauchy-Schwarz ineuality for any two vectors x = (x 1, x,..., x n ), y = (y 1, y,..., y n ) R n states that ( n n ) 1 ( ) n 1 x i y i (3.) Therefore, i=1 i=1 x i σ f,g = H f (u) H g (u) i=1 x i u Z n 1 H f (u) 4 H g (u) 4 1 = σ f σ g. (3.3) u Z n u Z n Further, the ineuality ab a+b holds for any two positive real number a, b. Hence we have Corollary 3 below, is the generalization of Theorem 1 of [19] (obtained for = ). Corollary 3. Let f, g B n,, then 0 σ f,g σ f + σ g. (3.4) Let us define f v (x n r,..., x 1 ) = f(x n = v r,..., x n r+1 = v 1, x n r,..., x 1 ) for any v = (v r,..., v 1 ). The following results is obtained by Singh et al [13] Lemma 1. [13, Lemma 3.1] If u Z r, w Z n r and f B n,, then autocorrelation of f at uv is given by C f (uw) = v Z r C fv,f v u (w), where uw is the vector concatenation of u = (u r,..., u 1 ) Z r uw = (u, w) = (u r,..., u 1, w n r,..., w 1 ). and w = (w n r,..., w 1 ) Z n r defined by In the following theorem, we provide a relationship among σ f of f B n, and their restrictions (decomposition -ary functions) f l B n 1,, l {0, 1,..., 1}. Theorem. Let f l B n 1, (l = 0, 1,..., 1), and if a -ary function f : Z Z n 1 Z is expressed by f = f 0 f 1... f 1, i.e., f(x, x n ) = f xn (x), for all x Z n, x n Z. (3.5) Then whenever σ f = σ f0 + σ f σ f =i<j<, C fi,f j (w)c fk,f l (w) = 0 for all i, j, k, l Z such that i k and j l. (3.6)

4 Proof. It is evident that σ f,g = u Z n C f,g(u) = v Z n C f (v)c g (v) for all f, g B n,, see [13, Cor. 4.6]. Let f l B n 1, (l = 0, 1,..., 1) such that and j l, then C fi,f j (w)c fk,f l (w) = 0 for all i, j, k, l Z such that i k σ f = C f (uw) = C fl,f l+u C fz,f z+u u Z u Z l Z z Z = C fl (w)c fz (w) + C fl,f l+u (w)c fz,f z+u l Z z Z u 0 = σ fl,f z + C fl,f l+u (w)c fz,f z+u l Z z Z 1 = σ fi + i=0 1 = σ fi + i=0 1 = σ fi + 4 i=0 which completes the proof. u 0 l Z z Z 0=i<j< + u 0 0=i<j< + u 0 0=i<j<, l Z + u 0 l z,z Z l Z σ fl,f l+u C fl,f l+u (w) C fl,f l+u (w)c fz,f z+u It is to be noted that the smaller value of σ f (i.e., for better GAC) of f correspond to low values of the autocorrelation spectrum of f [16]. From Theorem it is evident that the decomposition of -ary function is important to construct -ary functions with good GAC. Two functions f, g B n, are said to be perfectly uncorrelated if C f,g (u) = 0 for all u Z n. Further, if H f (u)h g (u) = 0 for all u Z n for all u Z n, then f, g are said to be -ary functions with disjoint WHS. It can be seen that two functions with disjoint WHS are always perfectly uncorrelated. These properties are widely used in binary case to construct highly nonlinear balance Boolean functions with good GAC, see [10] and the references therein. The following results are conseuence of Theorem Corollary 4. Let f be a -ary function as defined in (3.5), then 1. σ f = σ f0 + σ f σ f 1 if and only if f i, f j are perfectly uncorrelated for all i j, i, j {0, 1,..., 1}.. 1 i=0 σ f i σ f 1 i=0 σ f i + 4 0=i<j< σ f i,f j. Thus, the concatenated function have minimum SSMI if their decomposition -ary functions are pairwise perfectly uncorrelated. The following are some constructions of -ary functions smaller values for σ f and f. Lemma. Let l be a non negative integer and z l Z m be any fixed vector. Define a -ary function f l : Z n m Z m Z by f l (x, y) = g l (x) + z l, y for all x Z n m, y Z m, (3.8) where g zl B n m,. Then (a) H fl (u, v) = m H gl (u)δ 0 (z + v), where δ 0 (u) = 0 if u 0 and δ 0 (0) = 1. (3.7)

5 (b) H f1 (u, v)h f (u, v) = 0 for all (u, v) Z n m Z m, whenever z 1 z, (c) σ fl = 3m σ gl, (d) If g zl is a -ary bent, then σ fl = n+m and H fl (u, v) = m δ 0 (z + v), that is, f l is m-plateaued -ary function. Proof. Let (u, v) Z n m Z m. Then, H fl (u, v) = 1 n = 1 n (x,y) Z n m Z m x Z n m ζ g l(x)+ u,x ζ f l(x,y)+ u,x + v,y y Z m ζ z l+v,y = m Hgl (u)δ 0 (v + z l ) (3.9) Part (b) follows from the property δ 0 (x)δ 0 (y) = 0 if x y and part (a). Now, using (3.9), we have σ fl = n = n (u,v) Z n m Z m u Z n m v Z m ( m H fl (u, v) 4 ) 4 Hgl (u) 4 δ 0 (v + z l ) = n+m u Z n m H gl (u) 4 = 3m σ gl. Further, if g l -ary is bent, then σ gl = (n m) and H gl (u) = 1 for all u. Hence part (d) follows from part (a) and (c). The following is the construction of (m 1)-plateaued -ary function in n + 1 variables by m-plateaued -ary function in n variables. Construction 1. Let t = n + 1, z l Z m for l {0, 1,..., 1} such that z i z j for all i j. Define a -ary function f : Z n m Z m Z Z by f(x, y, x t ) = f xt (x, y), (3.10) where f l are -ary m-plateaued functions as constructed in (3.8). Then f is (m 1)-plateaued. Theorem 3. Let f B t, as defined in Construction 1, then σ f = t (m 1), that is f is (m 1)-plateaued -ary function. Proof. Since H fi (u, v)h fj (u, v) = 0 for (u, v) Z n m Z m whenever i j and i, j {0, 1,..., 1}. This implies that C fi,f j (u, v) = 0 for all (u, v) Z n m Z m, that is f i, f j are perfectly uncorrelated for all i j. Hence by using Corollary 4 which completes the proof. σ f = n+m+1 = t+(m 1), (3.11) 4 Conclusion The article presents an upper bound on the two indicators: σ f,g and f,g of two -ary functions f and g. A relationship among σ f,g, σ f and σ g is also presented. Based on the above result we obtain a bound on σ f of f B n, in terms of σ f l s of the restricted functions on Z n 1, and construct a class of -ary bent functions from 1-plateaued functions having dijoint Walsh spectra.

6 References 1. C. M. Adams and S. E. Tavers, Generating and counting binary bent seuences, IEEE Trans. Inform. Theory 36 (5) (1990) A. Çeşmelioğlu and W. Meidl, Bent functions of maximal degree, IEEE Trans. Inform. Theory, 58 () (01), pp A. Çeşmelioğlu and W. Meidl, A construction of bent functions from plateaued functions, Des. Codes Cryptogr., 66 (013), pp T. Helleseth, P. V. Kumar, Seuences with Low Correlation, In Handbook of Coding Theory, North-Holland, Amsterdam, (1998), pp X. Hou, -ary bent functions constructed from chain rings, Finite Fields and Applications, 4 (1998), pp P. V. Kumar, R. A. Scholtz, L. R. Welch, Generalized bent functions and their properties, Journal of Combinatoirial Theory, Ser. A 1(40) (1985), pp B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts and J. Vandewalle, Propagation characteristics of Boolean functions, in Advances in Cryptology-Eurocrypt 90, LNCS 437 Springer (1991) O. S. Rothaus, On bent functions, J. Combin. Theory, Ser. A 0 (1976) P. Sarkar and S. Maitra, Constructions of nonlinear Boolean functions with important cryptographic properties, In Advances in Cryptology-Eurocrypt 000, LNCS 1807, Springer (008) P. Sarkar and S. Maitra, Cross-correlation analysis of cryptographically useful Boolean functions, Theory of Computing Systems 35 (00) K-U. Schmidt, Quaternary constant-amplitude codes for multicode CDMA, IEEE Trans. on Inform. Theory, 55 (4)(009) C. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 8 (1949) D. Singh, M. Bhaintwal, B. K. Singh, Some results on -ary bent functions, Int. J. Comput. Math. DOI: / J.J. Son, J. I. Lim, S. Chee and S. H. Sung, Global avalanche characteristics and nonlinearity of balanced Boolean functions, Inform. Proc. Lett. 65 (1998) N. Tokareva, Generalizations of bent functions: A survey, J. Appl. Indust. Math. 5(1) (011) X. M. Zhang and Y. Zheng, GAC-The criterion for global acalanche criteria of cryptographic functions, J. Uni. Comput. Sci. 1(5) (1995) Y. Zheng and X. M. Zhang, Relationship between bent functions and complementary plateaued functions, LNCS 1787 (1999) Y. Zhou, M. Xie and G. Xiao, On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity, Inform. Sci. 180 (010) Y. Zhou, X. Dong, W. Zhang and B. Zeng, New bounds on the sum-of-suares indicator, 7th International Conference on Communications and Networking, CHINACOM-01 China, Y. Zhou, W. Zhang, S. Zhu and G. Xiao, The global avalanche characteristics of two Boolean functions and algebraic immunity, Int. J. Comput. Math. 89(16) (01) A. F. Webster, Plaintext/ciphertext bit dependencies in cryptographic systems, Master s Thesis, Department of Electrical Engineering, Queen s University, Ontario, Canada, 1985.

Some properties of q-ary functions based on spectral analysis

Some properties of q-ary functions based on spectral analysis Some properties of q-ary functions based on spectral analysis Deep Singh and Maheshanand Bhaintwal Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee 247667 INDIA deepsinghspn@gmail.com,mahesfma@iitr.ernet.in

More information

arxiv:math/ v1 [math.co] 24 Oct 2000

arxiv:math/ v1 [math.co] 24 Oct 2000 arxiv:math/0010220v1 [math.co] 24 Oct 2000 Nonlinearity, Local and Global Avalanche Characteristics of Balanced Boolean Functions Abstract Pantelimon Stănică Auburn University Montgomery, Department of

More information

Complete characterization of generalized bent and 2 k -bent Boolean functions

Complete characterization of generalized bent and 2 k -bent Boolean functions Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Non-Separable Cryptographic Functions

Non-Separable Cryptographic Functions International Symposium on Information Theory and Its Applications Honolulu, Hawaii, USA, November 5 8, 2000 Non-Separable Cryptographic Functions Yuliang Zheng and Xian-Mo Zhang School of Network Computing

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

On the Symmetric Property of Homogeneous Boolean Functions

On the Symmetric Property of Homogeneous Boolean Functions On the Symmetric Property of Homogeneous Boolean Functions Chengxin Qu, Jennifer Seberry, and Josef Pieprzyk Centre for Computer Security Research School of Information Technology and Computer Science

More information

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions

More information

arxiv: v5 [cs.it] 4 Nov 2009

arxiv: v5 [cs.it] 4 Nov 2009 1 Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables WeiGuo ZHANG and GuoZhen XIAO ISN Lab, Xidian University, Xi an 710071, P.R.China arxiv:0905.0794v5 [cs.it]

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Smart Hill Climbing Finds Better Boolean Functions

Smart Hill Climbing Finds Better Boolean Functions Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,

More information

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4

More information

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture

More information

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

Haar Spectrum of Bent Boolean Functions

Haar Spectrum of Bent Boolean Functions Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed

More information

On Boolean functions which are bent and negabent

On Boolean functions which are bent and negabent On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra

More information

Towards Provable Security of Substitution-Permutation Encryption Networks

Towards Provable Security of Substitution-Permutation Encryption Networks Towards Provable Security of Substitution-Permutation Encryption Networks Zhi-Guo Chen and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University at Kingston, Ontario,

More information

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

Provable Security Against Differential and Linear Cryptanalysis

Provable Security Against Differential and Linear Cryptanalysis Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Aalto University School of Science and Nokia, Finland kaisa.nyberg@aalto.fi Abstract. In this invited talk, a brief survey on

More information

Heuristic Design of Cryptographically Strong Balanced Boolean Functions

Heuristic Design of Cryptographically Strong Balanced Boolean Functions Heuristic Design of Cryptographically Strong Balanced Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Center, Queensland University of Technology, GPO Box 2434,

More information

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS italian journal of pure and applied mathematics n. 37 2017 (173 182) 173 COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS Shashi Kant Pandey Department of Mathematics University

More information

Structures of cryptographic functions with strong avalanche characteristics

Structures of cryptographic functions with strong avalanche characteristics University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1995 Structures of cryptographic functions with strong avalanche characteristics

More information

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

The Analysis of affinely Equivalent Boolean Functions

The Analysis of affinely Equivalent Boolean Functions The Analysis of affinely Equivalent Boolean Functions Qing-shu Meng Min Yang Huan-guo Zhang Yuzhen Liu October 21, 2005 Abstract By Walsh transform, autocorrelation function, decomposition, derivation

More information

nonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equa

nonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equa Upper bounds on the numbers of resilient functions and of bent functions Claude Carlet 1 and Andrew Klapper 2 1 INRIA projet CODES, B.P. 105, 78153 Le Chesnay Cedex- France. Claude.Carlet@inria.fr 2 Dept.

More information

Algebraic nonlinearity and its applications to cryptography

Algebraic nonlinearity and its applications to cryptography Algebraic nonlinearity and its applications to cryptography Luke O Connor Department of Computer Science University of Waterloo, Ontario, Canada, NL 3G1 Andrew Klapper Department of Computer Science University

More information

Generalized Correlation Analysis of Vectorial Boolean Functions

Generalized Correlation Analysis of Vectorial Boolean Functions Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,

More information

Boolean functions in cryptography

Boolean functions in cryptography University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections Boolean functions in cryptography Cheng-Xin Qu University of Wollongong Recommended

More information

University of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center

University of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center University of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center A DATABASE FOR BOOLEAN FUNCTIONS AND CONSTRUCTIONS OF GENERALIZED COMPLEMENTARY PAIRS by Mohamed

More information

9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class

9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class 9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class Selçuk Kavut and Melek Diker Yücel arxiv:0808.0684v1 [cs.cr] 5 Aug 2008 Abstract In 2006, 9-variable Boolean functions

More information

Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree

Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree 1 Wei Su Alexander Pott and Xiaohu Tang arxiv:105.6568v1 [cs.it] 30 May 01 Abstract We present

More information

A construction of Boolean functions with good cryptographic properties

A construction of Boolean functions with good cryptographic properties A construction of Boolean functions with good cryptographic properties Jong H. Chung 1, Pantelimon Stănică 1, Chik-How Tan, and Qichun Wang 1 Department of Applied Mathematics, Naval Postgraduate School,

More information

Automorphism group of the set of all bent functions

Automorphism group of the set of all bent functions Automorphism group of the set of all bent functions Natalia N. Tokareva 1 Sobolev Institute of Mathematics, Novosibirsk State University, Novosibirsk, Russian Federation e-mail: tokareva@math.nsc.ru Abstract.

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

BENT POLYNOMIALS OVER FINITE FIELDS

BENT POLYNOMIALS OVER FINITE FIELDS BENT POLYNOMIALS OVER FINITE FIELDS ROBERT S COULTER AND REX W MATTHEWS Abstract. The definition of bent is redefined for any finite field. Our main result is a complete description of the relationship

More information

Maiorana-McFarland class: Degree optimization and algebraic properties

Maiorana-McFarland class: Degree optimization and algebraic properties Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,

More information

Searching for Cost Functions

Searching for Cost Functions Searching for Cost Functions John A. Clark, Jeremy L. Jacob, Susan Stepney Dept. of Computer Science, University of York, Heslington, York, YO10 5DD, UK Email: [jac,jeremy,susan]@cs.york.ac.uk Abstract

More information

Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis

Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis J. Cryptology (1996) 9: 1 19 1996 International Association for Cryptologic Research Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis Howard M. Heys and Stafford E.

More information

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010 Introduction Boolean functions 2nd order nonlinearity Summary ARXH PROSTASIAS_APOLOGISMOS 2010.indd 1 20/04/2011 12:54 ΜΜ On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ

More information

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay Volume X, No. 0X, 0xx, X XX doi:0.3934/amc.xx.xx.xx GENERALIZED NONLINEARITY OF -BOXE ugata Gangopadhyay Department of Computer cience and Engineering, Indian Institute of Technology Roorkee, Roorkee 47667,

More information

SELF DUAL BENT FUNCTIONS

SELF DUAL BENT FUNCTIONS Boolean Functions: Cryptography and Applications Fonctions Booléennes : Cryptographie & Applications BFCA 08 SELF DUAL BENT FUNCTIONS Claude Carlet 1, Lars Eirik Danielsen 2, Matthew Geoffrey Parker 2

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

Statistical and Linear Independence of Binary Random Variables

Statistical and Linear Independence of Binary Random Variables Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.

More information

On the normality of p-ary bent functions

On the normality of p-ary bent functions Noname manuscrit No. (will be inserted by the editor) On the normality of -ary bent functions Ayça Çeşmelioğlu Wilfried Meidl Alexander Pott Received: date / Acceted: date Abstract In this work, the normality

More information

Bent Functions of maximal degree

Bent Functions of maximal degree IEEE TRANSACTIONS ON INFORMATION THEORY 1 Bent Functions of maximal degree Ayça Çeşmelioğlu and Wilfried Meidl Abstract In this article a technique for constructing -ary bent functions from lateaued functions

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used

More information

The primary aim of this paper is to introduce a new class of functions to facilitate the design of cryptographically good functions. It turns out that

The primary aim of this paper is to introduce a new class of functions to facilitate the design of cryptographically good functions. It turns out that Plateaued Functions Yuliang Zheng 1 and Xian-Mo Zhang 1 Monash University, Frankston, Melbourne, VIC 3199, Australia yuliang.zheng@monash.edu.au, http://www.pscit.monash.edu.au/~yuliang/ The University

More information

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity arxiv:cs/0605139v1 [cs.cr] 30 May 2006 Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity Na Li, Wen-Feng Qi Department of Applied Mathematics, Zhengzhou

More information

S-box (Substitution box) is a basic component of symmetric

S-box (Substitution box) is a basic component of symmetric JOURNAL OF L A TEX CLASS FILES, VOL., NO., AUGUST 1 Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family Wentan Yi and Shaozhen Chen Abstract This paper investigates

More information

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member, IEEE, and

More information

AUTOMATED CREATION AND SELECTION OF CRYPTOGRAPHIC PRIMITIVES

AUTOMATED CREATION AND SELECTION OF CRYPTOGRAPHIC PRIMITIVES FACULTY OF ENGINEERING THESIS SUBMITTED FOR THE PROGRAMME MASTER OF ARTIFICIAL INTELLIGENCE ACADEMIC YEAR 2005-2006 KATHOLIEKE UNIVERSITEIT LEUVEN AUTOMATED CREATION AND SELECTION OF CRYPTOGRAPHIC PRIMITIVES

More information

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565

More information

Diffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty

Diffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty Information Systems International Conference (ISICO), 2 4 December 2013 Diffusion Analysis of F-function on KASUMI Algorithm Rizki Yugitama, Bety Hayat Susanti, Magfirawaty Rizki Yugitama, Bety Hayat Susanti,

More information

Maiorana McFarland Functions with High Second Order Nonlinearity

Maiorana McFarland Functions with High Second Order Nonlinearity Maiorana McFarland Functions with High Second Order Nonlinearity Nicholas Kolokotronis 1 and Konstantinos Limniotis 2,3 1 Department of Computer Science and Technology University of Peloponnese End of

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

Enumeration of Bent Boolean Functions by Reconfigurable Computer

Enumeration of Bent Boolean Functions by Reconfigurable Computer Enumeration of Bent Boolean Functions by Reconfigurable Computer J. L. Shafer S. W. Schneider J. T. Butler P. Stănică ECE Department Department of ECE Department of Applied Math. US Naval Academy Naval

More information

Constructions of bent functions and difference sets KAISA NYBERG. University of Helsinki and Finnish Defence Forces

Constructions of bent functions and difference sets KAISA NYBERG. University of Helsinki and Finnish Defence Forces Constructions of bent functions and difference sets KAISA NYBERG University of Helsinki and Finnish Defence Forces 1. Introduction. Based on the work of Rothaus 1121, Olsen, Scholtz and Welch suggested

More information

On the Linear Complexity of Feedback Registers

On the Linear Complexity of Feedback Registers On the Linear Complexity of Feedback Registers (extended abstract) A. H. Chan M. Goresky A. Klapper ru ortheastern University College of Computer Science 360 Huntington Ave. Boston, MA, 02113 ABSTRACT

More information

Dirichlet Product for Boolean Functions

Dirichlet Product for Boolean Functions Dirichlet Product for Boolean Functions Abderrahmane Nitaj 1, Willy Susilo 2 and Joseph Tonien 2 1 Laboratoire de Mathématiques Nicolas Oresme, Université de Caen Normandie, France 2 Centre for Computer

More information

arxiv: v1 [math.co] 6 Jan 2019

arxiv: v1 [math.co] 6 Jan 2019 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS arxiv:1901.02359v1 [math.co] 6 Jan 2019 DANIELE BARTOLI, MARIA MONTANUCCI, AND GIOVANNI ZINI Abstract. We provide constructions of bent functions

More information

On the k-error linear complexity for p n -periodic binary sequences via hypercube theory

On the k-error linear complexity for p n -periodic binary sequences via hypercube theory 1 On the k-error linear complexity for p n -periodic binary sequences via hypercube theory Jianqin Zhou Department of Computing, Curtin University, Perth, WA 6102 Australia Computer Science School, Anhui

More information

On The Nonlinearity of Maximum-length NFSR Feedbacks

On The Nonlinearity of Maximum-length NFSR Feedbacks On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main

More information

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012 6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 9, SEPTEMBER 2012 A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Fellow,

More information

functions. E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS**

functions. E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS** Security Analysis of Cryptographic Algorithms by means of Boolean Functions E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS** * Department of Computer Science National Technical University of

More information

DPA Attacks and S-Boxes

DPA Attacks and S-Boxes DPA Attacks and S-Boxes Emmanuel Prouff Oberthur Card Systems 5 rue Auguste Blanche, 9800 Puteaux, France e.prouff@oberthurcs.com Abstract. For the power consumption model called Hamming weight model,

More information

A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION

A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION Claudia Peerez Ruisanchez Universidad Autonoma del Estado de Morelos ABSTRACT In this paper is proposed a new algorithm to construct S-Boxes over

More information

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong 1, and Mingsheng Wang 3 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China. Graduate School

More information

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, PP 1638-1651, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member,

More information

Provable Security Against Differential and Linear Cryptanalysis

Provable Security Against Differential and Linear Cryptanalysis Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University Introduction CRADIC Linear Hull SPN and Two Strategies Highly

More information

Hyper-bent Functions

Hyper-bent Functions Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

Construction of Nonlinear Boolean Functions with Important Cryptographic Properties

Construction of Nonlinear Boolean Functions with Important Cryptographic Properties Construction of Nonlinear Boolean Functions with Important Cryptographic Properties Palash Sarkar 1 and Subhamoy Maitra 2 1 Applied Statistics Unit, Indian Statistical Institute 203, B T Road, Calcutta

More information

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial

More information

On the Arithmetic Walsh Coefficients of Boolean Functions

On the Arithmetic Walsh Coefficients of Boolean Functions Designs, Codes, and Cryptography manuscript No. (will be inserted by the editor) On the Arithmetic Walsh Coefficients of Boolean Functions Claude Carlet Andrew Klapper Received: date / Accepted: date Abstract

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

Design of Pseudo-Random Spreading Sequences for CDMA Systems

Design of Pseudo-Random Spreading Sequences for CDMA Systems Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,

More information

Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion

Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion John A Clark and Jeremy L Jacob Department of Computer Science University of York York, YO10 5DD, UK {jac,jeremy}@cs.york.ac.uk

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

Avalanche Characteristics of Substitution- Permutation Encryption Networks

Avalanche Characteristics of Substitution- Permutation Encryption Networks Avalanche Characteristics of Substitution- Permutation Encryption Networks Howard M. Heys and Stafford E. Tavares, member IEEE Abstract This paper develops analytical models for the avalanche characteristics

More information

Heriot-Watt University

Heriot-Watt University Heriot-Watt University Heriot-Watt University Research Gateway New constructions of resilient functions with strictly almost optimal nonlinearity via nonoverlap spectra functions Wei, Yongzhuang; Pasalic,

More information

Computing the biases of parity-check relations

Computing the biases of parity-check relations Computing the biases of parity-check relations Anne Canteaut INRIA project-team SECRET B.P. 05 7853 Le Chesnay Cedex, France Email: Anne.Canteaut@inria.fr María Naya-Plasencia INRIA project-team SECRET

More information

New Construction of Single Cycle T-function Families

New Construction of Single Cycle T-function Families New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA

On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA Kenneth G. Paterson, Member, IEEE Abstract Codes which reduce the peak-to-average power PAPR) in multi-code code division multiple access

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

Cryptographic Properties of the Hidden Weighted Bit Function

Cryptographic Properties of the Hidden Weighted Bit Function Cryptographic Properties of the Hidden Weighted Bit Function Qichun Wang a, Claude Carlet b, Pantelimon Stănică c, Chik How Tan a a Temasek Laboratories, National University of Singapore, 117411, Singapore.

More information

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Ming Duan 12 and Xuejia Lai 1 1 Department of Computer Science and Engineering, Shanghai Jiao Tong University, China. 2 Basic Courses

More information

Perfect Algebraic Immune Functions

Perfect Algebraic Immune Functions Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, and Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, Beijing 100195, P. R. China meicheng.liu@gmail.com, zhangy@is.iscas.ac.cn,

More information

Improvements to Correlation Attacks Against Stream. Ciphers with Nonlinear Combiners. Brian Stottler Elizabethtown College

Improvements to Correlation Attacks Against Stream. Ciphers with Nonlinear Combiners. Brian Stottler Elizabethtown College Improvements to Correlation Attacks Against Stream Ciphers with Nonlinear Combiners Brian Stottler Elizabethtown College Spring 2018 1 Background 1.1 Stream Ciphers Throughout the multi-thousand year history

More information

On Hardware Implementation of Tang-Maitra Boolean Functions

On Hardware Implementation of Tang-Maitra Boolean Functions On Hardware Implementation of Tang-Maitra Boolean Functions Mustafa Khairallah 1, Anupam Chattopadhyay 1, Bimal Mandal 2, and Subhamoy Maitra 2 1 Nanyang Technological University, Singapore. mustafam001@e.ntu.edu.sg,

More information