Perfectly Balanced Boolean Functions and Golić Conjecture

Size: px
Start display at page:

Download "Perfectly Balanced Boolean Functions and Golić Conjecture"

Transcription

1 Perfectly Balanced Boolean Functions and Golić Conjecture Stanislav V. Smyshlyaev Abstract: Golić conjecture ([3]) states that the necessary condition for a function to be perfectly balanced for any choice of a tapping sequence is linearity of a function in the first or in the last essential variable. In the current paper we prove Golić conjecture. Keywords: Boolean function, perfectly balanced function, keystream generator, filter, Golić conjecture. Introduction Golić ([3]) studied cryptographic properties of keystream generators consisting of a shift register and a filter function which is connected to the register according to some tapping sequence. Golić considered model of a keystream generator as a filter with a fixed filter function and arbitrary choice of a tapping sequence. With proposal of an inversion attack on the filter he showed a cryptographic weakness of keystream generators in such model in the case of a filter function being linear either in the first or in the last variable. Earlier Anderson ([]) proposed an idea of optimum correlation attack and showed corresponding cryptographic weakness of such keystream generators in case of inappropriate choice of both the tapping sequence and the filter function. The important open question was: do any keystream generators without these undesirable properties exist in Golić model? Golić conjectured that in his model a filter with a filter function f is invulnerable to Anderson optimum correlation attack if and only if f is linear either in the first or in the last variable. Golić proved an easier part of this conjecture, namely sufficiency, and noted that necessity remained unproven due to a subtle underlying combinatorial problem remaining to be solved. According to Golić conjecture, the necessary condition for a function to be perfectly balanced (i. e. preserving pure randomness of an input binary sequence when used as a filter function) for any choice of a tapping sequence is linearity of a function in the first or in the last essential variable. Golić conjecture implies that in the model being considered (with The work was partially supported by the Russian Foundation for Basic Research (grant no ) Computer Science Department, Lomonosov University, Moscow, Russia; smyshsv@gmail.com

2 independent choice of a tapping sequence and a Boolean function) there are no functions invulnerable both to the inversion attack and to the optimum correlation attack. To prove Golić conjecture, it suffices to find for arbitrary Boolean function which is nonlinear in the first and in the last essential variables a tapping sequence, such that the Boolean function which describes input-output behaviour of the corresponding filter does not satisfy conditions of the Sumarokov criterion of perfect balancedness ([]). The trivial case of a function with no linear variables was considered in [7]. In the general case, all linear variables of a function have to be handled in a special way to construct a particular tapping sequence and two binary sequences required by Sumarokov criterion. This in fact solves an underlying combinatorial problem mentioned by Golić. Related work. Sumarokov ([]) defined perfect balancedness of Boolean functions. A perfectly balanced filter function transforms uniformly distributed input sequences into uniformly distributed output sequences. Also, Sumarokov proved a useful criterion of perfect balancedness. Dichtl ([2]) offered an example of a Boolean function that is nonlinear in the first and in the last variables but is perfectly balanced when used as a filter function with a certain choice of a tapping sequence. That example does not rule out Golić conjecture because of the fact that some other choices of a tapping sequence do not induce perfect balancedness of corresponding filter functions. Gouget and Sibert ([4]) suggested not to consider a Boolean function independently of a tapping sequence used in a filter and noted that one class of perfectly balanced functions nonlinear in both the first and the last variable was described by Logachev ([6]). Nevertheless, existence of this class is not in conflict with Golić conjecture either, because the models are different. 2 Definitions As usual, F 2 denotes the Galois field. For any n N V n denotes F n 2, F n is the set of all Boolean functions in n variables. Variable x i is called essential for the function f(x, x 2,..., x n ) F n if there exists (α, α 2,..., α i, α i+,..., α n ) V n such that f(α, α 2,..., α i, 0, α i+,..., α n ) f(α, α 2,..., α i,, α i+,..., α n ). Variable x i is called linear essential for the function f(x, x 2,..., x n ) F n if for any (α, α 2,..., α i, α i+,..., α n ) V n inequality f(α, α 2,..., α i, 0, α i+,..., α n ) f(α, α 2,..., α i,, α i+,..., α n ) holds. By Φ n, Φ n F n, we denote the set of all Boolean functions with both first and last variables being essential. Let m N. Boolean function g F N, N N, induces mapping g m : V m+n V m of the form g m (z, z 2,..., z m+n ) = (g(z,..., z N ), g(z 2,..., z N+ ),..., g(z m,..., z m+n )). (2.) Let γ = (γ,..., γ n ) be a tuple of nonnegative integers such that γ = 0; γ i+ > γ i, i =, 2,..., n, and let N = γ n +. From now on we consider tuples γ of this form. For γ of the above form and arbitrary f Φ n we denote f(x N γn, x N γn,..., x N γ ) by f γ (x,..., x N ). A filter with a tapping sequence γ, and a filter function f is a mapping of the set to V i, defined by equations (2.) with m =, 2,... and g = f γ. V i i=γ n+ i= 2

3 Definition 2.. ([]). A Boolean function f F n is said to be perfectly balanced if for any m N and any y V m (f m ) (y) = 2 n, where denotes cardinality. The subset of F n composed by all functions linear in the first (resp. last) variable is denoted by L n (resp. R n ). It is easy to see ([]) that all functions in L n R n are perfectly balanced. 3 Preliminaries We denote the set of all perfectly balanced n -variable functions by PB n, PB n F n. From cryptographic applications point of view the subset Φ n PB n \ (L n R n ) is of primary importance. The next theorem states necessary and sufficient condition for an m -tuple in the righthand side of equation (2.) to be distributed uniformly in V m given the uniform distribution of the vector X m = (x,..., x m+n ) and can be easily proven using only Definition 2. and basics of probability theory. Theorem 3.. Let n N and f F n. Let {X m = (x,..., x m+n )} m= random vectors with distribution be a sequence of Pr{X m = (a,..., a m+n )} = 2 (m+n ) for any (a,..., a m+n ) V m+n. Random vector Y m = f m (X m ) is distributed uniformly for each m N iff f is perfectly balanced. Theorem 3.2. ([]). A Boolean function f F n of distinct binary sequences is perfectly balanced iff there is no pair x = (x,..., x r ), z = (z,..., z r ) V r, r > 2n, (3.) such that x = z,..., x n = z n, x r n+ = z r n+,..., x r = z r ; (3.2) x z; (3.3) f(x i,..., x i+n ) = f(z i,..., z i+n ), i =,..., r n +. (3.4) Full proof of the Theorem 3.2 can be found in Appendix A. Theorem 3.3. ([3]) For a filter with a filter function f for any choice of a tapping sequence γ the output sequence is purely random given that the input sequence is such if (and only if [not proven]) f(z,..., z n ) is balanced for each value of (z 2,..., z n ) (i. e. f is linear in the first variable) or f(z,..., z n ) is balanced for each value of (z,..., z n ) (i. e. f is linear in the last variable). According to Dichtl ([2]), unproven necessary condition in Theorem 3.3 is referred to as Golić conjecture. 3

4 4 Main Result Theorem 3. implies that Golić conjecture can be stated in the following form. Conjecture 4.. If f γ is perfectly balanced for every possible choice of γ, then f is linear in the first or in the last variable. To prove Golić conjecture it suffices to construct for arbitrary f Φ n \ (L n R n ) a particular tapping sequence making function f γ not perfectly balanced. The key idea is to force γ i increase exponentially in i. After choosing appropriate γ we construct two different binary sequences of the special form required by Sumarokov criterion (Theorem 3.2) to prove that f γ is not perfectly balanced. Theorem 4.2. For any f Φ n \ (L n R n ) there exists a tuple γ such that f γ / PB N. Proof. Let f Φ n \ (L n R n ). Suppose that f depends on each variable essentially (this is w.l.o.g. since we are free to choose any tuple γ ). Choose γ as follows: γ = (τ 0, τ 0 + δ 0,..., τ 0 + (m 0 )δ 0, τ,..., τ k, τ k + δ k,..., τ k + (m k )δ k, τ k+,..., τ n l ), where δ k = τ k+ τ k m k and m k is the number of succeeding linear essential variables of f between (n l k ) th and (n l k) th nonlinear essential variables, k = 0,,..., n l 2 ; l = (m 0 ) (m n l ) is the total number of linear essential variables of f. Let m = max m k k=0,...,n l 2, τ 0 = 0, τ = m 0, τ k+ > (4m 2 + )τ k, k =,..., n l 2 and τ k+ τ k be a multiple of m k. Consider two binary sequences y = (y 0,..., y M ), z = (z 0,..., z M ), M = 2N + l, where k j are indices such that m kj > ( l denotes the total number of these indices). Fix certain bits of these sequences as follows: = 0, z yn+ l =, N+ l a j a j {0, }, j =,..., l. Indices of the form N + l j= a j j= a j are referred to as B-indices and all the others as A- indices. It is easy to conclude using Theorem 3.2, that to prove the Theorem it suffices to show that one can set all yet unfixed bits of y so that f γm N+2 (y) = f γm N+2 (z) and z j = y j holds for any A-index j. Thereby we have distinct binary sequences y, z, y = z > 2N, with coinciding leading as well as tailing N-bit subsequences and such that f γm N+2 (y) = f γm N+2 (z). Then, using Theorem 3.2, one concludes that γ is required tapping sequence, f γ / PB N and the Theorem follows. First, we demonstrate some simple relations.. δ k = τ k+ τ k m k > (+4m2 )τ k τ k m k 4mτ k. 2. If m k >, then τ k = τ k + m k δ k 2δ k. 3. δ k > δ k. From and 2 it follows that if m k >, then δ k > δ k. j= j= 4

5 l 4. From 3 it follows that < l j=j j=j δ kl () l j 5. δ k = τ k+ τ k m k < τ k+ m k τ k+ if k ; δ 0 τ. < δ kl = δ k l () i i=0 = δ kl. According to Theorem 3.2, to prove the Theorem it suffices to prove solvability of the following system of equations. f γ (y 0,..., y N ) = f γ (z 0,..., z N )... f γ (y M N+,..., y M ) = f γ (z M N+,..., z M ) = 0, a yn+ l j {0, }, j =,..., l a j j= (4.) =, a zn+ l j {0, }, j =,..., l a j j= y t = z t, t N + l a j, a j {0, }, j =,..., l j= Now we fix variables involved in the second subsystem of (4.) and consider i th equation ( i = 0,..., M N + ) of the first subsystem. Three cases are possible. Case. Each B-index variable, which is essential for f i γ f γ (y i,..., y i+n ), is linear for f i γ. In Lemma 4.3 (the proof can be found in Appendix B) we prove that in this case f i γ depends on exactly two such variables. Then, from definition of linear dependence and from our fixation of B-index variables, we get that i th equation of the first subsystem turns out to be identity. Lemma 4.3. Let the set of B-index variables that are essential for fγ i be nonempty, and let fγ i be linear in any B-index variable. Then fγ i is linear in exactly two B-index variables. Case 2. fγ i depends essentially on no B-index variable. In this case we have a trivial equality, since variables with equal A-indices are equal, i.e. y j = z j, j N + l a j. j= Case 3. f i γ depends essentially and nonlinearly on some B-index variable y _ j i. Lemma 4.4 (the proof is in Appendix C) states that in this case fγ i is nonlinear in exactly one essential B-index variable. In other words, if any other B-index variable is essential for fγ i, then the latter is linear essential variable of fγ i. Lemma 4.4. If fγ i depends essentially and nonlinearly on some B-index variable, then there is exactly one such (nonlinear, essential, B-index) variable. Therefore i th equation of the system could be written in the form φ(y j i, y j i 2,..., y _ j i, 0, y_ j i +,..., y j i n l ) = φ(y j i, y j i 2,..., y_ j i,, y_ j i +,..., y j i n l ) ζ i, where φ is the function constructed from f by setting all linear essential variables to zero; (y j i, y j i 2,..., y _, j i y_,..., y j i + jn l i ) are yet unfixed variables and ζ i is a constant. The 5

6 variable y _ is essential and nonlinear for φ, thus there exists at least one setting of variables j i (y j i, y j i 2,..., y _, j i y_,..., y j i + jn l i ), which turns i th equation of the first subsystem of system (4.) to identity. The Theorem is proven if one shows that no indices jm i appear in any other equation whose function satisfies conditions of the Case 3. In other words, each index of a nonlinear essential variable of fγ i appears in at most one equation with function fγ i depending essentially and nonlinearly on a B-index variable. This fact is proven in Lemma 4.5 (the proof is in Appendix D). Lemma 4.5. There is no index of a nonlinear essential variable of fγ j (for any j) that occurs in at least two equations with functions fγ i satisfying conditions of the Case 3. Also, each variable, that is present in equations corresponding to Case 3, is present only in one such equation. Equations which correspond to Case and Case 2 turn into trivial equalities, and each equation corresponding to Case 3 is solvable. So, we can conclude that the whole system is solvable, and that fact directly implies statement of the Theorem. Remark 4.6. Proof of Theorem 4.2 is much easier in the case of f without linear essential variables. In this case one has m k =, k = 0,..., n ; the sequences y, z are of length 2N + and differ in one bit only. 5 Conclusion and Open Question Theorem 4.2 implies the negative answer to the question of existence (in Golić model) of keystream generators without undesirable properties mentioned in introduction. But our proof is based on a register whose size exponentially grows with the number of taps. Thus, though theoretically the question with Golić conjecture is now closed, there remains the following open question: whether it is possible to prove a similar statement without forcing sequence γ increase exponentially (e. g. in the model where the size of a register is bounded by some polynomial). References [] R.J.Anderson. Searching for the Optimum Correlation Attack. B. Preneel (ed.) Fast Software Encryption. LNCS, vol. 008, pp Springer, Heidelberg (995). [2] M. Dichtl. On nonlinear filter generators. E. Biham (ed.) FSE 997. LNCS, vol. 267, pp Springer, Heidelberg (997). [3] Dj.Golić, J. On the Security of Nonlinear Filter Generators. D. Gollmann (ed.) Proceedings of Fast Software Encryption 996. LNCS, vol. 039, pp Springer, Heidelberg (996). [4] A.Gouget, H.Sibert. Revisiting Correlation-Immunity in Filter Generators. C.Adams, A.Miri and M.Wiener(Eds.) Proceedings of SAC 2007, LNCS, vol. 4876, pp Springer, Heidelberg (2007). 6

7 [5] D. A. Huffman. Canonical Forms for Information-Lossless Finite-State Logical Machines. IRE Trans. Circuit Theory, 959, v. 5, spec. suppl., p [6] O.A. Logachev, On perfectly balanced Boolean functions. Cryptology eprint Archive, Report 2007/022, [7] O.A. Logachev, A.A. Salnikov, S.V. Smyshlyaev, V.V. Yashchenko. Perfectly Balanced Functions in Symbolic Dynamics. Cryptology eprint Archive, Report 2009/296, [8] O.A. Logachev, A.A. Salnikov, and V.V. Yashchenko, Boolean Functions in Coding Theory and Cryptology, MCCME, Moscow, 2004 (in Russian). [9] O.A. Logachev, S.V. Smyshlyaev, V.V. Yashchenko. New methods of investigation of perfectly balanced Boolean functions. Discrete Mathematics and Applications. Volume 9, Issue 3, Pages , ISSN (Online) , ISSN (Print) , DOI: 0.55/DMA , /July/2009. [0] F.P. Preparata. Convolutional Transformations of Binary Sequences: Boolean Functions and Their Resynchronizing Properties. IEEE Trans. Electron. Comput., 966, v.5, N6, pp [] S.N. Sumarokov, Functions of defect zero and invertability of some class of finite-memory encoders, Obozrenie prom. i prikl. mat. () (994) (in Russian). Appendix A Proof of Theorem 3.2. Denote by γ(f, l) the maximum possible (over all (y, y 2,..., y l ) V l ) number of solutions to the system { f(x s, x s+,..., x s+n ) = y s (5.) s =, 2,..., l. It is obvious that if for some f there are no sequences x, z such that (3.)-(3.4) hold, then the output sequence (y, y 2,..., y r n+ ) = f r n+ (x) and x, x 2,..., x n ; x r n+,..., x r determine the whole input sequence x, and so, for any integer l, γ(f, l) 2 2n 2. It is easy to show that in the opposite case γ(f, l) is unbounded as a function of l with l. In the remaining part of the proof it is shown that γ(f, l) is bounded (with l ) iff f is perfectly balanced. By definition, for any f PB n and any natural l γ(f, l) = 2 n, i. e. γ(f, l) is not unbounded with l. Let f / PB n. Then there is an integer l and a tuple ỹ = (ỹ, ỹ 2,..., ỹ l ) V l, such that there exist 2 n + α solutions to (5.), where α. For the tuple ỹ V l construct the set of all possible sequences of length (k+)l+k(n ) of the following form: ỹ,..., ỹ l, y l+,..., y l+n, ỹ,..., ỹ l, y 2l+n,..., y 2l+2(n ),......, y kl+(k )(n )+,..., y kl+k(n ), ỹ,..., ỹ l, (5.2) 7

8 k =, 2,..., where y i F 2, i = l +, l + 2,..., l + n ; 2l + n, 2l + n 2,.... Let µ k denote the average number of inputs of f (k+)l+k(n ) that correspond to one output of the form (5.2). In this case, µ k = 2 n ( + α 2 n )k+, so µ k with k. That is, for any integer M there is an integer k = k(m) such that µ k(m) > M, i. e. preimage of one of the sequences (5.2) of length t(m) = (k(m)+)l + k(m)(n ) is of cardinality greater than M. This means that for arbitrary M there exists t(m) such that γ(f, t(m)) > M and thus γ(f, l) is unbounded as a function of l. Appendix B Proof of Lemma 4.3. Consider the set of all essential B-index variables of fγ i and let the variable in this set with the maximal B-index correspond to the (N τ k rδ k ) th variable of f γ, r m k. It is evident that in this case there is another B-index variable corresponding to (N τ k (r + )δ k ) th variable of f γ. According to conditions of Case, this variable is linear as well. Therefore r m k 2, m k 3. Next one has to prove that no other B-index variable is essential for fγ i. It suffices to show that variables of f γ with indices N τ k rδ k l b j, b j {, 0, }, j =,..., l are not essential for f γ except for two trivial cases ( l j= b j = 0 ). j= l j= b j = δ k and Let k j = k. Two cases are possible. ) j > j : b j 0 and let j be the maximal index j such that b j 0. Evidently, it suffices to consider the case of b j =. Then N τ k rδ k l b j N τ k rδ k + j l j= j= < N τ k rδ k 4m( )τ k j < N τ kj. Also, the following inequality holds. N τ k rδ k l b j = N (τ k+ (m k r)δ k ) b j N (τ k+ 2δ k ) l b j N (τ k+ 2δ k ) j j= j= > N (τ k+ 2δ k ) j= j= δ k j. If k j = k, then k j = k and one can estimate the last expression as follows: N (τ k+ 2δ k ) δ k j = N τ k+ +δ k δ k δ k+ > N τ k+ δ k+ = N τ kj. Else N (τ k+ 2δ k ) δ δ kj k j > N τ k+ δ k j N τ k+ δ k j N τ kj δ k j > N ( + ) δ 4m k j = N τ k j τ k j m kj ( + ) δ 4m k j > N τ k j m kj ( ++ ) δ 4m k j N τ k j m kj ( ++ ) δ 2 23 k j N τ k j ( + + ) δ k j > N τ kj. This implies that all the variables with indices j > j, b j = occur in the interval (N τ kj, N τ kj ) and thus could not be essential for f γ. 8

9 2) j > j b j = 0 ; j < j : b j 0 (if there are multiple such j, we choose the largest one). If b j =, then N τ k rδ k l b j > N τ k rδ k δ k > N τ k (r + 2)δ k ; j= j= N τ k rδ k l b j < N τ k rδ k, N τ k rδ k l b j N τ k (r + )δ k. If b j = 0, then N τ k rδ k l j= j= j= b j > N τ k rδ k δ k > N τ k (r + )δ k ; N τ k rδ k l b j < N τ k (r )δ k, N τ k rδ k l b j N τ k rδ k. Thus, in this case variables are not essential too. Appendix C Proof of Lemma 4.4. By contradiction, let for some fγ i two B-index variables correspond to (N τ k ) th and (N τ p ) th variables of f γ, p > k. Then j= τ p τ k = l j= b j, b j {, 0, }. (5.3) ) Let the set K = {j k j p, b j = } be nonempty and let j be the maximum element of this set. Then l b j j > δ k j > ( ) > 4m( )τ p > τ p τ k. j= 2) Let K be empty, i.e. b j 0, k j p. Then l b j j= j= j p j= < δ k jp, where k jp p. δ k jp = τ kjp + τ kjp m kjp 8 τ kjp + τ kjp 8 τ p τ p < τ p τ p τ p τ k. Hence, (5.3) is impossible and this concludes the proof of the Lemma. Appendix D Proof of Lemma 4.5. We have to prove that equality τ a τ b + l j= a j = τ c τ d + l j= a j (5.4) does not hold if conditions are not satisfied. τ a = τ c τ b = τ d a j = a j, j =,..., l (5.5) 9

10 First, we prove that equality l j= a j = l j= a j holds only if a j = a j, j =,..., l. Let a j a j, a j =, a j = 0 and let j be the largest index such that a j a j. Then l j= a j l j= j= a j j a j = + j j= j j= a j j j= a j > δ k j > 0. Consider indices a, b, c, d, e+, e = k j, where j is the largest index such that a j a j. One can transform (5.4) as follows: τ a τ b = τ c τ d + j b j, b j = a j a j, j =,..., j. Let q = max{a, b, c, d, e + }. We have (up to equivalence) five possibilities. ) q = a, q > b, q > c, q > d, q > e +. Then τ a = τ q > (4m 2 + )τ q 5τ q τ b + (τ c τ d ) + 3τ q τ b + τ c τ d + 3δ q 2 > τ b + τ c τ d + δ q 2 > τ b + τ c τ d + j τ b + τ c τ d + j b j, hence equality (5.4) does not hold. j= 2) q = e +, a e, b e, c e, d e. Let b j = (the case of b j = is treated along the same lines). δ e > 4mτ e > 2τ e + 2δ e > (τ a τ b + τ d τ c ) + δ e + δ e > τ a τ b + τ d τ c + j τ a τ b + τ d τ c + j b j, thus equality (5.4) does not hold. j= 3) q = a = c. Then (5.4) can be transformed into τ d = τ b + j b j. If b = d, then (5.4) turns into j j= j= j= j= b j = 0, which holds only if b j = 0, j =,..., j. If d > b (or d < b, that can be treated similarly), we denote q = max{b, d, e + } and consider three subcases. d = q > e+. Then τ d > (4m 2 +)τ q > τ b +4m 2 τ q > τ b +4m 2 δ e > τ b + δ e > τ b + j τ b + j b j. j= j= q = e + > d. Then τ d +τ b +2δ q 2 j j= j j= b j > 4mτ q j = τ d +τ b +2δ e j j= j= j= τ d + τ b + 2τ q j j= > > τ d +τ b + δ k j j > τ d +τ b. j= q = e + = d. Then τ d > 3τ 4 d + m 2 τ q 3τ e+ + τ 2m j b > δ e + τ b > τ b + j τ b + j b kj. j= j= 0

11 In fact, other subcases are possible but each of them is equivalent to one of the above. 4) q = a = d, b < q, c < q. Then e + q and hence τ a + τ d > (4m 2 + )τ q + τ q > τ c + τ b + τ q τ c + τ b + 2δ e > τ c + τ b + δ e > τ c + τ b + j b j, thus (5.4) does not hold in this case either. 5) q = a = e +, b < q, c < q, d < q. Then τ a = 3τa 4 + τa 4 > 3τ e+ + m 2 τ 4 q. e = k j, so m e 2, m 2. Then 3τ e+ + m 2 τ 4 q > 3τ e+ 2m e + 3τ q > 3δ 2 e + 3τ q > ( + e + τ b + (τ c τ d ) > j + τ b + (τ c τ d ) j b j + τ b + τ c τ d. This implies that (5.4) does not j= hold in this case either. j= j=

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Linear Approximations for 2-round Trivium

Linear Approximations for 2-round Trivium Linear Approximations for 2-round Trivium Meltem Sönmez Turan 1, Orhun Kara 2 1 Institute of Applied Mathematics, Middle East Technical University Ankara, Turkey msonmez@metu.edu.tr 2 TUBITAK-UEKAE, Gebze,

More information

A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS

A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS Guanhan Chew, Khoongming Khoo DSO National Laboratories, 20 Science Park Drive, Singapore 118230 cguanhan,kkhoongm@dso.org.sg

More information

Optimal XOR based (2,n)-Visual Cryptography Schemes

Optimal XOR based (2,n)-Visual Cryptography Schemes Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev Abstract. Low degree annihilators for Boolean functions are of great interest in cryptology because of

More information

The Indistinguishability of the XOR of k permutations

The Indistinguishability of the XOR of k permutations The Indistinguishability of the XOR of k permutations Benoit Cogliati, Rodolphe Lampe, Jacques Patarin University of Versailles, France Abstract. Given k independent pseudorandom permutations f 1,...,

More information

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES Jovan Dj. Golić Security Innovation, Telecom Italia Via Reiss Romoli 274, 10148 Turin, Italy (Submitted August 2004-Final Revision April 200) ABSTRACT

More information

COMBINATORIAL COUNTING

COMBINATORIAL COUNTING COMBINATORIAL COUNTING Our main reference is [1, Section 3] 1 Basic counting: functions and subsets Theorem 11 (Arbitrary mapping Let N be an n-element set (it may also be empty and let M be an m-element

More information

5 Set Operations, Functions, and Counting

5 Set Operations, Functions, and Counting 5 Set Operations, Functions, and Counting Let N denote the positive integers, N 0 := N {0} be the non-negative integers and Z = N 0 ( N) the positive and negative integers including 0, Q the rational numbers,

More information

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed

More information

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? Alexander Rostovtsev alexander. rostovtsev@ibks.ftk.spbstu.ru St. Petersburg State Polytechnic University Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? In [eprint.iacr.org/2009/117]

More information

Smart Hill Climbing Finds Better Boolean Functions

Smart Hill Climbing Finds Better Boolean Functions Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,

More information

Non-Separable Cryptographic Functions

Non-Separable Cryptographic Functions International Symposium on Information Theory and Its Applications Honolulu, Hawaii, USA, November 5 8, 2000 Non-Separable Cryptographic Functions Yuliang Zheng and Xian-Mo Zhang School of Network Computing

More information

Generalized Correlation Analysis of Vectorial Boolean Functions

Generalized Correlation Analysis of Vectorial Boolean Functions Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,

More information

Maiorana-McFarland class: Degree optimization and algebraic properties

Maiorana-McFarland class: Degree optimization and algebraic properties Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

Cryptanalysis of the Stream Cipher ABC v2

Cryptanalysis of the Stream Cipher ABC v2 Cryptanalysis of the Stream Cipher ABC v2 Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.preneel}@esat.kuleuven.be

More information

Bounds on Birthday Attack Times

Bounds on Birthday Attack Times Bounds on Birthday Attack Times Michael J Wiener 20 Hennepin St, Nepean, Ontario, Canada K2J 3Z4 michaelwiener at sympaticoca 2005 September 8 Abstract We analyze a generic birthday attack where distinct

More information

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4 CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky Lecture 4 Lecture date: January 26, 2005 Scribe: Paul Ray, Mike Welch, Fernando Pereira 1 Private Key Encryption Consider a game between

More information

Math-Net.Ru All Russian mathematical portal

Math-Net.Ru All Russian mathematical portal Math-Net.Ru All Russian mathematical portal G. P. Agibalov, I. A. Pankratova, Asymmetric cryptosystems on Boolean functions, Prikl. Diskr. Mat., 2018, Number 40, 23 33 DOI: https://doi.org/10.17223/20710410/40/3

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

New Construction of Single Cycle T-function Families

New Construction of Single Cycle T-function Families New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is

More information

The LILI-128 Keystream Generator

The LILI-128 Keystream Generator The LILI-128 Keystream Generator E. Dawson 1 A. Clark 1 J. Golić 2 W. Millan 1 L. Penna 1 L. Simpson 1 1 Information Security Research Centre, Queensland University of Technology GPO Box 2434, Brisbane

More information

1 The Algebraic Normal Form

1 The Algebraic Normal Form 1 The Algebraic Normal Form Boolean maps can be expressed by polynomials this is the algebraic normal form (ANF). The degree as a polynomial is a first obvious measure of nonlinearity linear (or affine)

More information

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used

More information

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong 1, and Mingsheng Wang 3 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China. Graduate School

More information

Modified Alternating Step Generators

Modified Alternating Step Generators Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik Military Communication Institute Warszawska 22A, 05-130 Zegrze, Poland {r.wicik, t.rachwalik}@wil.waw.pl Abstract. Irregular clocking

More information

A Byte-Based Guess and Determine Attack on SOSEMANUK

A Byte-Based Guess and Determine Attack on SOSEMANUK A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy

More information

AES side channel attacks protection using random isomorphisms

AES side channel attacks protection using random isomorphisms Rostovtsev A.G., Shemyakina O.V., St. Petersburg State Polytechnic University AES side channel attacks protection using random isomorphisms General method of side-channel attacks protection, based on random

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

Towards Provable Security of Substitution-Permutation Encryption Networks

Towards Provable Security of Substitution-Permutation Encryption Networks Towards Provable Security of Substitution-Permutation Encryption Networks Zhi-Guo Chen and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University at Kingston, Ontario,

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

Correlation Analysis of the Shrinking Generator

Correlation Analysis of the Shrinking Generator Correlation Analysis of the Shrinking Generator Jovan Dj. Golić GEMPLUS Rome CryptoDesign Center, Technology R&D Via Pio Emanuelli 1, 00143 Rome, Italy Email: jovan.golic@gemplus.com Abstract. The shrinking

More information

On the pseudo-random generator ISAAC

On the pseudo-random generator ISAAC On the pseudo-random generator ISAAC Jean-Philippe Aumasson FHNW, 5210 Windisch, Switzerland Abstract. This paper presents some properties of he deterministic random bit generator ISAAC (FSE 96), contradicting

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

On the Linear Complexity of Feedback Registers

On the Linear Complexity of Feedback Registers On the Linear Complexity of Feedback Registers (extended abstract) A. H. Chan M. Goresky A. Klapper ru ortheastern University College of Computer Science 360 Huntington Ave. Boston, MA, 02113 ABSTRACT

More information

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS italian journal of pure and applied mathematics n. 37 2017 (173 182) 173 COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS Shashi Kant Pandey Department of Mathematics University

More information

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity arxiv:cs/0605139v1 [cs.cr] 30 May 2006 Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity Na Li, Wen-Feng Qi Department of Applied Mathematics, Zhengzhou

More information

THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER. A. A. Zadeh and Howard M. Heys

THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER. A. A. Zadeh and Howard M. Heys THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER A. A. Zadeh and Howard M. Heys Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland

More information

Improved Cascaded Stream Ciphers Using Feedback

Improved Cascaded Stream Ciphers Using Feedback Improved Cascaded Stream Ciphers Using Feedback Lu Xiao 1, Stafford Tavares 1, Amr Youssef 2, and Guang Gong 3 1 Department of Electrical and Computer Engineering, Queen s University, {xiaolu, tavares}@ee.queensu.ca

More information

Leaf Management. Jeffry L. Hirst. December 23, 2018

Leaf Management. Jeffry L. Hirst. December 23, 2018 arxiv:1812.09762v1 [math.lo] 23 Dec 2018 Leaf Management Jeffry L. Hirst December 23, 2018 Abstract Finding the set of leaves for an unbounded tree is a nontrivial process in both the Weihrauch and reverse

More information

The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function

The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function An Braeken 1 and Igor Semaev 2 1 Department Electrical Engineering, ESAT/COSIC, Katholieke Universiteit Leuven,

More information

Pseudorandom Generators

Pseudorandom Generators 8 Pseudorandom Generators Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 andomness is one of the fundamental computational resources and appears everywhere. In computer science,

More information

Fast correlation attacks on certain stream ciphers

Fast correlation attacks on certain stream ciphers FSE 2011, February 14-16, Lyngby, Denmark Fast correlation attacks on certain stream ciphers Willi Meier FHNW Switzerland 1 Overview A decoding problem LFSR-based stream ciphers Correlation attacks Fast

More information

A Byte-Based Guess and Determine Attack on SOSEMANUK

A Byte-Based Guess and Determine Attack on SOSEMANUK A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy

More information

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions

More information

An algorithm to increase the node-connectivity of a digraph by one

An algorithm to increase the node-connectivity of a digraph by one Discrete Optimization 5 (2008) 677 684 Contents lists available at ScienceDirect Discrete Optimization journal homepage: www.elsevier.com/locate/disopt An algorithm to increase the node-connectivity of

More information

Statistical Properties of Multiplication mod 2 n

Statistical Properties of Multiplication mod 2 n Noname manuscript No. (will be inserted by the editor) Statistical Properties of Multiplication mod 2 n A. Mahmoodi Rishakani S. M. Dehnavi M. R. Mirzaee Shamsabad Hamidreza Maimani Einollah Pasha Received:

More information

On The Nonlinearity of Maximum-length NFSR Feedbacks

On The Nonlinearity of Maximum-length NFSR Feedbacks On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main

More information

Computing the biases of parity-check relations

Computing the biases of parity-check relations Computing the biases of parity-check relations Anne Canteaut INRIA project-team SECRET B.P. 05 7853 Le Chesnay Cedex, France Email: Anne.Canteaut@inria.fr María Naya-Plasencia INRIA project-team SECRET

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

arxiv: v1 [cs.it] 27 Sep 2016

arxiv: v1 [cs.it] 27 Sep 2016 Optimizing the placement of tap positions and guess and determine cryptanalysis with variable sampling S. Hodžić, E. Pasalic, and Y. Wei arxiv:1609.08422v1 [cs.it] 27 Sep 2016 Abstract 1 In this article

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi 1,2, Lei Hu 1,2, Siwei Sun 1,2, Ling Song 1,2, Kexin Qiao 1,2, Xiaoshuang Ma 1,2 1 State Key Laboratory of Information

More information

Preimage Attacks on Reduced Tiger and SHA-2

Preimage Attacks on Reduced Tiger and SHA-2 Preimage Attacks on Reduced Tiger and SHA-2 Takanori Isobe and Kyoji Shibutani Sony Corporation 1-7-1 Konan, Minato-ku, Tokyo 108-0075, Japan {Takanori.Isobe,Kyoji.Shibutani}@jp.sony.com Abstract. This

More information

a = a i 2 i a = All such series are automatically convergent with respect to the standard norm, but note that this representation is not unique: i<0

a = a i 2 i a = All such series are automatically convergent with respect to the standard norm, but note that this representation is not unique: i<0 p-adic Numbers K. Sutner v0.4 1 Modular Arithmetic rings integral domains integers gcd, extended Euclidean algorithm factorization modular numbers add Lemma 1.1 (Chinese Remainder Theorem) Let a b. Then

More information

Perfect Diffusion Primitives for Block Ciphers

Perfect Diffusion Primitives for Block Ciphers Perfect Diffusion Primitives for Block Ciphers Building Efficient MDS Matrices Pascal Junod and Serge Vaudenay École Polytechnique Fédérale de Lausanne (Switzerland) {pascaljunod, sergevaudenay}@epflch

More information

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

A Fast Correlation Attack on the Shrinking Generator

A Fast Correlation Attack on the Shrinking Generator A Fast Correlation Attack on the Shrinking Generator Bin Zhang 1,2,HongjunWu 1, Dengguo Feng 2, and Feng Bao 1 1 Institute for Infocomm Research, Singapore 2 State Key Laboratory of Information Security,

More information

arxiv: v5 [cs.it] 4 Nov 2009

arxiv: v5 [cs.it] 4 Nov 2009 1 Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables WeiGuo ZHANG and GuoZhen XIAO ISN Lab, Xidian University, Xi an 710071, P.R.China arxiv:0905.0794v5 [cs.it]

More information

Distinguishing Stream Ciphers with Convolutional Filters

Distinguishing Stream Ciphers with Convolutional Filters Distinguishing Stream Ciphers with Convolutional Filters Joan Daemen and Gilles Van Assche STMicroelectronics Smart Cards ICs Division Excelsiorlaan 44 46, 930 Zaventem, Belgium February 5, 2005 Abstract

More information

Algebraic Attacks on Stream Ciphers with Linear Feedback

Algebraic Attacks on Stream Ciphers with Linear Feedback Algebraic Attacks on Stream Ciphers with Linear Feedback Extended Version of the Eurocrypt 2003 paper, August 24, 2003 Nicolas T. Courtois 1 and Willi Meier 2 1 Cryptography Research, Schlumberger Smart

More information

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Frédéric Lardeux 3, Eric Monfroy 1,2, and Frédéric Saubion 3 1 Universidad Técnica Federico Santa María, Valparaíso, Chile 2 LINA, Université

More information

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If

More information

Matrix Power S-Box Construction

Matrix Power S-Box Construction Matrix Power S-Box Construction Eligijus Sakalauskas a and Kestutis Luksys b Department of Applied Mathematics, Kaunas University of Technology, Studentu g. 50, 52368 Kaunas, Lithuania a Eligijus.Sakalauskas@ktu.lt

More information

Homework 3 Solutions, Math 55

Homework 3 Solutions, Math 55 Homework 3 Solutions, Math 55 1.8.4. There are three cases: that a is minimal, that b is minimal, and that c is minimal. If a is minimal, then a b and a c, so a min{b, c}, so then Also a b, so min{a, b}

More information

MASKING is the most widely deployed countermeasure

MASKING is the most widely deployed countermeasure 1 Corrections to Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng Abstract Provably secure masking schemes

More information

Copyright 2013 Springer Science+Business Media New York

Copyright 2013 Springer Science+Business Media New York Meeks, K., and Scott, A. (2014) Spanning trees and the complexity of floodfilling games. Theory of Computing Systems, 54 (4). pp. 731-753. ISSN 1432-4350 Copyright 2013 Springer Science+Business Media

More information

Extension of continuous functions in digital spaces with the Khalimsky topology

Extension of continuous functions in digital spaces with the Khalimsky topology Extension of continuous functions in digital spaces with the Khalimsky topology Erik Melin Uppsala University, Department of Mathematics Box 480, SE-751 06 Uppsala, Sweden melin@math.uu.se http://www.math.uu.se/~melin

More information

A Scalable Method for Constructing Galois NLFSRs with Period 2 n 1 using Cross-Join Pairs

A Scalable Method for Constructing Galois NLFSRs with Period 2 n 1 using Cross-Join Pairs A Scalable Method for Constructing Galois NLFSRs with Period 2 n 1 using Cross-Join Pairs Elena Dubrova Royal Institute of Technology (KTH), Forum 12, 164 4 Kista, Sweden {dubrova}@kth.se Abstract. This

More information

Lecture 4: Perfect Secrecy: Several Equivalent Formulations

Lecture 4: Perfect Secrecy: Several Equivalent Formulations Cryptology 18 th August 015 Lecture 4: Perfect Secrecy: Several Equivalent Formulations Instructor: Goutam Paul Scribe: Arka Rai Choudhuri 1 Notation We shall be using the following notation for this lecture,

More information

2. The Concept of Convergence: Ultrafilters and Nets

2. The Concept of Convergence: Ultrafilters and Nets 2. The Concept of Convergence: Ultrafilters and Nets NOTE: AS OF 2008, SOME OF THIS STUFF IS A BIT OUT- DATED AND HAS A FEW TYPOS. I WILL REVISE THIS MATE- RIAL SOMETIME. In this lecture we discuss two

More information

Characterizing Ideal Weighted Threshold Secret Sharing

Characterizing Ideal Weighted Threshold Secret Sharing Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel Tamir Tassa Enav Weinreb August 12, 2004 Abstract Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret

More information

In N we can do addition, but in order to do subtraction we need to extend N to the integers

In N we can do addition, but in order to do subtraction we need to extend N to the integers Chapter 1 The Real Numbers 1.1. Some Preliminaries Discussion: The Irrationality of 2. We begin with the natural numbers N = {1, 2, 3, }. In N we can do addition, but in order to do subtraction we need

More information

Vol. 2(1997): nr 4. Tight Lower Bounds on the. Approximability of Some. Peter Jonsson. Linkoping University

Vol. 2(1997): nr 4. Tight Lower Bounds on the. Approximability of Some. Peter Jonsson. Linkoping University Linkoping Electronic Articles in Computer and Information Science Vol. 2(1997): nr 4 Tight Lower Bounds on the Approximability of Some NPO PB-Complete Problems Peter Jonsson Department of Computer and

More information

Multiplicative Complexity Reductions in Cryptography and Cryptanalysis

Multiplicative Complexity Reductions in Cryptography and Cryptanalysis Multiplicative Complexity Reductions in Cryptography and Cryptanalysis THEODOSIS MOUROUZIS SECURITY OF SYMMETRIC CIPHERS IN NETWORK PROTOCOLS - ICMS - EDINBURGH 25-29 MAY/2015 1 Presentation Overview Linearity

More information

CSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits

CSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits CSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits Chris Calabro January 13, 2016 1 RAM model There are many possible, roughly equivalent RAM models. Below we will define one in the fashion

More information

Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes

Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes Weihua Hu Dept. of Mathematical Eng. Email: weihua96@gmail.com Hirosuke Yamamoto Dept. of Complexity Sci. and Eng. Email: Hirosuke@ieee.org

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko Approximation Algorithms for Maximum Coverage and Max Cut with Given Sizes of Parts? A. A. Ageev and M. I. Sviridenko Sobolev Institute of Mathematics pr. Koptyuga 4, 630090, Novosibirsk, Russia fageev,svirg@math.nsc.ru

More information

A New Distinguisher on Grain v1 for 106 rounds

A New Distinguisher on Grain v1 for 106 rounds A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai 600036, India. sarkar.santanu.bir@gmail.com Abstract.

More information

Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks

Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks Jung-Keun Lee, Dong Hoon Lee, and Sangwoo Park ETRI Network & Communication Security Division, 909 Jeonmin-dong, Yuseong-gu, Daejeon, Korea Abstract.

More information

Perfect Algebraic Immune Functions

Perfect Algebraic Immune Functions Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, and Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, Beijing 100195, P. R. China meicheng.liu@gmail.com, zhangy@is.iscas.ac.cn,

More information

PERIODS IMPLYING ALMOST ALL PERIODS FOR TREE MAPS. A. M. Blokh. Department of Mathematics, Wesleyan University Middletown, CT , USA

PERIODS IMPLYING ALMOST ALL PERIODS FOR TREE MAPS. A. M. Blokh. Department of Mathematics, Wesleyan University Middletown, CT , USA PERIODS IMPLYING ALMOST ALL PERIODS FOR TREE MAPS A. M. Blokh Department of Mathematics, Wesleyan University Middletown, CT 06459-0128, USA August 1991, revised May 1992 Abstract. Let X be a compact tree,

More information

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

MATH 722, COMPLEX ANALYSIS, SPRING 2009 PART 5

MATH 722, COMPLEX ANALYSIS, SPRING 2009 PART 5 MATH 722, COMPLEX ANALYSIS, SPRING 2009 PART 5.. The Arzela-Ascoli Theorem.. The Riemann mapping theorem Let X be a metric space, and let F be a family of continuous complex-valued functions on X. We have

More information

Nonlinear Equivalence of Stream Ciphers

Nonlinear Equivalence of Stream Ciphers Sondre Rønjom 1 and Carlos Cid 2 1 Crypto Technology Group, Norwegian National Security Authority, Bærum, Norway 2 Information Security Group, Royal Holloway, University of London Egham, United Kingdom

More information

Equivalences of Basic Cryptographic Functions

Equivalences of Basic Cryptographic Functions Chapter 6 Equivalences of Basic Cryptographic Functions In real world applications the basic cryptographic functions 1. Symmetric ciphers: (a) bitblock ciphers (b) bitstream ciphers 2. Asymmetric ciphers

More information

Two Notions of Differential Equivalence on Sboxes

Two Notions of Differential Equivalence on Sboxes Two Notions of Differential Equivalence on Sboxes Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder To cite this version: Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder. Two Notions

More information

Undecidable Problems. Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, / 65

Undecidable Problems. Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, / 65 Undecidable Problems Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, 2018 1/ 65 Algorithmically Solvable Problems Let us assume we have a problem P. If there is an algorithm solving

More information

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays The 2006 International Seminar of E-commerce Academic and Application Research Tainan, Taiwan, R.O.C, March 1-2, 2006 An Application of Coding Theory into Experimental Design Construction Methods for Unequal

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou 1, Huiting Han 1, Chunming Tang 1, and Maozhi Xu 1,2 1 LMAM, School of Mathematical Sciences, Peing

More information

Cryptanalysis of Achterbahn

Cryptanalysis of Achterbahn Cryptanalysis of Achterbahn Thomas Johansson 1, Willi Meier 2, and Frédéric Muller 3 1 Department of Information Technology, Lund University P.O. Box 118, 221 00 Lund, Sweden thomas@it.lth.se 2 FH Aargau,

More information

A note on monotone real circuits

A note on monotone real circuits A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using

More information

Randomness and non-uniformity

Randomness and non-uniformity Randomness and non-uniformity JASS 2006 Course 1: Proofs and Computers Felix Weninger TU München April 2006 Outline Randomized computation 1 Randomized computation 2 Computation with advice Non-uniform

More information

NUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND

NUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND #A1 INTEGERS 12A (2012): John Selfridge Memorial Issue NUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND Harry Altman Department of Mathematics, University of Michigan, Ann Arbor, Michigan haltman@umich.edu

More information