Third-order nonlinearities of some biquadratic monomial Boolean functions

Size: px
Start display at page:

Download "Third-order nonlinearities of some biquadratic monomial Boolean functions"

Transcription

1 Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this paper, we estimate the lower bounds on third-order nonlinearities of some biquadratic monomial Boolean functions of the form Tr n 1 (λxd ) for all x F n, where λ F n, (1) d = i + j + k + 1, i, j,k are integers such that i > j > k 1 and n > i. () d = 3l + l + l + 1, l is a positive integer such that gcd(i,n) = 1 and n > 6. Keywords Boolean functions Walsh-Hadamard spectrum Third-order nonlinearities Linearized polynomial 1 Introduction Let B n be the set of all Boolean functions on n variables and let r be a positive integer smaller than n. Reed Muller code, RM(r,n), of order r and length n is the set of all Boolean functions in B n with algebraic degree less than or equal to r. The rth-order nonlinearity of any function f B n is defined as nl r ( f ) = min h RM(r,n) d( f,h). The sequence of values, nl r ( f ), 1 r n 1, is said to be the nonlinearity profile of f. Since RM(r 1,n) RM(r,n), therefore nl r ( f ) nl r 1 ( f ). The first order nonlinearity of f is nl 1 ( f ), is the nonlinearity of f which we denote by nl( f ). The nonlinearity of a Boolean function f is related to the immunity of f against best affine approximation attacks [9] and fast correlation attacks [14], when f is used as a combiner function or a filter function in a stream cipher. Attacks based on higher-order approximations of Boolean functions are found in Golić [9], Courtois [6]. Computing rth-order nonlinearity is not an easy task (r ). Unlike the first-order nonlinearity there is no efficient algorithms to compute second-order nonlinearities for n 11. Most efficient algorithm due to Fourquet and Tavernier [7] works for n 11 and, up to n = 13 for some special functions. Thus, there is a need to construct Boolean functions with high rth-order nonlinearity. The following is the best known asymptotic upper bound on nl 3 ( f ) due to Carlet and Mesnager [5] nl 3 ( f ) n 1 15 (1 + ) n 1 + O(n). Carlet [3] developed a technique for computing lower bounds of higher-order nonlinearities of Boolean functions recursively and using this approach he has obtained the lower bounds of nonlinearity profiles for functions belonging to several classes of functions such as Kasami functions, Welch functions, inverse functions etc.. The classes of Boolean functions for which the lower bound on third nonlinearity is known are inverse functions [3], Dillon functions [4] and Kasami functions, f (x) = Tr n 1 (λx57 ) [8]. In this paper, we deduce the lower bounds on third-order nonlinearities of some biquadratic monomial Boolean functions of the form Tr n 1 (λxd ) for all x F n, where λ F n, (1) d = i + j + k + 1, i, j,k are integers such that i > j > k 1 and n > i. () d = 3l + l + l + 1, l is a positive integer such that gcd(i,n) = 1 and n > 6. Remainder of the paper is organized as follows: The main results on lower bounds of third-order nonlinearities are presented in Section 3. The numerical compression of our bounds with the previous known results is provided in Section 4. Section 5 is conclusion. Research supported by CSIR, INDIA. B. K. Singh Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee INDIA bksingh0584@gmail.com

2 Preliminaries Let F n be the finite field consisting of n elements. The group of units of F n, denoted by F n, is a cyclic group consisting of n 1 elements. An element α F n is said to be a primitive element if it is a generator of the multiplicative group F n. Any function from F n to F is said to be a Boolean function on n variables. Let Z and Z q, where q is a positive integer, denote the ring of integers and integers modulo q, respectively. A cyclotomic coset modulo n 1 of s Z is defined as [13, pp. 104] C s = s,s,s,...,s n s 1 }, (1) where n s is the smallest positive integer such that s s n s (mod n 1). It is a convention to choose the subscript s to be the smallest integer in C s and refer to it as the coset leader of C s and n s denotes the size of C s. The trace function Tr1 n : F n F is defined as Tr n 1 (x) = x + x + x x n 1, for all x F n. () The functions (x,y) Tr1 n(xy) are inner products on F n. The trace representation [10] of a function f B n is f (x) = Tr n k 1 (A kx k ) + A n 1x n 1, for all x F n, (3) k Γ (n) where Γ (n) is the set of all coset leaders modulo n 1 and A k F n k, A n 1 F, for all k Γ (n). A Boolean function is said to be a monomial trace function (sometimes monomial Boolean function) or said to have monomial trace representation if its trace representation consists of only one trace term. The binary representation of an integer d Z is d = d m 1 m 1 + d m m d 1 + d 0, (4) where d 0,d 1,...,d m 1 0,1}. The Hamming weight of d is w H (d) = m 1 i=0 d i, where the sum is over Z. The algebraic degree, denoted by deg( f ), of f B n, as represented in (3), is the largest positive integer w for which w H (k) = w and A k 0. The support of f B n is supp( f ) = x F n : f (x) 0}. The weight of f is w H ( f ) = x F n : f (x) 0}, where S is the cardinality of any set S. The Hamming distance between two functions f,g B n is defined by d( f,g) = x F n : f (x) g(x)}. The Walsh Hadamard transform of f B n at λ F n is defined as W f (λ) = ( 1) f (x)+trn 1 (λx). x F n The multiset W f (λ) : λ F n} is said to be the Walsh-Hadamard spectrum of f. The frequency distribution of the values in the Walsh-Hadamard spectrum of f is referred to as the weight distribution of the Walsh- Hadamard spectrum of f. The nonlinearity of a Boolean function f B n in terms of its Walsh-Hadamard spectrum is given by By Parseval s identity, nl( f ) = n 1 1 max W f (λ). λ F n W f (λ) = n, λ F n it can be shown that max W f (λ) : λ F n} n which implies that nl( f ) n 1 n 1. Definition 1 [15] A function f B n (for even n) is said to be a bent function if and only if W f (λ) n, n } for all λ F n or equivalently f is bent if and only if nl( f ) = n 1 n 1. Definition The derivative of f B n with respect to a F n is defined as D a f (x) = f (x) + f (x + a) for all x F n. The higher-order derivatives of a Boolean function are defined as follows. Definition 3 Let V be an r-dimensional subspace of F n generated by a 1,...,a r, i.e., V = a 1,...,a r. The rthorder derivative of f B n with respect to V, is the function D V f B n, defined by D V f (x) = D a1...d ar f (x). It is to be noted that rth-order derivative of f depends only on the choice of the r-dimensional subspace V and independent of the choice of the basis of V. The notion of rth-order bent functions have introduced by Iwata, Kurosawa [11] which is defined as follows.

3 3 Definition 4 [11] For any positive integer r n 3, a function f B n is said to be rth-order bent if and only if nl r ( f ) n r 3 (r + 4), if r = 0 mod, n r 3 (r + 5), if r = 1 mod. Following are some results on recursive lower bounds on third-order nonlinearities due to Carlet [3] which we use to estimate our bounds. Proposition 1 [3, Proposition ] Let f B n. Then nl 3 ( f ) 1 4 Proposition [3, Eq. 1] Let f B n. Then nl 3 ( f ) n 1 1 max nl(d a 1,a F n a D a1 f ). a F n n nl(d a D b f ). b F n The following result known as McEliece s Theorem is useful for improving the bounds of the rth-order nonlinearities. Proposition 3 [13, Chap. 15, Cor. 13] The rth-order nonlinearities of a Boolean function f B n with algebraic degree d, is divisible by n d 1. Following proposition is due to Bracken et al. [1] which provides an information on the zeroes of the linearized polynomials [1,13] of particular type. Proposition 4 [1, Cor. 1] Let L(x) = v i=0 c ix ik be a linearized polynomial over F n, where v,k are positive integers such that gcd(n,k) = 1. Then zeroes of the linearized polynomial L(x) in F n are at most v..1 Quadratic Boolean Functions Suppose f B n be a quadratic Boolean function. The bilinear form [13] associated with f is defined by B(x,y) = f (0) + f (x) + f (y) + f (x + y) and the kernel, E f, of B(x,y) is the subspace of F n defined by E f = x F n : B(x,y) = 0 for all y F n}. Any element c E f is said to be a linear structure of f. Lemma 1 [, Proposition 1] Let V be a vector space over a field F q of characteristic and Q : V F q be a quadratic form. Then the dimension of V and the dimension of the kernel of Q have the same parity. If f B n is a quadratic Boolean function then the weight distribution of the Walsh-Hadamard spectrum to f depends only on the dimension k of E f which is given in Table 1 [,13]. Table 1 Weight distribution of the Walsh-Hadamard spectrum of a quadratic Boolean function f B n W f (α) Number of α 0 n n k (n+k)/ n k 1 + ( 1) f (0) (n k )/ (n+k)/ n k 1 ( 1) f (0) (n k )/

4 4 3 Main results In this section, we deduce the lower bounds of third-order nonlinearities of monomial Boolean functions of degree 4. Theorem 1 Let f λ (x) = Tr1 n(λxi + j + k +1 ), for all x F n, where λ F n, i, j,k are integers such that i > j > k 1 and n > i. Then nl 3 ( f λ ) n 3 n+i 6, if n = 0 mod, n 3 n+i 7 (5), if n = 1 mod. In particular, if gcd( j k, n) = 1, then n 1 1 ( n 1) nl 3 ( f λ ) n 1 1 ( n 1) 3n+i + n+1 n+i+ 3n+i 1 + n+1 n+i+1, if n = 0 mod,, if n = 1 mod. (6) Proof Derivative of f λ with respect to a F n is D a f λ (x) = f λ (x + a) + f λ (x) = Tr n 1 (λ(x + a)i + j + k +1 ) + Tr n 1 (λxi + j + k +1 ) = Tr n 1 (λ(axi + j + k + a i x j + k +1 + a j x i + k +1 + a k x i + j +1 )) + q(x), where q is a quadratic Boolean function. The second derivative D b D a f λ with respect to a,b F n, where a b is D b D a f λ (x) = f λ (x + a + b) + f λ (x + a) + f λ (x + b) + f λ (x) = Tr n 1 (λ(x + a + b)i + j + k +1 ) + Tr n 1 (λ(x + b)i + j + k +1 ) + Tr n 1 (λ(x + a)i + j + k +1 ) + Tr n 1 (λxi + j + k +1 ) = l(x) + Tr n 1 (λ((abk + a k b)x i + j + (ab j + a j b)x i + k + (ab i + a i b)x j + k + (a j b k + a k b j )x i +1 + (a i b k + a k b i )x j +1 + (a i b j + a j b i )x k +1 )), where l is an affine function. If D b D a f λ is quadratic, then the Walsh-Hadamard spectrum of D b D a f λ is equivalent to the Walsh-Hadamard spectrum of the function h λ obtained by removing l from D b D a f λ. h λ (x) = Tr n 1 (λ((abk + a k b)x i + j + (ab j + a j b)x i + k + (a j b k + a k b j )x i +1 +(ab i + a i b)x j + k + (a i b k + a k b i )x j +1 + (a i b j + a j b i )x k +1 )). Since E hλ = x F n : B(x,y) = 0 for all y F n }, where B(x,y) is the bilinear form associated with h λ. Using y n = y and Tr1 n(x)i = Tr1 n(x) for all x,y F n. We compute B(x,y) = h λ (0) + h λ (x) + h λ (y) + h λ (x + y) = Tr n 1 (λ(yi ((ab k + a k b)x j + (ab j + a j b)x k + (a j b k + a k b j )x) +y j ((ab k + a k b)x i + (ab i + a i b)x k + (a i b k + a k b i )x) +y k ((ab j + a j b)x i + (ab i + a i b)x j + (a i b j + a j b i )x) +y((a j b k + a k b j )x i + (a i b k + a k b i )x j + (a i b j + a j b i )x k ))) = Tr1 n (yp(x)), where P(x) = (λ(ab k + a k b)x j + λ(ab j + a j b)x k + λ(a j b k + a k b j )x) n i +(λ(ab j + a j b)x i + λ(ab i + a i b)x j + λ(a i b j + a j b i )x) n j +(λ(ab j + a j b)x i + λ(ab i + a i b)x j + λ(a i b j + a j b i )x) n k +λ(a j b k + a k b j )x i + λ(a i b k + a k b i )x j + λ(a i b j + a j b i )x k. Therefore, E hλ = x F n : P(x) = 0 = P(x) i }. (7)

5 5 Let L (λ,a,b) (x) = P(x) i. Using x n = x, y n = y, a n = a, b n = b and λ n = λ, for all x,y,a,b,λ F n, we have ( ) L (λ,a,b) (x) = (P(x)) i = λ (ab j + a j b)x k + (ab k + a k b)x j + (a j b k + a k b j )x + λ i ( (a i+ j b i+k + a i+k b i+ j )x i + (a i+k b i + a i b i+k )x i+ j + (a i b i+ j + a i+ j b i )x i+k) + λ i j ( (a i j b i + a i b i j )x i j + (a i j b i j + a i j b i j )x i + (a i j b i + a i b i j )x i j) + λ i k ( (a i k b i+ j k + a i+ j k b i k )x i k + (a i k b i k + a i k b i k )x i+ j k + (a i k b i+ j k + a i+ j k b i k )x i k). (8) The coefficient of x in L (λ,a,b) (x) is zero if and only if a j b k + a k b j = 0, i.e., a j k b + ab j k = 0 which implies that b af j k. Therefore, for every 0 a,b F n such that b af j k, the degree of linearized polynomial, L (λ,a,b) in x is at most i, this implies that k(a,b) i if n is even otherwise k(a,b) i 1. The Walsh-Hadamard transform of D b D a f λ at µ F n is W Db D a f λ (µ) n+i, if n = 0 mod, n+i 1, if n = 1 mod. Therefore, nl(d b D a f λ ) = n 1 n+i, if n = 0 mod, n 1 n+i 3, if n = 1 mod. (9) Using Proposition 1, we have nl 3 ( f λ ) n 3 n+i 6, if n = 0 mod, n 3 n+i 7, if n = 1 mod. In particular, if gcd( j k,n) = 1, we have k(a,b) i if n is even otherwise k(a,b) i 1 for all a,b F n such that a 0 and b af. Therefore, Eq. (9) holds for all a,b F n such that a 0 and b af. Using Proposition, we have When n = 0 mod nl 3 (g λ ) n 1 1 ( n 1) n ( n )( n 1 n+i ) = n 1 1 ( n 1) 3n+i + n+1 n+i+. (10) When n = 1 mod nl 3 (g λ ) n 1 1 ( n 1) n ( n )( n 1 n+i 3 ) = n 1 1 ( n 1) 3n+i 1 + n+1 n+i+1. (11) Theorem Let g λ (x) = Tr1 n(λx3l + l + l +1 ), for all x F n and λ F n, where l is a positive integer such that gcd(l,n) = 1 and n > 6. Then n 1 1 ( n 1) nl 3 (g λ ) n 1 1 ( n 1) 3n+6 + n+1 n+8 3n+5 + n+1 n+7, if n = 0 mod,, if n = 1 mod.

6 6 Proof The proof is similar to that of Theorem 1 upto Eq. (8). Here the kernel of B(x,y) associated with D b D a g λ is E = x F n : P(x) = 0 = L (λ,a,b) (x)}, where L (λ,a,b) (x) is obtained by replacing i, j and k in (8) by 3l,l and l respectively L (λ,a,b) (x) = P(x) 3l = λ 3l ( (a 5l b 4l + a 4l b 5l )x 6l + (a 4l b 6l + a 6l b 4l )x 5l + (a 6l b 5l + a 5l b 6l )x 4l) + λ l ( (a l b 3l + a 3l b l )x 4l + (a l b 4l + a 4l b l )x 3l + (a 4l b 3l + a 3l b 4l )x l) + λ l ( (a l b 4l + a 4l b l )x 5l + (a l b 5l + a 5l b l )x 4l + (a 5l b 4l + a 4l b 5l )x l) + λ(ab l + a l b)x l + λ(ab l + a l b)x l + λ(a l b l + a l b l )x. (1) The coefficient of x in L (λ,a,b) (x) is zero if and only if a l b l + a l b l = 0, i.e., a l b + ab l = 0. But gcd(l,n) = 1, therefore, by Proposition 4, we have b af. Moreover, L (λ,a,b) (x) is of the form 6 i=0 c ix il, therefore by Proposition 4, the equation L (λ,a,b) (x) = 0 has at most 6 roots for all a,b F n such that a 0 and b af, this implies that k(a,b) 6 if n is even otherwise k(a,b) 5. The Walsh-Hadamard transform of D b D a g λ at µ F n is n+6, if n = 0 mod, W Db D a g λ (µ) n+5, if n = 1 mod. Therefore, Using Proposition 1, we have Using Proposition, we have nl(d b D a g λ ) n 1 n+4, if n = 0 mod, n 1 n+3, if n = 1 mod. n 3 n, if n = 0 mod, nl 3 (g λ ) n 3 n 1, if n = 1 mod. When n = 0 mod nl 3 (g λ ) n 1 1 ( n 1) n ( n )( n 1 n+4 ) = n 1 1 ( n 1) 3n+6 + n+1 n+8. (13) When n = 1 mod nl 3 (g λ ) n 1 1 ( n 1) n ( n )( n 1 n+3 ) = n 1 1 ( n 1) 3n+5 + n+1 n+7. (14) Remark 1 Let f B n a biquadratic Boolean function. If there exists at least elements a,b F n such that D b D a f is quadratic, then the lower bound of third-order nonlinearity of f B n is at least n 4. This result is follows from Proposition 1 and the fact that the nonlinearity of any quadratic function in B n is at least n [3,16]. 4 Comparison In Table and Table 3, we present the computational results of lower bounds of third-order nonlinearities obtained by Theorem 1 for i = 3,4,5 and j,k are taken in such a way that gcd( j k,n) = 1. We compare these bounds with the general bounds on third-order nonlinearity for any biquadratic Boolean function, i.e., nl 3 ( f ) n 4. It is observed that the bounds for i = 3,4 are efficiently large and decreases with increasing the value of i. It is claimed that class (1) is more general class of biquadratic monomial Boolean functions

7 7 Table The lower bounds on the third-order nonlinearities obtained by Theorem 1 for odd n and i = 3,4,5 n i = i = i = general bounds Table 3 The lower bounds on the third-order nonlinearities obtained by Theorem 1 for for even n and i = 3,4,5 n i = i = i = general bounds containing several classes of highly nonlinear Boolean functions. For example, Kasami functions of degree 4 coincide with class (1) when i = 5, j = 4,k = 3. In Table 4 and Table 5, we present the computational results on lower bounds of third-order nonlinearities obtained by Theorem on applying Proposition 3 and compare these values with known classes of functions [8,3,11]. It is observed from Table 4 and Table 5 that the bound obtained by Theorem is better than the bounds obtained by Gode et al. [8] for Kasami functions: Tr(λx 57 ), Iwata and Kurosawa s general bound [11] for all n > 8. These bounds are also improved upon Carlet s [3] bound for inverse function when n is odd (see Table 4) or n = 8,1, and equal for the rest values of even n (see Table 5). Table 4 Comparison of the value of lower bounds on third-order nonlinearities obtained by Theorem with the bound obtained in [8], [11] and [3] for odd n n Bounds in Theorem Bounds in [8] Bounds in [11] Carlet s bound [3] Table 5 Comparison of the value of lower bounds on third-order nonlinearities obtained by Theorem with the bound obtained in [8], [11] and [3] for even n n Bounds in Theorem Bounds in [8] Bounds in [11] Carlet s bound [3] Conclusion In this paper, we obtained the lower bounds of third-order nonlinearities of two more general classes of biquadratic monomial Boolean functions. It is demonstrated that in some cases our bounds are better than the bounds obtained previously. 6 Acknowledgement The author would like to thanks the Council of Scientific and Industrial Research India for supporting his research. References 1. Bracken, C., Byrne, E., Markin, N., MacGuire, G.: Determining the Nonlinearity a New Family of APN Functions. AAECC, LNCS, 4851, Springer Verlag, 7-79 (007).

8 8. Canteaut, A., Charpin, P., Kyureghyan, G. M.: A New Class of Monomial Bent Functions. Finite Fields and Their Applications, 14, 1-41 (008). 3. Carlet, C.: Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications. IEEE Trans. Inform. Theory, 54(3), (008). 4. Carlet, C.: More vectorial Boolean functions with unbounded nonlinearity profile, Int l J. of Found. of Comp. Sci., (6), , Carlet, C., Mesnager, S.: Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller Codes. IEEE Trans. Inform. Theory, 53 (1), (007). 6. Courtois, N.: Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. In Proc. of the ICISC 0, LNCS, 587, , Springer Verlag (00). 7. Fourquet, R., Tavernier, C.: An Improved List Decoding Algorithm for the Second Order Reed-Muller Codes and its Applications. Designs, Codes and Cryptography, 49, (008). 8. Gode, R., Gangopadhyay, S.: Third-Order Nonlinearities of a Subclass of Kasami Functions. Crypt. Communi.-Discrete Structures, Boolean Functions and Sequences,, (010). 9. Golic, J.: Fast Low Order Approximation of Cryptographic Functions. In Proc. of the EUROCRYPT 96, LNCS, Springer Verlag, 1070, 68-8 (1996). 10. S. W. Golomb and G. Gong, Signal design for good correlation: for wireless communication, cryptography and radar, Cambridge University Press, ISBN , Iwata, T., Kurosawa, K.: Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. In Proc. of the ASIACRYPT 99, LNCS, Springer Verlag, 1716, 6-74, (1999). 1. Lidl, R., H. Niederreiter, H.: Introduction to Finite Fields and Their Applications, Cambridge University Press (1983). 13. MacWilliams, F. J., Sloane, N. J. A.: The Theory of Error Correcting Codes. North-Holland, Amsterdam (1977). 14. Meier, W., Staffelbach O.: Nonlinearity criteria for cryptographic functions. Adv. in Crypto. EUROCRYPT 89, LNCS, Springer Verlag, 434, (1990). 15. Rothaus, O. S.: On bent functions. J. Combin. Theory (A), 0, (1976). 16. Seberry, J., Zhang, X. M. and Zheng, Y.: Relationships among nonlinearity criteria. Advances in Crypto. EUROCRYPT 94, LNCS, Springer-Verlag, 950, , (1995).

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Céline Blondeau, Anne Canteaut and Pascale Charpin* Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 149 Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin* INRIA Paris-Rocquencourt, Project-Team SECRET,

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

Maiorana McFarland Functions with High Second Order Nonlinearity

Maiorana McFarland Functions with High Second Order Nonlinearity Maiorana McFarland Functions with High Second Order Nonlinearity Nicholas Kolokotronis 1 and Konstantinos Limniotis 2,3 1 Department of Computer Science and Technology University of Peloponnese End of

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

Nonlinear Equivalence of Stream Ciphers

Nonlinear Equivalence of Stream Ciphers Sondre Rønjom 1 and Carlos Cid 2 1 Crypto Technology Group, Norwegian National Security Authority, Bærum, Norway 2 Information Security Group, Royal Holloway, University of London Egham, United Kingdom

More information

Hyper-bent Functions

Hyper-bent Functions Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

On Welch-Gong Transformation Sequence Generators

On Welch-Gong Transformation Sequence Generators On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

On Existence and Invariant of Algebraic Attacks

On Existence and Invariant of Algebraic Attacks On Existence and Invariant of Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

Characterizations of the differential uniformity of vectorial functions by the Walsh transform Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis

More information

arxiv: v5 [cs.it] 4 Nov 2009

arxiv: v5 [cs.it] 4 Nov 2009 1 Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables WeiGuo ZHANG and GuoZhen XIAO ISN Lab, Xidian University, Xi an 710071, P.R.China arxiv:0905.0794v5 [cs.it]

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

Complete characterization of generalized bent and 2 k -bent Boolean functions

Complete characterization of generalized bent and 2 k -bent Boolean functions Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

Fourier Spectra of Binomial APN Functions

Fourier Spectra of Binomial APN Functions Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra

More information

Attacks against Filter Generators Exploiting Monomial Mappings

Attacks against Filter Generators Exploiting Monomial Mappings Attacks against Filter Generators Exploiting Monomial Mappings Anne Canteaut and Yann Rotella Inria, Paris, France Anne.Canteaut@inria.fr, Yann.Rotella@inria.fr Abstract. Filter generators are vulnerable

More information

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4

More information

Vectorial Boolean Functions for Cryptography

Vectorial Boolean Functions for Cryptography Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter

More information

Fast Discrete Fourier Spectra Attacks on Stream Ciphers

Fast Discrete Fourier Spectra Attacks on Stream Ciphers Fast Discrete Fourier Spectra Attacks on Stream Ciphers Guang Gong, Sondre Rønjom, Tor Helleseth, and Honggang Hu Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario,

More information

Smart Hill Climbing Finds Better Boolean Functions

Smart Hill Climbing Finds Better Boolean Functions Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,

More information

Some results concerning global avalanche characteristics of two q-ary functions

Some results concerning global avalanche characteristics of two q-ary functions Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand)

More information

Non-Separable Cryptographic Functions

Non-Separable Cryptographic Functions International Symposium on Information Theory and Its Applications Honolulu, Hawaii, USA, November 5 8, 2000 Non-Separable Cryptographic Functions Yuliang Zheng and Xian-Mo Zhang School of Network Computing

More information

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

Some Results on the Known Classes of Quadratic APN Functions

Some Results on the Known Classes of Quadratic APN Functions Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, and Bo Sun Department of Informatics, University of Bergen Postboks 7803, N-5020, Bergen, Norway {Lilya.Budaghyan,Tor.Helleseth,Nian.Li,Bo.Sun}@uib.no

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin Guang Gong INRIA, B.P. 105, 78153 Le Chesnay Cedex, France, Pascale.Charpin@inria.fr Department of Electrical and Computer

More information

Some properties of q-ary functions based on spectral analysis

Some properties of q-ary functions based on spectral analysis Some properties of q-ary functions based on spectral analysis Deep Singh and Maheshanand Bhaintwal Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee 247667 INDIA deepsinghspn@gmail.com,mahesfma@iitr.ernet.in

More information

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong 1, and Mingsheng Wang 3 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China. Graduate School

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

A construction of Boolean functions with good cryptographic properties

A construction of Boolean functions with good cryptographic properties A construction of Boolean functions with good cryptographic properties Jong H. Chung 1, Pantelimon Stănică 1, Chik-How Tan, and Qichun Wang 1 Department of Applied Mathematics, Naval Postgraduate School,

More information

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev Abstract. Low degree annihilators for Boolean functions are of great interest in cryptology because of

More information

Open problems related to algebraic attacks on stream ciphers

Open problems related to algebraic attacks on stream ciphers Open problems related to algebraic attacks on stream ciphers Anne Canteaut INRIA - projet CODES B.P. 105 78153 Le Chesnay cedex - France e-mail: Anne.Canteaut@inria.fr Abstract The recently developed algebraic

More information

On the Arithmetic Walsh Coefficients of Boolean Functions

On the Arithmetic Walsh Coefficients of Boolean Functions Designs, Codes, and Cryptography manuscript No. (will be inserted by the editor) On the Arithmetic Walsh Coefficients of Boolean Functions Claude Carlet Andrew Klapper Received: date / Accepted: date Abstract

More information

Idempotent and p-potent quadratic functions: distribution of nonlinearity and codimension

Idempotent and p-potent quadratic functions: distribution of nonlinearity and codimension Downloaded from orbit.dtu.dk on: Oct 07, 2018 Idempotent and p-potent quadratic functions: distribution of nonlinearity and codimension Anbar Meidl, Nurdagül; Meidl, Wilfried Meidl; Topuzoglu, Alev Published

More information

A matrix approach for constructing quadratic APN functions

A matrix approach for constructing quadratic APN functions Noname manuscript No (will be inserted by the editor) A matrix approach for constructing quadratic APN functions Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract We find a

More information

Polynomials on F 2. cryptanalysis. Y. Aubry 1 G. McGuire 2 F. Rodier 1. m with good resistance to. 1 IML Marseille 2 University College Dublin

Polynomials on F 2. cryptanalysis. Y. Aubry 1 G. McGuire 2 F. Rodier 1. m with good resistance to. 1 IML Marseille 2 University College Dublin Polynomials on F 2 m with good resistance to cryptanalysis Y Aubry 1 G McGuire 2 F Rodier 1 1 IML Marseille 2 University College Dublin Outline APN functions A lower bound for the degree of an APN polynomial

More information

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou 1, Huiting Han 1, Chunming Tang 1, and Maozhi Xu 1,2 1 LMAM, School of Mathematical Sciences, Peing

More information

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012 6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 9, SEPTEMBER 2012 A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Fellow,

More information

Attacks Against Filter Generators Exploiting Monomial Mappings

Attacks Against Filter Generators Exploiting Monomial Mappings Attacks Against Filter Generators Exploiting Monomial Mappings Anne Canteaut, Yann Rotella To cite this version: Anne Canteaut, Yann Rotella. Attacks Against Filter Generators Exploiting Monomial Mappings.

More information

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010 Introduction Boolean functions 2nd order nonlinearity Summary ARXH PROSTASIAS_APOLOGISMOS 2010.indd 1 20/04/2011 12:54 ΜΜ On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ

More information

Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5

Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 Anne Canteaut 1 and Michaël Trabbia 1,2 1 INRIA projet CODES B.P. 105 78153 Le Chesnay Cedex - France Anne.Canteaut@inria.fr

More information

arxiv: v1 [math.co] 6 Jan 2019

arxiv: v1 [math.co] 6 Jan 2019 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS arxiv:1901.02359v1 [math.co] 6 Jan 2019 DANIELE BARTOLI, MARIA MONTANUCCI, AND GIOVANNI ZINI Abstract. We provide constructions of bent functions

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

A class of quadratic APN binomials inequivalent to power functions

A class of quadratic APN binomials inequivalent to power functions A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander November 30, 2006 Abstract We exhibit an infinite class of almost perfect nonlinear quadratic

More information

Perfect Algebraic Immune Functions

Perfect Algebraic Immune Functions Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, and Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, Beijing 100195, P. R. China meicheng.liu@gmail.com, zhangy@is.iscas.ac.cn,

More information

Lecture Notes on Cryptographic Boolean Functions

Lecture Notes on Cryptographic Boolean Functions Lecture Notes on Cryptographic Boolean Functions Anne Canteaut Inria, Paris, France Anne.Canteaut@inria.fr https://www.rocq.inria.fr/secret/anne.canteaut/ version: March 10, 016 Contents 1 Boolean functions

More information

Evolutionary Design of Trace Form Bent Functions

Evolutionary Design of Trace Form Bent Functions Evolutionary Design of Trace Form Bent Functions Min Yang, Qingshu Meng, and Huanguo Zhang school of computer science, Wuhan university, Wuhan Hubei, China mqseagle@yahoo.com Abstract. In order to design

More information

Haar Spectrum of Bent Boolean Functions

Haar Spectrum of Bent Boolean Functions Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

Generalized Correlation Analysis of Vectorial Boolean Functions

Generalized Correlation Analysis of Vectorial Boolean Functions Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,

More information

nonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equa

nonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equa Upper bounds on the numbers of resilient functions and of bent functions Claude Carlet 1 and Andrew Klapper 2 1 INRIA projet CODES, B.P. 105, 78153 Le Chesnay Cedex- France. Claude.Carlet@inria.fr 2 Dept.

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

On the Existence and Constructions of Vectorial Boolean Bent Functions

On the Existence and Constructions of Vectorial Boolean Bent Functions On the Existence and Constructions of Vectorial Boolean Bent Functions Yuwei Xu 1, and ChuanKun Wu 1 1 State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy

More information

Cryptographic Properties of the Hidden Weighted Bit Function

Cryptographic Properties of the Hidden Weighted Bit Function Cryptographic Properties of the Hidden Weighted Bit Function Qichun Wang a, Claude Carlet b, Pantelimon Stănică c, Chik How Tan a a Temasek Laboratories, National University of Singapore, 117411, Singapore.

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 1, JANUARY 2001 421 [4] A. A. Davydov, Constructions and families of covering codes and saturated sets of points in projective geometry, IEEE Trans.

More information

An analysis of the C class of bent functions

An analysis of the C class of bent functions An analysis of the C class of bent functions Bimal Mandal 1 Pantelimon Stănică 2 Sugata Gangopadhyay 3 Enes Pasalic 4 1 Department of Mathematics Indian Institute of Technology Roorkee, INDIA bimalmandal90@gmail.com

More information

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced

More information

Algebraic Attacks and Decomposition of Boolean Functions

Algebraic Attacks and Decomposition of Boolean Functions Algebraic Attacks and Decomposition of Boolean Functions Willi Meier 1, Enes Pasalic 2, and Claude Carlet 2 1 FH Aargau, CH-5210 Windisch, Switzerland meierw@fh-aargau.ch 2 INRIA, projet CODES, Domaine

More information

Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences

Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Kalikinkar Mandal, and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

The simplest method for constructing APN polynomials EA-inequivalent to power functions

The simplest method for constructing APN polynomials EA-inequivalent to power functions The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8]

More information

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata

More information

A deterministic algorithm for the distance and weight distribution of binary nonlinear codes

A deterministic algorithm for the distance and weight distribution of binary nonlinear codes A deterministic algorithm for the distance and weight distribution of binary nonlinear codes Emanuele Bellini, and Massimiliano Sala. Abstract Given a binary nonlinear code, we provide a deterministic

More information

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used

More information

Optimal Ternary Cyclic Codes From Monomials

Optimal Ternary Cyclic Codes From Monomials 5898 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 59, NO 9, SEPTEMBER 2013 Optimal Ternary Cyclic Codes From Monomials Cunsheng Ding, Senior Member, IEEE, and Tor Helleseth, Fellow, IEEE Abstract Cyclic

More information

Provable Security Against Differential and Linear Cryptanalysis

Provable Security Against Differential and Linear Cryptanalysis Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University Introduction CRADIC Linear Hull SPN and Two Strategies Highly

More information

The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function

The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function An Braeken 1 and Igor Semaev 2 1 Department Electrical Engineering, ESAT/COSIC, Katholieke Universiteit Leuven,

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

50 Years of Crosscorrelation of m-sequences

50 Years of Crosscorrelation of m-sequences 50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation

More information

Constructing new APN functions from known ones

Constructing new APN functions from known ones Constructing new APN functions from known ones Lilya Budaghyan a, Claude Carlet b, and Gregor Leander c a Department of Mathematics University of Trento ITALY b Department of Mathematics University of

More information

On Boolean functions which are bent and negabent

On Boolean functions which are bent and negabent On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra

More information

Division Property: a New Attack Against Block Ciphers

Division Property: a New Attack Against Block Ciphers Division Property: a New Attack Against Block Ciphers Christina Boura (joint on-going work with Anne Canteaut) Séminaire du groupe Algèbre et Géometrie, LMV November 24, 2015 1 / 50 Symmetric-key encryption

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

Maiorana-McFarland class: Degree optimization and algebraic properties

Maiorana-McFarland class: Degree optimization and algebraic properties Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,

More information

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay Volume X, No. 0X, 0xx, X XX doi:0.3934/amc.xx.xx.xx GENERALIZED NONLINEARITY OF -BOXE ugata Gangopadhyay Department of Computer cience and Engineering, Indian Institute of Technology Roorkee, Roorkee 47667,

More information

Modified Alternating Step Generators

Modified Alternating Step Generators Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik Military Communication Institute Warszawska 22A, 05-130 Zegrze, Poland {r.wicik, t.rachwalik}@wil.waw.pl Abstract. Irregular clocking

More information

Extended Criterion for Absence of Fixed Points

Extended Criterion for Absence of Fixed Points Extended Criterion for Absence of Fixed Points Oleksandr Kazymyrov, Valentyna Kazymyrova Abstract One of the criteria for substitutions used in block ciphers is the absence of fixed points. In this paper

More information

Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions

Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions IEICE TRANS. FUNDAMENTALS, VOL.E92 A, NO.1 JANUARY 2009 11 PAPER Special Section on Cryptography and Information Security Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland

More information

2 Description of McEliece s Public-Key Cryptosystem

2 Description of McEliece s Public-Key Cryptosystem 1 A SOFTWARE IMPLEMENTATION OF THE McELIECE PUBLIC-KEY CRYPTOSYSTEM Bart Preneel 1,2, Antoon Bosselaers 1, René Govaerts 1 and Joos Vandewalle 1 A software implementation of the McEliece public-key cryptosystem

More information

A note on hyper-bent functions via Dillon-like exponents

A note on hyper-bent functions via Dillon-like exponents A note on hyper-bent functions via Dillon-like exponents Sihem Mesnager Jean-Pierre Flori Monday 23 rd January, 2012 Abstract This note is devoted to hyper-bent functions with multiple trace terms including

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

On The Nonlinearity of Maximum-length NFSR Feedbacks

On The Nonlinearity of Maximum-length NFSR Feedbacks On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main

More information

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565

More information