Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound

Similar documents
CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent

9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class

Smart Hill Climbing Finds Better Boolean Functions

arxiv: v5 [cs.it] 4 Nov 2009

New Constructions for Resilient and Highly Nonlinear Boolean Functions

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity

Some properties of q-ary functions based on spectral analysis

Heuristic Design of Cryptographically Strong Balanced Boolean Functions

Construction of Nonlinear Boolean Functions with Important Cryptographic Properties

Non-Separable Cryptographic Functions

Decomposing Bent Functions

1-Resilient Boolean Function with Optimal Algebraic Immunity

Maiorana McFarland Functions with High Second Order Nonlinearity

A New Class of Bent Negabent Boolean Functions

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Third-order nonlinearities of some biquadratic monomial Boolean functions

The Analysis of affinely Equivalent Boolean Functions

A New Characterization of Semi-bent and Bent Functions on Finite Fields

Generalized Correlation Analysis of Vectorial Boolean Functions

A construction of Boolean functions with good cryptographic properties

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS

Searching for Cost Functions

Synopsis of the thesis entitled Cryptographic and Combinatorial Properties of Boolean Functions and S-boxes

Some results concerning global avalanche characteristics of two q-ary functions

On Hardware Implementation of Tang-Maitra Boolean Functions

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010

Cryptographic Properties of the Hidden Weighted Bit Function

On Cryptographic Properties of the Cosets of R(1;m)

arxiv:math/ v1 [math.co] 24 Oct 2000

How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis

Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity

ALMOST BOOLEAN FUNCTIONS: THE DESIGN OF BOOLEAN FUNCTIONS BY SPECTRAL INVERSION

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Evolutionary Design of Trace Form Bent Functions

On The Nonlinearity of Maximum-length NFSR Feedbacks

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Haar Spectrum of Bent Boolean Functions

A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Towards Provable Security of Substitution-Permutation Encryption Networks

Further Results on Implicit Factoring in Polynomial Time

New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

Hyper-bent Functions

Two Notions of Differential Equivalence on Sboxes

Perfect Algebraic Immune Functions

Complete characterization of generalized bent and 2 k -bent Boolean functions

Comments on "Generating and Counting Binary Bent Sequences"

Constructions of Quadratic Bent Functions in Polynomial Forms

Security of Random Feistel Schemes with 5 or more Rounds

On Walsh transform and matrix factorization 1

Finding good differential patterns for attacks on SHA-1

On the Symmetric Property of Homogeneous Boolean Functions

Modified Alternating Step Generators

Computing the biases of parity-check relations

arxiv: v1 [cs.it] 17 May 2016

Multiplicative Complexity Reductions in Cryptography and Cryptanalysis

A TMDTO Attack Against Lizard

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers

On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring

Maiorana-McFarland class: Degree optimization and algebraic properties

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL

University of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center

Benes and Butterfly schemes revisited

Comparison of cube attacks over different vector spaces

Using Wiedemann s algorithm to compute the immunity against algebraic and fast algebraic attacks

Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions

Structures of cryptographic functions with strong avalanche characteristics

Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion

Fourier Spectra of Binomial APN Functions

On Various Nonlinearity Measures for Boolean Functions

On Boolean Functions with Generalized Cryptographic Properties

On Welch-Gong Transformation Sequence Generators

Quadratic Equations from APN Power Functions

The LILI-128 Keystream Generator

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Algebraic Attacks and Decomposition of Boolean Functions

New polynomials for strong algebraic manipulation detection codes 1

Open problems related to algebraic attacks on stream ciphers

nonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equa

Dirichlet Product for Boolean Functions

Preimage Attacks on Reduced Tiger and SHA-2

Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis

Pseudo-random sequences, boolean functions and cellular automata

Correcting Codes in Cryptography

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers (Extended Abstract)

The WG Stream Cipher

John P. Steinberger. Curriculum Vitae. Masters: University of Waterloo, 2003, Combinatorics and Optimization.

BDD Based Construction of Resilient Functions

Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences

Transcription:

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India, Email: subho@isical.ac.in Abstract Very recently, Kavut and Yucel identified 9-variable Boolean functions having nonlinearity 242, which is currently the best known. However, any of these functions do not contain any zero in the Walsh spectrum and that is why they cannot be made balanced. We use these functions to construct 13-variable balanced Boolean function having nonlinearity 2 13 1 2 13 1 2 + 2 = 4034 which is strictly greater than the bent concatenation bound. This is the first demonstration of balanced Boolean functions on odd number of variables having nonlinearity strictly greater than the bent concatenation bound for number of input variables less than 15. Keywords: Balancedness, Boolean Function, Nonlinearity. 1 Introduction Very recently [3], 9-variable Boolean functions with nonlinearity 242 (greater than the bent concatenation nonlinearity 2 n 1 2 n 1 2 for odd n) have been discovered. These functions are not balanced and there is no zero value in the Walsh spectrum of any of these 9- variable nonlinearity 242 functions. Thus these functions cannot be linearly transformed to 9-variable balanced functions with nonlinearity 242. The current state of the art nonlinearity results for Boolean functions on odd number of variables is as follows. 1. In 1972 [1], it has been shown that the maximum nonlinearity of 5-variable Boolean functions is 12 and in 1980 [6] it has been shown that the maximum nonlinearity of 7-variable Boolean functions is 56. Thus for odd n 7, the maximum nonlinearity of n-variable functions is 2 n 1 2 n 1 1

2. In 1983 [7], it has been shown that one can get unbalanced Boolean functions on 15 variables having nonlinearity 16276 (we will refer these functions as PW functions as these function were found by Patterson and Wiedemann) and using this result one can show that for odd n 15, it is possible to get Boolean functions having nonlinearity 2 n 1 2 n 1 2 + 20 2 n 15 3. In 2006 [2], 9-variable unbalanced Boolean functions could be achieved with nonlinearity 241, and thus Boolean functions on 9, 11, and 13 variables could be constructed having nonlinearity 2 n 1 2 n 1 2 + 2 n 9 4. In 2007 [3], the result for 9-variables could be improved and unbalanced functions could be achieved with nonlinearity 242. Hence, Boolean functions on 9, 11, and 13 variables could be constructed having nonlinearity 2 n 1 2 n 1 2 + 2 2 n 9 Balanced Boolean functions on odd number of variables having nonlinearity greater than the bent concatenation bound have received lot of attention in the literature. Balancedness is one of the important cryptographic and combinatorial properties of Boolean functions. Below we list the existing results in this area. 1. Using the PW functions as black box, in [9], balanced Boolean functions having nonlinearity greater than bent concatenation bound could be found for odd n 29. 2. In [4, 5], the structure of the PW functions have beeen modified using heuristic search to get balanced Boolean functions having nonlinearity 2 15 1 2 15 1 2 + 6 = 16262 on 15-variables. 3. In [8], the structure of the PW functions have been modified systematically in the space of rotation symmetric Boolean functions to achieve nonlinearity 2 15 1 2 15 1 2 + 10 = 16266 on 15-variables. 4. So far no balanced Boolean function on odd number of variables n having nonlinearity greater than bent concatenation bound is known for n = 9, 11, 13. We use the functions presented in [3] to construct 13-variable balanced Boolean Functions having nonlinearity 2 13 1 2 13 1 2 + 2 = 4034. We refer to [2] for basic definitions of nonlinearity nl(f) and Walsh spectrum W f (.) for a Boolean function f. 2 The 13-variable Function We start with the following 9-variable function f having nonlinearity 242 [3]. The truth table is presented below in hexadecimal format. 3740B6A118A1E19642A85E2B7E2F3C3CB65FA0D95EC9DB1EA92BDB3666185AE0 087F5FE6E0757106A12FC918754C40E8A1BCCB7A714032A8961456E066E8A801 2

Let x {0, 1} n be the input variables. Now we construct two 9-variable functions f 1 (x) = f(x) < ω 1 x > and f 2 (x) = f(x) < ω 2 x >, where ω 1 = (0, 0, 0, 0, 0, 0, 0, 1, 0) and ω 2 = (0, 0, 1, 0, 0, 1, 1, 0, 0). It is easy to see nl(f 1 ) = nl(f 2 ) = 242 and W f1 (0) = 4, W f2 (0) = 4. Also we denote f 1 = 1 f 1, f 2 = 1 f We construct a 13-variable function F whose truth table is the concatenation of sixteen many truth tables of 9-variable functions each having nonlinearity 242. The truth table of F is as follows. f 2 f 1 f 1 f 2 f 2 f 1 f 1 f 2 f 2 f 1 f 1 f 2 f 2 f 1 f 1 f 2 It can be proved that nl(f ) = 2 13 1 2 13 1 2 + 8 = 4040 and W F (0) = 16. Similar to the idea of [4, 5], we tried a heuristic search by modifying (toggling) the truth table of F from 0 to 1 at eight many random positions. This will provide a function G having nl(g) 4040 8 = 4032 = 2 13 1 2 13 1 2 and W G (0) = 0. It implies that we will always get balanced function G on 13 variables. Thus the only important issue is to find a function G such that nl(g) > 4040 8. We searched 20,000 many functions by randomly choosing eight positions at the truth table of G where the values are zero and then toggling those positions to 1. We found one function G with nonlinearity 2 13 1 2 13 1 2 + 2 = 4034. The locations where we needed to toggle the function are 183, 256, 671, 1025, 2231, 2662, 2948, 3298 (the locations of the truth table are indexed from 0 to 2 n 1). The truth table of the function G is presented in Appendix A. This is the first time a balanced Boolean function having nonlinearity strictly greater than the bent concatenation bound is demonstrated for number of input variables less than 15. After the first version of the paper, Kavut and Yucel tried further systematic searches on the function F and obtained the nonlinearity 2 13 1 2 13 1 2 + 4 = 4036. As an example, the locations where they toggled the output of F are 4625, 4697, 4737, 4763, 4809, 5037, 5279, 5433. We are currently working on further heuristic methods to find balanced Boolean functions on 9 and 11 variables with nonlinearity exceeding the bent concatenation bound. References [1] E. R. Berlekamp and L. R. Welch. Weight distributions of the cosets of the (32, 6) Reed-Muller code. IEEE Transactions on Information Theory, IT-18(1):203 207, January 1972. [2] S. Kavut, S. Maitra and M. D. Yücel. In IEEE Transactions on Information Theory, 53(5): 1743-1751, May 2007. See also There exist Boolean functions on n (odd) variables having nonlinearity > 2 n 1 2 n 1 2 if and only if n > 7 in IACR eprint server, http://eprint.iacr.org/2006/181, 28 May, 2006. 3

[3] S. Kavut and M. Yucel. Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242. Cryptology eprint Archive, Report 2007/308, August 8, 2007, http://eprint.iacr.org/. [4] P. Sarkar and S. Maitra. Construction of nonlinear Boolean functions with important cryptographic properties. In Advances in Cryptology - EUROCRYPT 2000, LNCS 1807, pages 485 506. Springer Verlag, 2000. [5] S. Maitra and P. Sarkar. Modifications of Patterson-Wiedemann functions for cryptographic applications. IEEE Transactions on Information Theory, 48(1):278 284, January 2002. [6] J. J. Mykkeltveit. The covering radius of the (128, 8) Reed-Muller code is 56. IEEE Transactions on Information Theory, IT-26(3):359 362, 1980. [7] N. J. Patterson and D. H. Wiedemann. The covering radius of the (2 15, 16) Reed-Muller code is at least 16276. IEEE Transactions on Information Theory, IT-29(3):354 356, 1983. See also correction in IT-36(2):443, 1990. [8] S. Sarkar and S. Maitra. Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros. In WCC 2007, International Workshop on Coding and Cryptography, April 16-20, 2007, Versailles (France). [9] J. Seberry, X. M. Zhang, and Y. Zheng. Nonlinearly balanced Boolean functions and their propagation characteristics. In Advances in Cryptology - CRYPTO 93, LNCS 773, pages 49 60. Springer-Verlag, 1994. 4

Appendix A 38b0b9511751ee66b2a7ae248e20cc33b9afaf295139d5ee59242b399617aaef 878f5016ef857ef6512039178543b0e7ae4cc48a7eb03d58661ba6ef96e7580e 047385922b92d2a5719b6d184d1c0f0f856c93eb6dfae82d9a18e805552b69d3 447385922b92d2a5719b6d184d1c0f0f856c93ea6dfae82d9a18e805552b69d3 38b0b9511751ee66b2a7ae248e20cc33b9afaf295139d5ee59242b399617aaef 047385922b92d2a5719b6d184f1c0f0f856c93ea6dfae82d9a18e805552b69d3 3b4c6cd5d3464235921cfa2b467f73db9a8ff8494273019ba52765d355db9b32 047385922b92d2a5719b6d184d1c0f0f856c93ea6dfae82d9a18e805752b69d3 38b0b9511751ee66b2a7ae248e20cc33b9afaf295139d4ee59242b399617aaef 047385922b92d2a5719b6d184d1c0f0f856c93ea6dfae82d9a18e805552b69d3 047385922b92d2a5719b6d184d1c0f0f856c93ea6dfae82d9a18e805552b69d3 fb8c7a6dd46d2d5a8e6492e7b2e3f0f07a936c15920517d265e717faaad4962c c4b3932a2cb9bdca6de305d4b9808c246d7007b6bd8cfe645ad89a2caa2464cd fb8c7a6dd46d2d5a8e6492e7b2e3f0f07a936c15920517d265e717faaad4962c c4b3932a2cb9bdca6de305d4b9808c246d7007b6bd8cfe645ad89a2caa2464cd 38b0b9511751ee66b2a7ae248e20cc33b9afaf295139d4ee59242b399617aaef 5