Properties of a family of cryptographic boolean functions

被引:4
作者
Wang, Qichun [1 ]
Tan, Chik How [1 ]
机构
[1] Temasek Laboratories, National University of Singapore, Singapore
来源
Wang, Qichun | 1600年 / Springer Verlag卷 / 8865期
基金
中国国家自然科学基金;
关键词
Algebraic immunity; Boolean function; Nonlinearity;
D O I
10.1007/978-3-319-12325-7_3
中图分类号
学科分类号
摘要
In 2008, Carlet and Feng studied a class of functions with good cryptographic properties. Based on that function, [18] proposed a family of cryptographically significant Boolean functions which contains the functions proposed by [28,30]. However, their study is not in-depth. In this paper, we investigate the properties of those functions further, and find that they can be divided into some affine equivalent classes. The bent functions proposed by [18] are in fact in the same class with the function proposed by [30]. We then prove that those functions have optimum algebraic immunity if and only if a combinatorial conjecture is correct, which gives a new direction to prove the conjecture. Furthermore, we improve upon the lower bound on the nonlinearity, and our bound is higher than all other similar bounds. Finally, we extend the construction to a balanced function, and give an example of a 12-variable function which has the best cryptographic properties among all currently known functions. © Springer International Publishing Switzerland 2014.
引用
收藏
页码:34 / 46
页数:12
相关论文
共 36 条
  • [1] Braeken A., Preneel B., On the algebraic immunity of symmetric Boolean functions, INDOCRYPT 2005. LNCS, 3797, pp. 35-48, (2005)
  • [2] Carlet C., Boolean functions for cryptography and error correcting codes, Chapter of the monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257-397, (2010)
  • [3] Carlet C., On a weakness of the Tu-Deng function and its repair, Cryptology ePrint Archive, (2009)
  • [4] Carlet C., Comments on’Constructions of cryptographically significant Boolean functions using primitive polynomials, IEEE Trans. Inf. Theory, 57, (2011)
  • [5] Carlet C., Dalai D.K., Gupta K.C., Maitra S., Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction, IEEE Trans. Inf. Theory, 52, 7, pp. 3105-3121, (2006)
  • [6] Carlet C., Feng K., An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, ASIACRYPT 2008. LNCS, 5350, pp. 425-440, (2008)
  • [7] Cohen G., Flori J., On a generalized combinatorial conjecture involving addition mod 2k - 1, Cryptology ePrint Archive, (2011)
  • [8] Courtois N.T., Fast algebraic attacks on stream ciphers with linear feedback, CRYPTO 2003. LNCS, 2729, pp. 176-194, (2003)
  • [9] Courtois N.T., Meier W., Algebraic attacks on stream ciphers with linear feedback, EUROCRYPT 2003. LNCS, 2656, pp. 345-359, (2003)
  • [10] Cusick T.W., Li Y., Stanica P., On a combinatorial conjecture, Integers, 11, 2, pp. 185-203, (2011)