The c-boomerang uniformity and c-boomerang spectrum of two classes of permutation polynomials over the finite field F2n

被引:0
作者
Li, Guanghui [1 ]
Cao, Xiwang [1 ,2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Math, Nanjing 211106, Peoples R China
[2] MIIT, Key Lab Math Modelling & High Performance Comp Air, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Permutation polynomial; c-boomerang uniformity; c-boomerang spectrum; (X(PM);
D O I
10.1016/j.disc.2025.114543
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The boomerang attack developed by Wagner is a cryptanalysis technique against block ciphers. A new theoretical tool, the Boomerang Connectivity Table (BCT) and the corresponding boomerang uniformity were introduced to evaluate the resistance of a block cipher against the boomerang attack. Using a multiplier differential, Stanica (2021) [28] extended the notion of boomerang uniformity to c-boomerang uniformity. In this paper, we focus on two classes of permutation polynomials over F2n. For one of these, we show that the c-boomerang uniformity of this function is equal to 1. For the second type of function, we first consider the c-BCT entries. We then explicitly determine the c-boomerang spectrum of this function by means of characters and some techniques in solving equations over F2n. (c) 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
引用
收藏
页数:20
相关论文
共 39 条
[1]   4-uniform permutations with null nonlinearity [J].
Beierle, Christof ;
Leander, Gregor .
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2020, 12 (06) :1133-1141
[2]   ON SOLUTION OF ALGEBRAIC EQUATIONS OVER FINITE FIELDS [J].
BERLEKAM.ER ;
RUMSEY, H ;
SOLOMON, G .
INFORMATION AND CONTROL, 1967, 10 (06) :553-&
[3]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[4]  
Biham Eli, 1993, Differential Cryptanalysis of the Data Encryption Standard
[5]  
Borisov N, 2002, LECT NOTES COMPUT SC, V2365, P17
[6]   Codes, Bent Functions and Permutations Suitable for DES-like Cryptosystems [J].
Carlet C. ;
Charpin P. ;
Zinoviev V. .
Designs, Codes and Cryptography, 1998, 15 (2) :125-156
[7]   Boomerang Connectivity Table: A New Cryptanalysis Tool [J].
Cid, Carlos ;
Huang, Tao ;
Peyrin, Thomas ;
Sasaki, Yu ;
Song, Ling .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 :683-713
[8]  
Coulter R.S., 1999, N ZEAL J MATH, V28, P171
[9]   Bent Functions From Involutions Over F2n [J].
Coulter, Robert S. ;
Mesnager, Sihem .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (04) :2979-2986
[10]   A family of skew Hadamard difference sets [J].
Ding, Cunsheng ;
Yuan, Jin .
JOURNAL OF COMBINATORIAL THEORY SERIES A, 2006, 113 (07) :1526-1535