Invariants for EA- and CCZ-equivalence of APN and AB functions

被引:2
作者
Kaleyski, Nikolay S. [1 ]
机构
[1] Univ Bergen, N-5007 Bergen, Norway
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2021年 / 13卷 / 06期
关键词
CCZ-equivalence; EA-equivalence; Almost perfect nonlinear function; Almost bent function; Invariant; AFFINE EQUIVALENCE; POWER; FAMILY;
D O I
10.1007/s12095-021-00541-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An (n,m)-function is a mapping from F-2(n) ti F-2(m) . Such functions have numerous applications across mathematics and computer science, and in particular are used as building blocks of block ciphers in symmetric cryptography. The classes of APN and AB functions have been identified as cryptographically optimal with respect to the resistance against two of the most powerful known cryptanalytic attacks, namely differential and linear cryptanalysis. The classes of APN and AB functions are directly related to optimal objects in many other branches of mathematics, and have been a subject of intense study since at least the early 90's. Finding new constructions of these functions is hard; one of the most significant practical issues is that any tentatively new function must be proven inequivalent to all the known ones. Testing equivalence can be significantly simplified by computing invariants, i.e. properties that are preserved by the respective equivalence relation. In this paper, we survey the known invariants for CCZ- and EA-equivalence, with a particular focus on their utility in distinguishing between inequivalent instances of APN and AB functions. We evaluate each invariant with respect to how easy it is to implement in practice, how efficiently it can be calculated on a computer, and how well it can distinguish between distinct EA- and CCZ-equivalence classes.
引用
收藏
页码:995 / 1023
页数:29
相关论文
共 56 条
[1]  
[Anonymous], 2011, P CONT FOR COD THEOR
[2]  
Beierle C., 2020, ARXIV200907204
[3]  
Beth T., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P65
[4]  
Beth Thomas, 1999, Encyclopedia of Mathematics and its Applications, V69
[5]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[6]  
Biryukov A, 2003, LECT NOTES COMPUT SC, V2656, P33
[7]   Anomalies and Vector Space Search: Tools for S-Box Analysis [J].
Bonnetain, Xavier ;
Perrin, Leo ;
Tian, Shizhu .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 :196-223
[8]   The Magma algebra system .1. The user language [J].
Bosma, W ;
Cannon, J ;
Playoust, C .
JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) :235-265
[9]   A few more quadratic APN functions [J].
Bracken, Carl ;
Byrne, Eimear ;
Markin, Nadya ;
McGuire, Gary .
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2011, 3 (01) :43-53
[10]   On the classification of APN functions up to dimension five [J].
Brinkmann, Marcus ;
Leander, Gregor .
DESIGNS CODES AND CRYPTOGRAPHY, 2008, 49 (1-3) :273-288