Constructing Correlation Immune Symmetric Boolean Functions

被引:7
作者
Peng, Jie [1 ]
Kan, Haibin [2 ]
机构
[1] Fudan Univ, Sch Math Sci, Shanghai 200433, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
stream cipher; correlation attack; correlation immunity; symmetric Boolean function;
D O I
10.1587/transfun.E94.A.1591
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Boolean function is said to be correlation immune if its output leaks no information about its input values. Such functions have many applications in computer security practices including the construction of key stream generators from a set of shift registers. Finding methods for easy construction of correlation immune Boolean functions has been an active research area since the introduction of the notion by Siegenthaler. In this paper, we present several constructions of nonpalindromic correlation immune symmetric Boolean functions. Our methods involve finding binomial coefficient identities and obtaining new correlation immune functions from known correlation immune functions. We also consider the construction of higher order correlation immunity symmetric functions and propose a class of third order correlation immune symmetric functions on n variables, where n + 1(>= 9) is a perfect square.
引用
收藏
页码:1591 / 1596
页数:6
相关论文
共 50 条
  • [41] A note on symmetric Boolean functions with maximum algebraic immunity in odd number of variables
    Qu, Longjiang
    Li, Chao
    Feng, Keqin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (08) : 2908 - 2910
  • [42] On the 2m-variable symmetric Boolean functions with maximum algebraic immunity
    LongJiang Qu
    Chao Li
    Science in China Series F: Information Sciences, 2008, 51 : 120 - 127
  • [43] On the 2~m-variable symmetric Boolean functions with maximum algebraic immunity
    QU LongJiang~1 LI Chao~(1
    2 Key Lab of Network Security and Cryptology Technique
    Science in China(Series F:Information Sciences), 2008, (02) : 120 - 127
  • [44] Constructions of rotation symmetric Boolean functions satisfying almost all cryptographic criteria
    Sun, Lei
    Shi, Zexia
    Liu, Jian
    Fu, Fang-Wei
    THEORETICAL COMPUTER SCIENCE, 2024, 1020
  • [45] Synthesis of Logic Units for Calculating Self-Dual Symmetric Boolean Functions
    Suprun, V. P.
    Korobko, F. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2014, 48 (01) : 17 - 24
  • [46] On the 2m-variable symmetric Boolean functions with maximum algebraic immunity
    Qu LongJiang
    Li Chao
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (02): : 120 - 127
  • [47] Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
    Shi, Danping
    Sun, Siwei
    Sasaki, Yu
    Li, Chaoyun
    Hu, Lei
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 180 - 209
  • [48] Highly nonlinear balanced Boolean functions with a good correlation-immunity
    Filiol, E
    Fontaine, C
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 475 - 488
  • [49] On 2k-Variable Symmetric Boolean Functions With Maximum Algebraic Immunity k
    Wang, Hui
    Peng, Jie
    Li, Yuan
    Kan, Haibin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (08) : 5612 - 5624
  • [50] Almost Boolean functions: The design of Boolean functions by spectral inversion
    Clark, JA
    Jacob, JL
    Maitra, S
    Stanica, P
    COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 450 - 462