Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n

被引:4
作者
Wei, Yongzhuang [1 ,2 ]
Pasalic, Enes [3 ,4 ]
Zhang, Fengrong [5 ]
Hodzic, Samir [3 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Univ Primorska, FAMNIT, Koper, Slovenia
[4] Univ Primorska, IAM, Koper, Slovenia
[5] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
基金
中国博士后科学基金;
关键词
Stream ciphers; Fast algebraic attacks; Time complexity; Algebraic immunity; STREAM CIPHERS; IMMUNITY; ATTACKS; CONSTRUCTIONS; NONLINEARITY;
D O I
10.1016/j.ins.2017.03.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although several methods for estimating the resistance of a random Boolean function against (fast) algebraic attacks were proposed, these methods are usually infeasible in practice for relatively large number of input variables n (for instance n >= 30) due to increased computational complexity. An efficient estimation of the resistance of Boolean functions, with relatively large number of inputs n, against (fast) algebraic attacks appears to be a rather difficult task. In this paper, the concept of partial linear relations decomposition is introduced, which decomposes any given nonlinear Boolean function into many linear (affine) subfunctions by using the disjoint sets of input variables. Based on this result, a general probabilistic decomposition algorithm for nonlinear Boolean functions is presented which gives a new framework for estimating the resistance of Boolean function against (fast) algebraic attacks. It is shown that our new probabilistic method gives very tight estimates (lower and upper bound) and it only requires about O(n(2)2(n)) operations for a random Boolean function with n variables, thus having much less time complexity than previously known algorithms. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:91 / 104
页数:14
相关论文
共 21 条
  • [1] Armknecht F, 2006, LECT NOTES COMPUT SC, V4004, P147
  • [2] Braeken A, 2006, LECT NOTES COMPUT SC, V4058, P40
  • [3] Carlet C, 2008, LECT NOTES COMPUT SC, V5350, P425, DOI 10.1007/978-3-540-89255-7_26
  • [4] Courtois NT, 2003, LECT NOTES COMPUT SC, V2729, P176
  • [5] Courtois NT, 2003, LECT NOTES COMPUT SC, V2656, P345
  • [6] Dalai D. K., 2006, P INT WORKSH BOOL FU, P13
  • [7] Didier F, 2006, LECT NOTES COMPUT SC, V4329, P236
  • [8] Didier F, 2006, LECT NOTES COMPUT SC, V4047, P359
  • [9] Feng X., CRYPTOLOGY EPRINT AR
  • [10] Fischer S, 2007, LECT NOTES COMPUT SC, V4593, P366