On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks

被引:5
作者
Rizomiliotis, Panagiotis [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Karlovassi 83200, Samos, Greece
关键词
Algebraic immunity; Cryptography; Fast algebraic attack; Boolean function; STREAM CIPHERS; CONSTRUCTION; COMPLEXITY; VARIABLES; ALGORITHM;
D O I
10.1007/s10623-010-9367-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past few years, algebraic attacks against stream ciphers with linear feedback function have been significantly improved. As a response to the new attacks, the notion of algebraic immunity of a Boolean function f was introduced, defined as the minimum degree of the annihilators of f and f + 1. An annihilator of f is a nonzero Boolean function g, such that fg = 0. There is an increasing interest in construction of Boolean functions that possess optimal algebraic immunity, combined with other characteristics, like balancedness, high nonlinearity, and high algebraic degree. In this paper, we investigate a recently proposed infinite class of balanced Boolean functions with optimal algebraic immunity, optimum algebraic degree and much better nonlinearity than all the previously introduced classes of Boolean functions with maximal algebraic immunity. More precisely, we study the resistance of the functions against one of the new algebraic attacks, namely the fast algebraic attacks (FAAs). Using the special characteristics of the family members, we introduce an efficient method for the evaluation of their behavior against these attacks. The new algorithm is based on the well studied Berlekamp-Massey algorithm.
引用
收藏
页码:283 / 292
页数:10
相关论文
共 23 条
[1]  
Armknecht F, 2006, LECT NOTES COMPUT SC, V4052, P180
[2]  
Armknecht F, 2006, LECT NOTES COMPUT SC, V4004, P147
[3]  
Braeken A, 2005, LECT NOTES COMPUT SC, V3797, P35
[4]  
Canteaut A, 2006, LECT NOTES COMPUT SC, V3969, P120
[5]   Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction [J].
Carlet, Claude ;
Dalai, Deepak Kumar ;
Gupta, Kishan Chand ;
Maitra, Subhamoy .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (07) :3105-3121
[6]  
Carlet C, 2008, LECT NOTES COMPUT SC, V5350, P425, DOI 10.1007/978-3-540-89255-7_26
[7]  
Courtois NT, 2006, LECT NOTES COMPUT SC, V3935, P261
[8]  
Courtois NT, 2003, LECT NOTES COMPUT SC, V2729, P176
[9]  
Courtois NT, 2003, LECT NOTES COMPUT SC, V2656, P345
[10]   Basic theory in construction of Boolean functions with maximum possible annihilator immunity [J].
Dalai, Deepak Kumar ;
Maitra, Subhamoy ;
Sarkar, Sumanta .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 40 (01) :41-58