期刊文献+

具有高代数免疫阶的弹性布尔函数构造 被引量:4

Construction of Resilient Boolean Function with High Algebraic Immunity Order
下载PDF
导出
摘要 提出一种二阶级联构造方法,通过选择恰当的参数s,使每次级联增加2个变元的同时代数免疫阶增加1、代数次数增加1。该方法在保持布尔函数弹性的同时能有效提高非线性度。在此基础上设计一类非线性度高于已知构造方法的代数免疫最优布尔函数以及一类非线性度好且满足一阶弹性的代数免疫至少次优的布尔函数,并利用二阶级联迭代构造密码学性质好的布尔函数。 This paper proposes a construction method for second-order concatenation.By choosing the proper parameter s,the degree and algebraic immunity are increased by one when two variables are added.It increases the nonlinearity effectively while holding the resiliency of the Boolean function.Based on the method,a class of functions with optimal algebraic immunity is constructed with better nonlinearity,and a class of function with at least suboptimal algebraic immunity is derived which has one-order of resiliency and good nonlinearity.The recursive method is used for constructing the cryptographic good Boolean functions.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第6期124-126,共3页 Computer Engineering
基金 国家部委基金资助项目
关键词 代数攻击 代数免疫 二阶级联 非线性度 弹性 布尔函数 algebraic attack algebraic immunity second-order concatenation nonlinearity resiliency Boolean function
  • 相关文献

参考文献5

  • 1Carlet C, Dalai D K, Gupta K C, et al. Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction[J]. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121.
  • 2Dalai D K, Gupta K C, Maitra S. Notion of Algebraic Immunity and Its Evaluation Related to Fast Algebraic Attacks[EB/OL]. (2006-02-08). http:/leprint.iacr.org/2006/O18.
  • 3Carlet C, Feng Keqin. An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity [C]//Proc. of ASIACRYPT'08. Melbourne, Australia: [s. n.], 2008.
  • 4Qu kongjiang, Feng Keqin, Liu Feng, et al. Constructing Symmetric Boolean Functions with Maximum Algebraic Immunity[J]. IEEE Transactions on Information Theory, 2009, 55(5): 2406-2412.
  • 5Braeken A, Preneel B. On the Algebraic Immunity of Symmetric Boolean Functions[C]//Proc. of INDOCRYPT'05. Bangalore, India: [s. n.], 2005.

同被引文献32

  • 1王永娟,曾本胜,李世取.利用特征矩阵构造Bent函数[J].信息安全与通信保密,2005(7):70-73. 被引量:1
  • 2罗启彬,张健.流密码的现状和发展[J].信息与电子工程,2006,4(1):75-80. 被引量:18
  • 3CARLET C, DALAI D K. Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity[C]//IEEE.ISIT2006. Seattle, USA: IEEE, 2006 : 734-738.
  • 4Claude Carlet. Improving the Algebraic Immunity of Resilient and Nonlinear Functions and Constructing Bent Functions[EB/OL][2012-02-15]. http : //eprint.iacr. org/2004/276.pdf.
  • 5I Anne Canteaut. Open Problems Related to Algebraic Attacks on Stream Ciphers[C].[s.1.]: Springer-Verlag, 2006: 120-134.
  • 6Tarannikov T. On Resilient Boolean Functions with Maximal Possible[EB/OL]. [2012-04-22]. http://eprint.iacr. org.
  • 7Carlet C, Deepak D K. Algebraic Immunity for Crypto- graphically Significant Boolean Functions: Analysis and Construction[J]. IEEE Transactions on Information Theory, 2002, 52(7): 3105-3121.
  • 8Courtios N, Meier W. Algebraic Attacks on Stream Ciphers with Linear Feedback[M]. [S. 1.]: Springer-Verlag, 2003: 346-359.
  • 9Yao Minglin, Ma Junshuang. Stream Cipher on Wireless Sensor Network[C]//Proceedings of the 3rd International Conference on Measuring Technology and Mechatronics Automation. Shanghai, China: [s. n.], 2001.
  • 10Courtois N, Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt[J]. Lecture Notes in Computer Science, 2002, 2587(11): 182-199.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部