期刊文献+

Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation

Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
下载PDF
导出
摘要 To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to construct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is determined for the number of Boolean functions with maximum algebraic immunity. To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to constmct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is deter- mined for the number of Boolean functions with rmximum algebraic immunity.
出处 《China Communications》 SCIE CSCD 2012年第10期33-39,共7页 中国通信(英文版)
基金 This work was supported by the National Natural Science Foundation of China under Grants No. 61103191, No. 61070215 the Funds of Key Lab of Fujian Province University Network Security and Cryptology under Crant No. 2011003 and the Open Research Fund of State Key Laboratory of Inforrmtion Security.
关键词 布尔函数 代数攻击 多项式表示 免疫 奇数 构造函数 流密码 非线性 cryptography boolean function alge- braic attack algebraic immunity
  • 相关文献

参考文献21

  • 1CARLET C, DALAI D, GUPTA K, et al. Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction[J]. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121.
  • 2CARLET C, FENG Keqin. An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity[C]// Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Springer-Verlag, 2008: 425-440.
  • 3CHEN Yindong, LU Peizfiong. Two Classes of Symmetric Boolean Functions with Optimum Algebraic Immunity: Construction and Analysis[J]. IEEE Transactions on Information Theory, 2011, 57(4): 2522-2538.
  • 4COURTOIS N, MEIER W. Algebraic Attacks on Stream Ciphers with Linear Feedback[C]// Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques. Springer-Verlag, LNCS 2656/ 2003: 345-359.
  • 5DALAI D, MAITRA S, SARKAR S. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity [J]. Design, Codes and Cryptography, 2006, 40(1): 41-58.
  • 6DU YuSong,PEI DingYi.Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree[J].Science China(Information Sciences),2010,53(4):780-787. 被引量:6
  • 7DU Yusong, ZHANG Fangguo. A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity[J]. IEEE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012, E95.A(1): 417-420.
  • 8FU S, QU L, LI C, et al. Balanced Rotation Symmetric Boolean Functions with Maximum Algebraic Inmxmity[J]. IET Information Security, 2011, 5(2): 93-99.
  • 9FU Shaojing, LI Chao, MATSUURA K, et al. Construction of Even-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity [J]. Lecture Notes in Computer Science, 2009, 5888/2009: 402-412.
  • 10LIU MeiCheng1,3, DU YuSong2, PEI DingYi2 & LIN DongDai1 1The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, Beijing 100190, China,2College of Mathematics and Information Sciences, Guangzhou University, Guangzhou 510006, China,3Graduate University of Chinese Academy of Sciences, Beijing 100049, China.On designated-weight Boolean functions with highest algebraic immunity[J].Science China Mathematics,2010,53(11):2847-2854. 被引量:2

二级参考文献26

  • 1LIAO QunYing1, LIU Feng2 & FENG KeQin2 1 College of Mathematics and Software Sciences, Sichuan Normal University, Chengdu 610066, China 2 Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China.On (2~m + 1)-variable symmetric Boolean functions with submaximum algebraic immunity 2^(m-1)[J].Science China Mathematics,2009,52(1):17-28. 被引量:4
  • 2LI Na QI WenFeng.Boolean functions of an odd number of variables with maximum algebraic immunity[J].Science in China(Series F),2007,50(3):307-317. 被引量:8
  • 3Carlet C, Dalai D K, Gupta K C, Maitra S. Algebraic im-munity for cryptographicaUy significant Boolean functions: Analysis and construction. IEEE Transactions on Informa- tion Theory,2006,52(7):3105-3121.
  • 4Tu Z, Deng Y. A class of 1-resilient function with high nonlin- earity and algebraic immunity. Cryptography ePrint Archive, Report 2010/179,2010, http://eprint.iacr.org/.
  • 5Le Bars J M, Viola A. Equivalence classes of Boolean func-tions for first-order correlation. IEEE Transactions on Infor-mation Theory, 2010,56(3):1247-1261.
  • 6Wang Q, Peng J, Kan H, Xue X. Constructions of crypto-graphically significant Boolean functions using primitive poly-nomials. IEEE Transactions on Information Theory,2010,56(6):3048-3053.
  • 7Sarkar S, Maitra S. Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros. Des. Codes Cryptogr.,2008,49:95-103.
  • 8Siegenthaler T. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory,1984,30(5):776-780.
  • 9Xiao G Z, Massey J L. A spectral characterization of correlation-immune combining functions. IEEE Transactions on Information Theory, 1988,34(3):569-571.
  • 10Meier W, Staffelbach O. Nonlinearity criteria for crypto-graphic functions. In Proc. Advances in Cryptology - EUROCRYPTl89, Houthalen, Belgium, April 10-13,1990,pp.549-562.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部