The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu...The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given.展开更多
The sequences with good correlation properties are widely used in engineering applications, especially in the area of communications. In this paper, the relationships among crosscorrelation functions of arbitrary four...The sequences with good correlation properties are widely used in engineering applications, especially in the area of communications. In this paper, the relationships among crosscorrelation functions of arbitrary four binary sequences of period N are presented. Based on them, for a sequences set, the relationships between cross-correlation functions and autocorrelation functions are studied, by which we prove that they cannot keep optimal at the same time.展开更多
The Walsh transform is an important tool to investigate cryptographic properties of Boolean functions.This paper is devoted to study the Walsh transform of a class of Boolean functions defined as g(x)=f(x)Tr^(n)_(1)(x...The Walsh transform is an important tool to investigate cryptographic properties of Boolean functions.This paper is devoted to study the Walsh transform of a class of Boolean functions defined as g(x)=f(x)Tr^(n)_(1)(x)+h(x)Tr^(n)_(1)(δx),by making use of the known conclusions of Walsh transform and the properties of trace function,and the conclusion is obtained by generalizing an existing result.展开更多
基金Supported by the National Science Foundation of China(No.60773002,61072140)the 111 Project(No.B08038),the Doctoral Program Foundation of Institutions of Higher Education of China(No.20100203110003)+1 种基金the Fundamental Research Funds for the Central Universities(No.JY10000901034)the Anhui Provincial Natural Science Foundation(No.1208085QF119)
文摘The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given.
基金Supported by the Natural Science Foundation of Anhui(1608085MF143)the National Natural Science Foundation of China(60573026,10101008)the Natural Science Foundation of Anhui Higher Education Institutions of China(KJ2018A0678)
文摘The sequences with good correlation properties are widely used in engineering applications, especially in the area of communications. In this paper, the relationships among crosscorrelation functions of arbitrary four binary sequences of period N are presented. Based on them, for a sequences set, the relationships between cross-correlation functions and autocorrelation functions are studied, by which we prove that they cannot keep optimal at the same time.
基金Supported by the Natural Science Foundation of Anhui Higher Education Institutions of China(KJ2020ZD008)Key Research and Development Projects in Anhui Province(202004a05020043)the Graduate Innovation Fund of Huaibei Normal University(yx2021022)。
文摘The Walsh transform is an important tool to investigate cryptographic properties of Boolean functions.This paper is devoted to study the Walsh transform of a class of Boolean functions defined as g(x)=f(x)Tr^(n)_(1)(x)+h(x)Tr^(n)_(1)(δx),by making use of the known conclusions of Walsh transform and the properties of trace function,and the conclusion is obtained by generalizing an existing result.