Skip to main content

New Results on Correlation Immunity

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2000 (ICISC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2015))

Included in the following conference series:

Abstract

The absolute indicator for GAC forecasts the overall avalanche characteristics of a cryptographic Boolean function. From a security point of view, it is desirable that the absolute indicator of a function takes as small a value as possible. The first contribution of this paper is to prove a tight lower bound on the absolute indicator of an mth- order correlation immune function with n variables, and to show that a function achieves the lower bound if and only if it is affine. The absolute indicator for GAC achieves the upper bound when the underlying function has a non-zero linear structure. Our second contribution is about a relationship between correlation immunity and non-zero linear structures. The third contribution of this paper is to address an open problem related to the upper bound on the nonlinearity of a correlation immune function. More specifically, we prove that given any odd mth-order correlation immune function f with n variables, the nonlinearity of f, denoted by Nf, must satisfy Nf ≤ 2n-1 - 2m+1 for 1/2n - 1 ≤ m < 0.6n - 0.4 or f has a non-zero linear structure. This extends a known result that is stated for 0.6n - 0.4 ≤ mn - 2.

Acknowledgments

The second author was supported by a Queen Elizabeth II Fellowship (227 23 1002). Both authors would like to thank Yuriy Tarannikov and Subhamoy Maitra for pointing out an error in an earlier version.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Camion, C. Carlet, P. Charpin, and N. Sendrier. On correlation-immune functions. In Advances in Cryptology-CRYPTO’91, volume 576 of Lecture Notes in Computer Science, pages 87–100. Springer-Verlag, Berlin, Heidelberg, New York, 1991.

    Google Scholar 

  2. Claude Carlet. Partially-bent functions. Designs, Codes and Cryptography, 3:135–145, 1993.

    Article  MATH  MathSciNet  Google Scholar 

  3. C. Ding, G. Xiao, and W. Shan. The Stability Theory of Stream Ciphers, volume 561 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, Heidelberg, New York, 1991.

    MATH  Google Scholar 

  4. Xiao Guo-Zhen and J. L. Massey. A spectral characterization of correlation-immune combining functions. IEEE Transactions on Information Theory, 34(3):569–571, 1988.

    Article  MATH  Google Scholar 

  5. M. Hermelin and K. Nyberg. Correlation properties of the bluetooth combiner generator. In The 2nd International Conference on Information Security and Cryptology (ICISC’99), Seoul, Korea, volume 1787 of Lecture Notes in Computer Science, pages 17–29. Springer-Verlag, Berlin, Heidelberg, New York, 1999.

    Google Scholar 

  6. F. J. MacWilliams and N. J. A. Sloane. The Theory of Error-Correcting Codes. North-Holland, Amsterdam, New York, Oxford, 1978.

    Google Scholar 

  7. W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology-EUROCRYPT’89, volume 434 of Lecture Notes in Computer Science, pages 549–562. Springer-Verlag, Berlin, Heidelberg, New York, 1990.

    Google Scholar 

  8. O. S. Rothaus. On “bent” functions. Journal of Combinatorial Theory, Ser. A, 20:300–305, 1976.

    Article  MATH  MathSciNet  Google Scholar 

  9. P. Sarkar and S. Maitra. Nonlinearity bounds and constructions of resilient boolean functions. In Advances in Cryptology-CRYPTO2000, Lecture Notes in Computer Science, pages 515–532. Springer-Verlag, Berlin, Heidelberg, New York, 2000.

    Chapter  Google Scholar 

  10. T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30 No. 5:776–779, 1984.

    Article  MathSciNet  Google Scholar 

  11. X. M. Zhang and Y. Zheng. GAC — the criterion for global avalanche characteristics of cryptographic functions. Journal of Universal Computer Science, 1(5):316–333, 1995. (http://www.jucs.org/).

    MathSciNet  Google Scholar 

  12. X. M. Zhang and Y. Zheng. Cryptographically resilient functions. IEEE Transactions on Information Theory, 43(5):1740–1747, 1997.

    Article  MATH  MathSciNet  Google Scholar 

  13. Y. Zheng and X. M. Zhang. Plateaued functions. In Advances in Cryptology-ICICS’99, volume 1726 of Lecture Notes in Computer Science, pages 284–300. Springer-Verlag, Berlin, Heidelberg, New York, 1999.

    Google Scholar 

  14. Y. Zheng and X. M. Z hang. Improved upper bound on the nonlinearity of high order correlation immune functions. In Selected Areas in Cryptography, 7th Annual International Workshop, SAC2000, volume xxxx of Lecture Notes in Computer Science, pages xxx–xxx. Springer-Verlag, Berlin, Heidelberg, New York, 2000 (in Pre-Proceedings pages 258-269).

    Google Scholar 

  15. Y. Zheng and X. M. Zhang. On relationships among avalanche, nonlinearity and correlation immunity. In Advances in Cryptology-ASIACRYPT2000, volume 1976 of Lecture Notes in Computer Science, pages 470–482. Springer-Verlag, Berlin, Heidelberg, New York, 2000.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zheng, Y., Zhang, XM. (2001). New Results on Correlation Immunity. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-45247-8_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41782-8

  • Online ISBN: 978-3-540-45247-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics