Skip to main content

Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract)

  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '92 (AUSCRYPT 1992)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 718))

Abstract

Nonlinearity, 0–1 balancedness and strict avalanche criterion (SAC) are important criteria for cryptographic functions. Bent functions have maximum nonlinearity and satisfy SAC however they are not 0–1 balanced and hence cannot be directly used in many cryptosystems where 0–1 balancedness is needed. In this paper we construct

  1. (i)

    0–1 balanced boolean functions on V 2k+1 (k≥1) having nonlinearity 22k−2k and satisfying SAC,

  2. (ii)

    0–1 balanced boolean functions on V 2k (k≥2) having nonlinearity 22k−1−2k and satisfying SAC.

We demonstrate that the above nonlinearities are very high not only for the 0–1 balanced functions satisfying SAC but also for all 0–1 balanced functions.

Supported in part by the Australian Research Council under the reference numbers A49130102, A9030136, A49131885 and A49232172.

Supported in part by the Australian Research Council under the reference number A49130102.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. M. Adams and S. E. Tavares. Generating and counting binary bent sequences. IEEE Transactions on Information Theory, IT-36 No. 5:1170–1173, 1990.

    Google Scholar 

  2. C. M. Adams and S. E. Tavares. The use of bent sequences to achieve higher-order strict avalanche criterion. to appear, 1990.

    Google Scholar 

  3. M. H. Dawson and S. E. Tavares. An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In Advances in Cryptology-EUROCRYPT'91, volume 547, Lecture Notes in Computer Science, pages 352–367. Springer-Verlag, 1991.

    Google Scholar 

  4. John Detombe and Stafford Tavares. Constructing large cryptographically strong S-boxes. Presented in AUSCRYPT'92, 1992.

    Google Scholar 

  5. J. F. Dillon. A survey of bent functions. NSA Mathematical Meeting, pages 191–215, 1972.

    Google Scholar 

  6. R. Forre. The strict avalanche criterion: Special properties of boolean functions and extended definition. In Advances in Cryptology: Crypto '88 Proceedings, volume 403, Lecture Notes in Computer Science, pages 450–468. Springer-Verlag, New York, 1989.

    Google Scholar 

  7. P. V. Kumar and R. A. Scholtz. Bounds on the linear span of bent sequences. IEEE Transactions on Information Theory, IT-29 No. 6:854–862, 1983.

    Google Scholar 

  8. P. V. Kumar, R. A. Scholtz, and L. R. Welch. Generalized bent functions and their properties. Journal of Combinatorial Theory, Ser. A, 40:90–107, 1985.

    Google Scholar 

  9. A. Lempel and M. Cohn. Maximal families of bent sequences. IEEE Transactions on Information Theory, IT-28 No. 6:865–868, 1982.

    Google Scholar 

  10. S Lloyd. Couting functions satisfying a higher order strict avalanche criterion. In Advances in Cryptology-EUROCRYPT'89, volume 434, Lecture Notes in Computer Science, pages 64–74. Springer-Verlag, New York, 1990.

    Google Scholar 

  11. V. V. Losev. Decoding of sequences of bent functions by means of afast Hadamard transform. Radiotechnika i elektronika, 7:1479–1492, 1987.

    Google Scholar 

  12. F. J. MacWilliams and N. J. A. Sloane. The Theory of Error-Correcting Codes. New York: North-Holland, 1977.

    Google Scholar 

  13. Willi Meier and Othmar Staffelbach. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology-EUROCRYPT'89, volume 434, Lecture Notes in Computer Science, pages 549–562. Springer-Verlag, 1990.

    Google Scholar 

  14. Kaisa Nyberg. Perfect nonlinear S-boxes. In Advances in Cryptology-EUROCRYPT'91, volume 547, Lecture Notes in Computer Science, pages 378–386. Springer-Verlag, 1991.

    Google Scholar 

  15. J. D. Olsen, R. A. Scholtz, and L. R. Welch. Bent-function sequences. IEEE Transactions on Information Theory, IT-28 No. 6:858–864, 1982.

    Google Scholar 

  16. J. Pieprzyk and G. Finkelstein. Towards effective nonlinear cryptosystem design. IEE Proceedings (Part E), 135:325–335, 1988.

    Google Scholar 

  17. O. S. Rothaus. On bent functions. Journal of Combinatorial Theory, Ser. A, 20:300–305, 1976.

    Google Scholar 

  18. S. E. Tavares, M. Sivabalan, and L. E. Peppard. On the designs of SP networks from an information theoretic point of view. In Advances in Cryptology: Crypto '92 Proceedings, 1992.

    Google Scholar 

  19. W. D. Wallis, A. Penfold Street, and J. Seberry Wallis. Combinatorics: Room Squares, sum-free sets, Hadamard Matrices, volume 292 of Lecture Notes in Mathematics. Springer-Verlag, Berlin-Heidelberg-New York, 1972.

    Google Scholar 

  20. A. F. Webster. Plaintext/Ciphertext Bit Dependencies in Cryptographic System. Master's Thesis, Department of Electrical Engineering, Queen's University, 1985.

    Google Scholar 

  21. A. F. Webster and S. E. Tavares. On the designs of S-boxes. In Advances in Cryptology: Crypto'85 Proceedings, volume 219, Lecture Notes in Computer Science, pages 523–534. Springer-Verlag, New York, 1986.

    Google Scholar 

  22. R. Yarlagadda and J. E. Hershey. Analysis and synthesis of bent sequences. IEE Proceeding (Part E), 136:112–123, 1989.

    Google Scholar 

  23. Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. Haval — one-way hashing algorithm with variable length of output. Presented in AUSCRYPT'92, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seberry, J., Zhang, XM. (1993). Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract). In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_58

Download citation

  • DOI: https://doi.org/10.1007/3-540-57220-1_58

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57220-6

  • Online ISBN: 978-3-540-47976-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics