Abstract
Nonlinearity, 0–1 balancedness and strict avalanche criterion (SAC) are important criteria for cryptographic functions. Bent functions have maximum nonlinearity and satisfy SAC however they are not 0–1 balanced and hence cannot be directly used in many cryptosystems where 0–1 balancedness is needed. In this paper we construct
-
(i)
0–1 balanced boolean functions on V 2k+1 (k≥1) having nonlinearity 22k−2k and satisfying SAC,
-
(ii)
0–1 balanced boolean functions on V 2k (k≥2) having nonlinearity 22k−1−2k and satisfying SAC.
We demonstrate that the above nonlinearities are very high not only for the 0–1 balanced functions satisfying SAC but also for all 0–1 balanced functions.
Supported in part by the Australian Research Council under the reference numbers A49130102, A9030136, A49131885 and A49232172.
Supported in part by the Australian Research Council under the reference number A49130102.
Preview
Unable to display preview. Download preview PDF.
References
C. M. Adams and S. E. Tavares. Generating and counting binary bent sequences. IEEE Transactions on Information Theory, IT-36 No. 5:1170–1173, 1990.
C. M. Adams and S. E. Tavares. The use of bent sequences to achieve higher-order strict avalanche criterion. to appear, 1990.
M. H. Dawson and S. E. Tavares. An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In Advances in Cryptology-EUROCRYPT'91, volume 547, Lecture Notes in Computer Science, pages 352–367. Springer-Verlag, 1991.
John Detombe and Stafford Tavares. Constructing large cryptographically strong S-boxes. Presented in AUSCRYPT'92, 1992.
J. F. Dillon. A survey of bent functions. NSA Mathematical Meeting, pages 191–215, 1972.
R. Forre. The strict avalanche criterion: Special properties of boolean functions and extended definition. In Advances in Cryptology: Crypto '88 Proceedings, volume 403, Lecture Notes in Computer Science, pages 450–468. Springer-Verlag, New York, 1989.
P. V. Kumar and R. A. Scholtz. Bounds on the linear span of bent sequences. IEEE Transactions on Information Theory, IT-29 No. 6:854–862, 1983.
P. V. Kumar, R. A. Scholtz, and L. R. Welch. Generalized bent functions and their properties. Journal of Combinatorial Theory, Ser. A, 40:90–107, 1985.
A. Lempel and M. Cohn. Maximal families of bent sequences. IEEE Transactions on Information Theory, IT-28 No. 6:865–868, 1982.
S Lloyd. Couting functions satisfying a higher order strict avalanche criterion. In Advances in Cryptology-EUROCRYPT'89, volume 434, Lecture Notes in Computer Science, pages 64–74. Springer-Verlag, New York, 1990.
V. V. Losev. Decoding of sequences of bent functions by means of afast Hadamard transform. Radiotechnika i elektronika, 7:1479–1492, 1987.
F. J. MacWilliams and N. J. A. Sloane. The Theory of Error-Correcting Codes. New York: North-Holland, 1977.
Willi Meier and Othmar Staffelbach. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology-EUROCRYPT'89, volume 434, Lecture Notes in Computer Science, pages 549–562. Springer-Verlag, 1990.
Kaisa Nyberg. Perfect nonlinear S-boxes. In Advances in Cryptology-EUROCRYPT'91, volume 547, Lecture Notes in Computer Science, pages 378–386. Springer-Verlag, 1991.
J. D. Olsen, R. A. Scholtz, and L. R. Welch. Bent-function sequences. IEEE Transactions on Information Theory, IT-28 No. 6:858–864, 1982.
J. Pieprzyk and G. Finkelstein. Towards effective nonlinear cryptosystem design. IEE Proceedings (Part E), 135:325–335, 1988.
O. S. Rothaus. On bent functions. Journal of Combinatorial Theory, Ser. A, 20:300–305, 1976.
S. E. Tavares, M. Sivabalan, and L. E. Peppard. On the designs of SP networks from an information theoretic point of view. In Advances in Cryptology: Crypto '92 Proceedings, 1992.
W. D. Wallis, A. Penfold Street, and J. Seberry Wallis. Combinatorics: Room Squares, sum-free sets, Hadamard Matrices, volume 292 of Lecture Notes in Mathematics. Springer-Verlag, Berlin-Heidelberg-New York, 1972.
A. F. Webster. Plaintext/Ciphertext Bit Dependencies in Cryptographic System. Master's Thesis, Department of Electrical Engineering, Queen's University, 1985.
A. F. Webster and S. E. Tavares. On the designs of S-boxes. In Advances in Cryptology: Crypto'85 Proceedings, volume 219, Lecture Notes in Computer Science, pages 523–534. Springer-Verlag, New York, 1986.
R. Yarlagadda and J. E. Hershey. Analysis and synthesis of bent sequences. IEE Proceeding (Part E), 136:112–123, 1989.
Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. Haval — one-way hashing algorithm with variable length of output. Presented in AUSCRYPT'92, 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seberry, J., Zhang, XM. (1993). Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract). In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_58
Download citation
DOI: https://doi.org/10.1007/3-540-57220-1_58
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57220-6
Online ISBN: 978-3-540-47976-5
eBook Packages: Springer Book Archive