On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions
Vectorial Boolean functions are used as substitution boxes in cryptosystems. Designing inequivalent functions resistant to known attacks is one of the challenges in cryptography. In doing this, finding a fast technique for determining whether two given functions are equivalent is a significant problem. A special class of the equivalence called restricted extended affine (REA) equivalence is studied in this paper. We update the verification procedures of the REA-equivalence types given in the recent work of Budaghyan and Kazymyrov (2012). In particular, we solve the system of linear equations simultaneously in the verification procedures to get better complexity. We also present the explicit number of operations of the verification procedures of these REA-equivalence types. Moreover, we construct two new REA-equivalence types and present the verification procedures of these types with their complexities.
KeywordsVectorial Boolean functions EA-equivalence REA-equivalence
We first thank the referees for providing detailed comments and suggestions. The second author is partially supported by the Scientific and Technological Research Council of Turkey (TÜBİTAK). The third author is supported by TÜBİTAK under the National Postdoctoral Research Scholarship No 2219.
- 7.Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356–365. Springer, Heidelberg (1995) Google Scholar
- 8.Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994) Google Scholar
- 9.Sınak, A.: On verification of restricted extended affine equivalence of vectorial Boolean functions. Master’s thesis, Middle East Technical University (2012)Google Scholar
- 10.Williams, V.V.: Breaking the Coppersmith-Winograd barrier, November 2011Google Scholar