Abstract
For vectorial Boolean functions, the behavior of iteration has consequence in the diffusion property of the system. We present a study on the diffusion property of iterated vectorial Boolean functions. The measure that will be of main interest here is the notion of the degree of completeness, which has been suggested by the NESSIE project. We provide the first (to the best of our knowledge) two constructions of (n, n)-functions having perfect diffusion property and optimal algebraic degree. We also obtain the complete enumeration results for the constructed functions.
This work is supported by the National Key Basic Research Program of China under Grant 2013CB834204.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bard, G.V.: Algebraic Cryptanalysis. Springer, New York (2009)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257–397. Cambridge University Press, London (2010)
Carlet, C.: Vectorial Boolean functions for cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 398–469. Cambridge University Press, London (2010)
Courtois, N.T., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Heidelberg (2002)
Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Ph.D. thesis, Catholic University of Louvain (1995)
Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)
Fischer, S., Meier, W.: Algebraic immunity of S-boxes and augmented functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 366–381. Springer, Heidelberg (2007)
Forré, R.: Methods and instruments for designing S-boxes. J. Cryptol. 2(3), 115–130 (1990)
Kam, J.B., Davida, G.I.: Structured design of substitution-permutation encryption networks. IEEE Trans. Comput. C–28(10), 747–753 (1979)
Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press, New York (1997)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Maximov, A.: Classes of plateaued rotation symmetric Boolean functions under transformation of Walsh spectra. Cryptology ePrint Archive, Report 2004/354 (2004). https://eprint.iacr.org/2004/354
Pieprzyk, J., Qu, C.X.: Fast hashing and rotation-symmetric functions. J. Univers. Comput. Sci. 5(1), 20–31 (1999)
Preneel, B., Bosselaers, A., Rijmen, V., et al.: Comments by the NESSIE project on the AES finalists (2000). http://www.nist.gov/aes
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
Acknowledgments
The authors would like to thank the anonymous referees for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, J., Mesnager, S., Chen, L. (2015). On the Diffusion Property of Iterated Functions. In: Groth, J. (eds) Cryptography and Coding. IMACC 2015. Lecture Notes in Computer Science(), vol 9496. Springer, Cham. https://doi.org/10.1007/978-3-319-27239-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-27239-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27238-2
Online ISBN: 978-3-319-27239-9
eBook Packages: Computer ScienceComputer Science (R0)