Abstract
In this paper, we study a class of Boolean functions with good cryptographic properties. We show that the functions of this class are 1-resilient and have optimal algebraic degree and good nonlinearity. Further, we prove that the functions of this class have at least sub-maximum algebraic immunity. We also check that, at least for small values of the number of variables, the functions of this class have very good nonlinearity, maximum algebraic immunity and almost perfect immunity to fast algebraic attacks.
Supported by the National 973 Program of China under Grant 2011CB302400, the National Natural Science Foundation of China under Grants 10971246, 60970152 and 61173134, and the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant XDA06010701.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 65–82. Springer, Heidelberg (2004)
Armknecht, F., Carlet, C., Gaborit, P., Künzli, S., Meier, W., Ruatta, O.: Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 147–164. Springer, Heidelberg (2006)
Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models in Mathematics, Computer Science, and Engineering, pp. 257–397. Cambridge University Press, Cambridge (2010)
Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 425–440. Springer, Heidelberg (2008)
Cohen, G., Flori, J.P.: On a generalized combinatorial conjecture involving addition mod 2k − 1. Cryptology ePrint Archive, Report 2011/400, http://eprint.iacr.org/
Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)
Courtois, N.T.: Cryptanalysis of sfinks. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 261–269. Springer, Heidelberg (2006)
Dalai, D.K., Maitra, S., Sarkar, S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Designs, Codes and Cryptography 40(1), 41–58 (2006)
Du, Y., Zhang, F.: A class of 1-resilient functions in odd variables with high nonlinearity and suboptimal algebraic immunity. IEICE Transactions (IEICET) 95-A(1), 417–420 (2012)
Feng, K., Liao, Q., Yang, J.: Maximal values of generalized algebraic immunity. Designs, Codes and Cryptography 50(2), 243–252 (2009)
Fischer, S., Meier, W.: Algebraic immunity of S-boxes and augmented functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 366–381. Springer, Heidelberg (2007)
Hawkes, P., Rose, G.G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 390–406. Springer, Heidelberg (2004)
Jin, Q., Liu, Z., Wu, B.: 1-Resilient Boolean function with optimal algebraic immunity. Cryptology ePrint Archive, Report 2011/549, http://eprint.iacr.org/
Jin, Q., Liu, Z., Wu, B., et al.: A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity. Cryptology ePrint Archive, Report 2011/515, http://eprint.iacr.org/
Li, N., Qu, L., Qi, W., et al.: On the construction of Boolean Functions with optimal algebraic immunity. IEEE Transactions on Information Theory 54(3), 1330–1334 (2008)
Li, N., Qi, W.-F.: Construction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 84–98. Springer, Heidelberg (2006)
Liu, M., Lin, D., Pei, D.: Fast algebraic attacks and decomposition of symmetric Boolean functions. IEEE Transactions on Information Theory 57(7), 4817–4821 (2011)
Liu, M., Zhang, Y., Lin, D.: Perfect algebraic immune functions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 172–189. Springer, Heidelberg (2012)
Liu, M., Zhang, Y., Lin, D.: On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation (extended abstract). In: The Third International Conference on Symbolic Computation and Cryptography, SCC 2012 (2012), A full version is available at http://eprint.iacr.org/2012/498/
Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004)
Pan, S., Fu, X., Zhang, W.: Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. J. Comput. Sci. Technol. (JCST) 26(2), 269–275 (2011)
Rizomiliotis, P.: On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation. IEEE Transactions on Information Theory 56(8), 4014–4024 (2010)
Rizomiliotis, P.: On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks. Designs, Codes and Cryptography 57(3), 283–292 (2010)
Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory 30(5), 776–780 (1984)
Su, W., Zeng, X., Hu, L.: Construction of 1-resilient Boolean functions with optimum algebraic immunity. Int. J. Comput. Math. (IJCM) 88(2), 222–238 (2011)
Tang, D., Carlet, C., Tang, X.: Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Transactions on Information Theory (2012), http://dx.doi.org/10.1109/TIT.2012.2217476 , 10.1109/TIT.2012.2217476
Tu, Z., Deng, Y.: A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Designs, Codes and Cryptography 60(1), 1–14 (2011)
Tu, Z., Deng, Y.: Boolean functions optimizing most of the cryptographic criteria. Discrete Applied Mathematics 160(4-5), 427–435 (2012)
Zeng, X., Carlet, C., Shan, J., Hu, L.: More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks. IEEE Transactions on Information Theory 57(9), 6310–6320 (2011)
Zhang, Y., Liu, M., Lin, D.: On the immunity of rotation symmetric Boolean functions against fast algebraic attacks. Cryptology ePrint Archive, Report 2012/111, http://eprint.iacr.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, T., Liu, M., Lin, D. (2013). Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks. In: Kutyłowski, M., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2012. Lecture Notes in Computer Science, vol 7763. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38519-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-38519-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38518-6
Online ISBN: 978-3-642-38519-3
eBook Packages: Computer ScienceComputer Science (R0)