Skip to main content

Cryptographic Applications of Boolean Functions

  • Chapter
  • First Online:
Boolean Functions and Their Applications in Cryptography

Part of the book series: Advances in Computer Science and Technology ((ACST))

  • 1309 Accesses

Abstract

Cryptographic applications of Boolean functions are meant to have some cryptographic properties, those properties are built to thwart cryptanalysis of certain kinds, and multiple cryptographic properties are usually required for a Boolean function to be used in cryptographic algorithm design, expected to resist some known attacks to the cryptographic algorithms. Therefore, the primary applications of cryptographic Boolean functions are the design of cryptographic algorithms, particularly stream cipher and block cipher algorithms. This chapter will discuss some applications of Boolean functions with some cryptographic properties in the areas beyond cryptographic algorithm design, where the involved Boolean functions are primary building blocks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security, Zurich, pp. 78–91. ACM (1997)

    Google Scholar 

  2. Chabaud, F.: On the security of some cryptosystems based on error-correcting codes. In: Advances in Cryptology – Proceedings of Eurocrypt’94. LNCS 950, pp. 131–139. Springer, Berlin/Heidelberg (1995)

    Google Scholar 

  3. Desmedt, Y.: Threshold cryptosystems. In: Advances in Cryptology – Proceedings of Auscrypt’92. LNCS 718, pp. 3–14. Springer, Berlin/Heidelberg (1993)

    Google Scholar 

  4. Diffie, W., Hellman, M.: New directions in cryptology. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  5. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company/Bell Telephone Laboratories Incorporated, New York (1978)

    MATH  Google Scholar 

  6. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)

    MATH  Google Scholar 

  7. McEliece, R.L.: “A public-key cryptosystem based on algebraic coding theory”, Deep Space Network Progress Report, Jet Propulsion Labs, Pasadena 42–44, pp. 114–116 (1978)

    Google Scholar 

  8. National Institute for Standards and Technology, “Escrowed Encryption Standard (EES),” Federal Information Processing Standards Publication (FIPS PUB) 185, 9 Feb 1994

    Google Scholar 

  9. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  10. Shamir, A.: Partial key escrow: a new approach to software key escrow, presented at Key Escrow Conference, Washington, D.C., 15 Sept 1995

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Wu, CK., Feng, D. (2016). Cryptographic Applications of Boolean Functions. In: Boolean Functions and Their Applications in Cryptography. Advances in Computer Science and Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48865-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48865-2_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48863-8

  • Online ISBN: 978-3-662-48865-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics