681 research outputs found

    Primal-dual distance bounds of linear codes with application to cryptography

    Get PDF
    Let N(d,d⊥)N(d,d^\perp) denote the minimum length nn of a linear code CC with dd and d⊥d^{\bot}, where dd is the minimum Hamming distance of CC and d⊥d^{\bot} is the minimum Hamming distance of C⊥C^{\bot}. In this paper, we show a lower bound and an upper bound on N(d,d⊥)N(d,d^\perp). Further, for small values of dd and d⊥d^\perp, we determine N(d,d⊥)N(d,d^\perp) and give a generator matrix of the optimum linear code. This problem is directly related to the design method of cryptographic Boolean functions suggested by Kurosawa et al.Comment: 6 pages, using IEEEtran.cls. To appear in IEEE Trans. Inform. Theory, Sept. 2006. Two authors were added in the revised versio

    Implementing Symmetric Cryptography Using Sequence of Semi-Bent Functions

    Get PDF
    Symmetric cryptography is a cornerstone of everyday digital security, where two parties must share a common key to communicate. The most common primitives in symmetric cryptography are stream ciphers and block ciphers that guarantee confidentiality of communications and hash functions for integrity. Thus, for securing our everyday life communication, it is necessary to be convinced by the security level provided by all the symmetric-key cryptographic primitives. The most important part of a stream cipher is the key stream generator, which provides the overall security for stream ciphers. Nonlinear Boolean functions were preferred for a long time to construct the key stream generator. In order to resist several known attacks, many requirements have been proposed on the Boolean functions. Attacks against the cryptosystems have forced deep research on Boolean function to allow us a more secure encryption. In this work we describe all main requirements for constructing of cryptographically significant Boolean functions. Moreover, we provide a construction of Boolean functions (semi-bent Boolean functions) which can be used in the construction of orthogonal variable spreading factor codes used in code division multiple access (CDMA) systems as well as in certain cryptographic applications

    On q-ary Bent and Plateaued Functions

    Full text link
    We obtain the following results. For any prime qq the minimal Hamming distance between distinct regular qq-ary bent functions of 2n2n variables is equal to qnq^n. The number of qq-ary regular bent functions at the distance qnq^n from the quadratic bent function Qn=x1x2+⋯+x2n−1x2nQ_n=x_1x_2+\dots+x_{2n-1}x_{2n} is equal to qn(qn−1+1)⋯(q+1)(q−1)q^n(q^{n-1}+1)\cdots(q+1)(q-1) for q>2q>2. The Hamming distance between distinct binary ss-plateaued functions of nn variables is not less than 2s+n−222^{\frac{s+n-2}{2}} and the Hamming distance between distinctternary ss-plateaued functions of nn variables is not less than 3s+n−123^{\frac{s+n-1}{2}}. These bounds are tight. For q=3q=3 we prove an upper bound on nonlinearity of ternary functions in terms of their correlation immunity. Moreover, functions reaching this bound are plateaued. For q=2q=2 analogous result are well known but for large qq it seems impossible. Constructions and some properties of qq-ary plateaued functions are discussed.Comment: 14 pages, the results are partialy reported on XV and XVI International Symposia "Problems of Redundancy in Information and Control Systems
    • …
    corecore