4,589 research outputs found
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
Algebraic and fast algebraic attacks are power tools to analyze stream
ciphers. A class of symmetric Boolean functions with maximum algebraic immunity
were found vulnerable to fast algebraic attacks at EUROCRYPT'06. Recently, the
notion of AAR (algebraic attack resistant) functions was introduced as a
unified measure of protection against both classical algebraic and fast
algebraic attacks. In this correspondence, we first give a decomposition of
symmetric Boolean functions, then we show that almost all symmetric Boolean
functions, including these functions with good algebraic immunity, behave badly
against fast algebraic attacks, and we also prove that no symmetric Boolean
functions are AAR functions. Besides, we improve the relations between
algebraic degree and algebraic immunity of symmetric Boolean functions.Comment: 13 pages, submitted to IEEE Transactions on Information Theor
Fast algebraic immunity of Boolean functions and LCD codes
Nowadays, the resistance against algebraic attacks and fast algebraic attacks
are considered as an important cryptographic property for Boolean functions
used in stream ciphers. Both attacks are very powerful analysis concepts and
can be applied to symmetric cryptographic algorithms used in stream ciphers.
The notion of algebraic immunity has received wide attention since it is a
powerful tool to measure the resistance of a Boolean function to standard
algebraic attacks. Nevertheless, an algebraic tool to handle the resistance to
fast algebraic attacks is not clearly identified in the literature. In the
current paper, we propose a new parameter to measure the resistance of a
Boolean function to fast algebraic attack. We also introduce the notion of fast
immunity profile and show that it informs both on the resistance to standard
and fast algebraic attacks. Further, we evaluate our parameter for two
secondary constructions of Boolean functions. Moreover, A coding-theory
approach to the characterization of perfect algebraic immune functions is
presented. Via this characterization, infinite families of binary linear
complementary dual codes (or LCD codes for short) are obtained from perfect
algebraic immune functions. The binary LCD codes presented in this paper have
applications in armoring implementations against so-called side-channel attacks
(SCA) and fault non-invasive attacks, in addition to their applications in
communication and data storage systems
The complexity of Boolean functions from cryptographic viewpoint
Cryptographic Boolean functions must be complex to satisfy Shannon\u27s principle of confusion. But the cryptographic viewpoint on complexity is not the same as in circuit complexity.
The two main criteria evaluating the cryptographic complexity of Boolean functions on are the nonlinearity (and more generally the -th order nonlinearity, for every positive ) and the algebraic degree. Two other criteria have also been considered: the algebraic thickness and the non-normality. After recalling the definitions of these criteria and why, asymptotically, almost all Boolean functions are deeply non-normal and have high algebraic degrees, high (-th order) nonlinearities and high algebraic thicknesses, we study the relationship between the -th order nonlinearity and a recent cryptographic criterion called the algebraic immunity. This relationship strengthens the reasons why the algebraic immunity can be considered as a further cryptographic complexity criterion
07021 Abstracts Collection -- Symmetric Cryptography
From .. to .., the Dagstuhl Seminar 07021 ``Symmetric Cryptography\u27\u27 automatically
was held in the International Conference and Research Center (IBFI),
Schloss Dagstuhl.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
- …