557 research outputs found

    Constructive Relationships Between Algebraic Thickness and Normality

    Full text link
    We study the relationship between two measures of Boolean functions; \emph{algebraic thickness} and \emph{normality}. For a function ff, the algebraic thickness is a variant of the \emph{sparsity}, the number of nonzero coefficients in the unique GF(2) polynomial representing ff, and the normality is the largest dimension of an affine subspace on which ff is constant. We show that for 0<ϵ<20 < \epsilon<2, any function with algebraic thickness n3ϵn^{3-\epsilon} is constant on some affine subspace of dimension Ω(nϵ2)\Omega\left(n^{\frac{\epsilon}{2}}\right). Furthermore, we give an algorithm for finding such a subspace. We show that this is at most a factor of Θ(n)\Theta(\sqrt{n}) from the best guaranteed, and when restricted to the technique used, is at most a factor of Θ(logn)\Theta(\sqrt{\log n}) from the best guaranteed. We also show that a concrete function, majority, has algebraic thickness Ω(2n1/6)\Omega\left(2^{n^{1/6}}\right).Comment: Final version published in FCT'201

    Foreword

    Get PDF

    A lower bound on the higher order nonlinearity of algebraic immune functions

    Get PDF
    We extend the lower bound, obtained by M. Lobanov, on the first order nonlinearity of functions with given algebraic immunity, into a bound on the higher order nonlinearities

    Codes pseudo-lineaires

    Get PDF

    A method of construction of balanced functions with optimum algebraic immunity

    Get PDF
    Because of the recent algebraic attacks, a high algebraic immunity is now an absolutely necessary (but not sufficient) property for Boolean functions used in stream ciphers. A difference of only 1 between the algebraic immunities of two functions can make a crucial difference with respect to algebraic attacks. Very few examples of (balanced) functions with high algebraic immunity have been found so far. These examples seem to be isolated and no method for obtaining such functions is known. In this paper, we introduce a general method for proving that a given function, in any number of variables, has a prescribed algebraic immunity. We deduce an algorithm for generating balanced functions in any odd number of variables, with optimum algebraic immunity. We also give an algorithm, valid for any even number of variables, for constructing (possibly) balanced functions with optimum (or, if this can be useful, with high but not optimal) algebraic immunity. We also give a new example of an infinite class of such functions. We study their Walsh transforms. To this aim, we completely characterize the Walsh transform of the majority function

    A construction of bent functions from plateaued functions

    Get PDF
    In this presentation, a technique for constructing bent functions from plateaued functions is introduced and analysed. This generalizes earlier techniques for constructing bent from near-bent functions. Using this construction, we obtain a big variety of inequivalent bent functions, some weakly regular and some non-weakly regular. Classes of bent function with some additional properties that enable the construction of strongly regular graphs are constructed, and explicit expressions for bent functions with maximal degree are presented

    Doubly Perfect Nonlinear Boolean Permutations

    Full text link
    Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind differences. While very natural, there are many alternatives to the XOR. Each of them inducing a new form for its corresponding differential attack (using the appropriate notion of difference) and therefore block-ciphers need to use S-boxes that are resistant against these nonstandard differential cryptanalysis. In this contribution we study the functions that offer the best resistance against a differential attack based on a finite field multiplication. We also show that in some particular cases, there are robust permutations which offers the best resistant against both multiplication and exponentiation base differential attacks. We call them doubly perfect nonlinear permutations

    On the Complexity of Computing Two Nonlinearity Measures

    Full text link
    We study the computational complexity of two Boolean nonlinearity measures: the nonlinearity and the multiplicative complexity. We show that if one-way functions exist, no algorithm can compute the multiplicative complexity in time 2O(n)2^{O(n)} given the truth table of length 2n2^n, in fact under the same assumption it is impossible to approximate the multiplicative complexity within a factor of (2ϵ)n/2(2-\epsilon)^{n/2}. When given a circuit, the problem of determining the multiplicative complexity is in the second level of the polynomial hierarchy. For nonlinearity, we show that it is #P hard to compute given a function represented by a circuit

    A complete characterization of plateaued Boolean functions in terms of their Cayley graphs

    Get PDF
    In this paper we find a complete characterization of plateaued Boolean functions in terms of the associated Cayley graphs. Precisely, we show that a Boolean function ff is ss-plateaued (of weight =2(n+s2)/2=2^{(n+s-2)/2}) if and only if the associated Cayley graph is a complete bipartite graph between the support of ff and its complement (hence the graph is strongly regular of parameters e=0,d=2(n+s2)/2e=0,d=2^{(n+s-2)/2}). Moreover, a Boolean function ff is ss-plateaued (of weight 2(n+s2)/2\neq 2^{(n+s-2)/2}) if and only if the associated Cayley graph is strongly 33-walk-regular (and also strongly \ell-walk-regular, for all odd 3\ell\geq 3) with some explicitly given parameters.Comment: 7 pages, 1 figure, Proceedings of Africacrypt 201
    corecore