Skip to main content

The Correlation of a Boolean Function with Its Variables

  • Conference paper
  • First Online:
Progress in Cryptology —INDOCRYPT 2000 (INDOCRYPT 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1977))

Included in the following conference series:

Abstract

The correlation of a Boolean function with its variables is closely related to the correlation attack on stream cipher. The Walsh transformation is the main tool to study the correlation of Boolean functions. The Walsh transformation of a Boolean function with r variables has 2r coefficients. Let k denote the number of non-zero coefficients of the Walsh Transformations. The paper studies the functions with 1 ≤k ≤ 8. It is proved that the functions with k = 1 are the linear functions only, there are no functions with k = 2, 3, 5, 6, 7, and finally we construct all functions with k = 4 or 8.

Supported by NNSF under contract No. 19931010

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. V. Chepyzhov and B. Smeets, On a fast correlation attack on certain stream cipher, Advance in Cryptology-Eurocrypt’91 (LNCS 547) (1991), 176–185.

    Google Scholar 

  2. J. Golic, On the security of shift register based keystream generators, R. Anderson, editor, Fast Software Encryption, Cambridge Security Workshop, Springer-Verlag (LNCS 809) (1994), 90–100.

    Google Scholar 

  3. J. Golic and M. Mihaljevic, A generalized correlation attack on a class of stream cipher based on the Levenshtein distance, J. of Cryptology 3 (1991), 201–212.

    Article  MATH  MathSciNet  Google Scholar 

  4. R.A. Rueppel, Stream cipher, G.J. Simmons, editor, Contemporary Cryptology: The Science of Information Integrity (1992), 65–134.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pei, D., Qin, W. (2000). The Correlation of a Boolean Function with Its Variables. In: Roy, B., Okamoto, E. (eds) Progress in Cryptology —INDOCRYPT 2000. INDOCRYPT 2000. Lecture Notes in Computer Science, vol 1977. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44495-5_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-44495-5_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41452-0

  • Online ISBN: 978-3-540-44495-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics