Skip to main content

On the Symmetric Property of Homogeneous Boolean Functions

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1587))

Included in the following conference series:

Abstract

We use combinatorial methods and permutation groups to classify homogeneous boolean functions. The property of symmetry of a boolean function limits the size of the function’s class. We exhaustively searched for all boolean functions on V 6. We found two interesting classes of degree 3 homogeneous boolean functions: the first class is degree 3 homogeneous bent boolean functions; and the second is degree 3 homogeneous balanced boolean functions. Both the bent and balanced functions discovered have nice algebraic and combinatorial structures. We note that some structures can be extended to a large boolean space. The application of homogeneous boolean functions for fast implementation on parallel architectures is mooted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. E. Shannon, Communication theory of secrecy system, Bell System Technical Journal, 28: 656–715, 1976

    MathSciNet  Google Scholar 

  2. L. O’Connor, On the distribution of characteristics in bijective mappings, Journal of Cryptology, 8: 67–86, 1995.

    MATH  Google Scholar 

  3. B. Preneel, W. V. Leekwijck, L. V. Linden, R. Govaerts and J. Vandewalle, Propagation characteristics of boolean functions, In Advances in Cryptology — EUROCRYPT’90, Lecture Notes in Computer Science, 473, Springer-Verlag, 161–173, 1991.

    Google Scholar 

  4. A. F.Webster and S. E. Tavares, On the design of S-box, In Advances in Cryptology — CRYPTO’85, Lecture Notes in Computer Science, 219, Springer-Verlag, 523–534, 1986.

    Chapter  Google Scholar 

  5. X. M. Zhang, Y. Zheng, H. Imai, Differential distribution and other properties of substitution boxes, Proceedings of JW-ISC’97, Session 1 / Block cipher, 19–29, 1997.

    Google Scholar 

  6. O. S. Rothaus, On “bent” functions, Journal of Combinatorial Theory (A), Academic Press, Inc., 20:300–305, 1976.

    Article  MATH  MathSciNet  Google Scholar 

  7. J. F. Dillon, Elementary Hadamard difference set, PhD Dissertation, University of Maryland, 1976.

    Google Scholar 

  8. Kaisa Nyberg, Construction of bent functions and difference sets, In Advances in Cryptology — EUROCRYPT’90, Lecture Notes in Computer Science, 473, Springer-Verlag, 151–160, 1991.

    Google Scholar 

  9. Josef Pieprzyk, Zhong Li, Jennifer Seberry and Xian Mo Zhang, Fast-H: A family of fast and strong hashing algorithms, (preprint) 1997.

    Google Scholar 

  10. Carlisle Adams and Stafford Tavares, The structured design of cryptographically good S-boxes, Journal of Cryptology, 3:27–41, 1990.

    Article  MATH  MathSciNet  Google Scholar 

  11. Willi Meier and Othmar Staffelbach, Nonlinearity criteria for cryptographic functions, Lecture Notes in Computer Science, EUROCRYPT’89, 549–562, 1989.

    Google Scholar 

  12. J. Seberry and X.M. Zhang and Y. Zheng, Highly nonlinear 0-1 balanced functions satisfying strict avalanche criterion, Advances in Cryptology-AUSCRYPT’92, Lecture Notes in Computer Science, 718, Springer-Verlag, 145–155, 1993.

    Google Scholar 

  13. Josef Pieprzyk and Chengxin Qu, Rotation-symmetric functions and fast hashing, Information Security and Privacy, ACISP’98, Lecture Notes in Computer Science, 1438, Springer-Verlag, 169–180, 1998.

    Chapter  Google Scholar 

  14. Chengxin Qu, Jennifer Seberry and Josef Pieprzyk, Homogeneous bent functions, (preprint), 1998.

    Google Scholar 

  15. Alfred J. Menezes, Paul C. Van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, Boca Raton, 1996.

    Google Scholar 

  16. Bruce E. Sagan, “The Symmetric Group; Representations, Combinatorial Algorithms, and Symmetric Functions”, Wadsworth & Books, Pacific Grove, Calif., 1991.

    MATH  Google Scholar 

  17. Anne Penfold Street and Deborah J. Street, “Combinatorics of Experimental Design”, Oxford Science Publications, Oxford, 1987.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qu, C., Seberry, J., Pieprzyk, J. (1999). On the Symmetric Property of Homogeneous Boolean Functions. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 1999. Lecture Notes in Computer Science, vol 1587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48970-3_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-48970-3_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65756-9

  • Online ISBN: 978-3-540-48970-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics