Skip to main content

Algebraic Immunity of Boolean Functions

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 350 Accesses

Synonyms

Resistance to the standard algebraic attack

Related concepts

Boolean Functions; Stream Ciphers; Symmetric Cryptography

Definition

Parameter of a Boolean function quantifying its resistance to algebraic attacks

Background

Boolean functions

Theory

A new kind of attacks, called algebraic attacks, has been introduced recently (see [23]). In both the combiner and the filter model of a pseudo-random generator in a stream cipher, there exists a linear permutation \(L : {\mathbb{F}}_{2}^{N}\mapsto {\mathbb{F}}_{2}^{N}\), a linear mapping \(L' : {\mathbb{F}}_{2}^{N}\mapsto {\mathbb{F}}_{2}^{n}\) and an n-variable combining or filtering Boolean function f such that, denoting by \({u}_{1},\cdots \,,{u}_{N}\) the initialisation of the linear part of the pseudo-random generator and by \({({s}_{i})}_{i\geq 0}\) the pseudo-random sequence output by it, we have, for every i:

$${s}_{i} = f(L' \circ {L}^{i}({u}_{ 1},\cdots \,,{u}_{N})).$$

The general principle of algebraic attacks is to try...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Carlet C, Feng K (2008) An infinite class of balanced functions with optimum algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Proceedings of ASIACRYPT 2008, Lecture notes in computer science, vol 5350. Springer, Heidelberg, pp 425–440

    Google Scholar 

  2. Courtois N (2003) Fast algebraic attacks on stream ciphers with linear feedback. In: Proceedings of CRYPTO 2003, Lecture notes in computer science, vol 2729, pp 177–194

    Google Scholar 

  3. Courtois N, Meier W (2002) Algebraic attacks on stream ciphers with linear feedback. In: Proceedings of EUROCRYPT 2003, Lecture notes in computer science, vol 2656, pp 346–359

    Google Scholar 

  4. Fischer S, Meier W (2007) Algebraic immunity of S-boxes and augmented functions. In: Proceedings of Fast Software Encryption 2007, Lecture notes in computer science, vol 4593. Springer, Berlin, pp 366–381

    Google Scholar 

  5. Rønjom S, Helleseth T (2007) A new attack on the filter generator. IEEE Trans Inf theory 53(5):1752–1758

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Carlet, C. (2011). Algebraic Immunity of Boolean Functions. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_333

Download citation

Publish with us

Policies and ethics