Synonyms
Related Concepts
Definition
Functions mapping binary vectors of a given length to bits
Background
Symmetric cryptography
Theory
Boolean functions play a central role in the design of many symmetric cryptosystems [4] and in their security. In stream ciphers (Combination Generator, Filter Generators, …), they usually combine the outputs to several linear feedback shift registers, or they filter (and combine) the contents of a single one. Their output produces then the pseudo-random sequence which is used in a Vernam-like cipher (i.e., which is bitwise added to the plaintext to produce the ciphertext). In block ciphers (see the entries on these ciphers), the S-boxes are designed by appropriate composition of nonlinear Boolean functions.
An n-variable Boolean functionf(x) is a function from the set \({F}_{{2}^{n}}\) of all binary vectors of length n (also called words) \(x = ({x}_{1},\ldots,{x}_{n})\), to...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Carlet C (2010) Boolean functions for cryptography and error correcting codes. In: Hammer P, Crama Y (eds) Boolean models and methods in mathematics, computer science, and engineering. Cambridge University Press, Cambridge, pp 257–397
Evertse JH (1988) Linear structures in block ciphers. In: Advances in cryptology-EUROCRYPT’ 87, Lecture notes in computer science, vol 304. Springer, Berlin, pp 249–266
Massey JL (1969) Shift-register analysis and BCH decoding. IEEE Trans Inf Theory 5:122–127
Menezes A, van Oorschot P, Vanstone S (1996) Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton. http://www.cacr.math.uwaterloo.ca/hac
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Carlet, C. (2011). Boolean Functions. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_336
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_336
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering