Skip to main content

On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions

  • Conference paper
  • First Online:
Arithmetic of Finite Fields (WAIFI 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9061))

Included in the following conference series:

Abstract

Vectorial Boolean functions are used as substitution boxes in cryptosystems. Designing inequivalent functions resistant to known attacks is one of the challenges in cryptography. In doing this, finding a fast technique for determining whether two given functions are equivalent is a significant problem. A special class of the equivalence called restricted extended affine (REA) equivalence is studied in this paper. We update the verification procedures of the REA-equivalence types given in the recent work of Budaghyan and Kazymyrov (2012). In particular, we solve the system of linear equations simultaneously in the verification procedures to get better complexity. We also present the explicit number of operations of the verification procedures of these REA-equivalence types. Moreover, we construct two new REA-equivalence types and present the verification procedures of these types with their complexities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biryukov, A., De Canniere, C., Braeken, A., Preneel, B.: A tool-box for cryptanalysis: linear and affine equivalence algorithms. In: Biham, E. (ed.) Advances in Cryptology — EUROCRYPT 2003. LNCS, vol. 2656, pp. 33–50. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system, I. The user language. J. Symb. Comput. 24, 235–265 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  3. Budaghyan, L., Kazymyrov, O.: Verification of restricted EA-equivalence for vectorial Boolean functions. In: Özbudak, F., Rodríguez-Henríquez, F. (eds.) WAIFI 2012. LNCS, vol. 7369, pp. 108–118. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inform. Theory 52, 1141–1152 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  5. Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Crypt. 15(2), 125–156 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  6. Carlet, C.: Vectorial Boolean functions for cryptography. Boolean Model. Methods Math. Comput. Sci. Eng. 134, 398–469 (2010)

    Article  Google Scholar 

  7. Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356–365. Springer, Heidelberg (1995)

    Google Scholar 

  8. Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994)

    Google Scholar 

  9. Sınak, A.: On verification of restricted extended affine equivalence of vectorial Boolean functions. Master’s thesis, Middle East Technical University (2012)

    Google Scholar 

  10. Williams, V.V.: Breaking the Coppersmith-Winograd barrier, November 2011

    Google Scholar 

Download references

Acknowledgment

We first thank the referees for providing detailed comments and suggestions. The second author is partially supported by the Scientific and Technological Research Council of Turkey (TÜBİTAK). The third author is supported by TÜBİTAK under the National Postdoctoral Research Scholarship No 2219.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oğuz Yayla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Özbudak, F., Sınak, A., Yayla, O. (2015). On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions. In: Koç, Ç., Mesnager, S., Savaş, E. (eds) Arithmetic of Finite Fields. WAIFI 2014. Lecture Notes in Computer Science(), vol 9061. Springer, Cham. https://doi.org/10.1007/978-3-319-16277-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16277-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16276-8

  • Online ISBN: 978-3-319-16277-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics