Skip to main content

Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks

  • Conference paper
  • 907 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6812))

Abstract

In this paper, we study the immunity of Boolean functions against probabilistic algebraic attacks. We first show that there are functions, using as filters in a linear feedback shift register based nonlinear filter generator, such that probabilistic algebraic attacks outperform deterministic ones. Then we introduce two notions, algebraic immunity distance and k-error algebraic immunity, to measure the ability of Boolean functions resistant to probabilistic algebraic attacks. We analyze both lower and upper bounds on algebraic immunity distance, and also present the relations among algebraic immunity distance, k-error algebraic immunity, algebraic immunity and high order nonlinearity.

This work was in part supported by the National 973 Program of China under Grant 2011CB302400, the National Natural Science Foundation of China under Grants 10971246 and 60970152, the Grand Project of Institute of Software under Grant YOCX285056 and the CAS Special Grant for Postgraduate Research, Innovation and Practice.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 65–82. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Armknecht, F., Carlet, C., Gaborit, P., Künzli, S., Meier, W., Ruatta, O.: Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 147–164. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Braeken, A., Preneel, B.: Probabilistic algebraic attacks. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 290–303. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Carlet, C.: On the higher order nonlinearities of algebraic immune functions. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 584–601. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 425–440. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering codes. North-Holland, Amsterdam (1997)

    MATH  Google Scholar 

  7. Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Dalai, D.K., Maitra, S., Sarkar, S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Designs, Codes and Cryptography 40(1), 41–58 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  10. Dalai, D.K., Gupta, K.C., Maitra, S.: Results on algebraic immunity for cryptographically significant boolean functions. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 92–106. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Du, Y., Pei, D.: Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree. Sci. China Inf. Sci, 53(4), 780–787 (2010)

    Article  MathSciNet  Google Scholar 

  12. Hawkes, P., Rose, G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 390–406. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Li, N., Qu, L., Qi, W., et al.: On the construction of Boolean Functions with optimal algebraic immunity. IEEE Trans. Inform. Theory 54(3), 1330–1334 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  14. Li, N., Qi, W.: Boolean functions of an odd number of variables with maximum algebraic immunity. Sci. China Ser. F-Inf. Sci. 50(3), 307–317 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  15. Liu, M., Pei, D., Du, Y.: Identification and construction of Boolean functions with maximum algebraic immunity. Sci. China. Inf. Sci, 53(7), 1379–1396 (2010)

    Article  MathSciNet  Google Scholar 

  16. Liu, M., Du, Y., Pei, D., Lin, D.: On designated-weight Boolean functions with highest algebraic immunity. Sci. China. Math, 53(11), 2847–2854 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. Lobanov, M.: Tight bounds between algebraic immunity and nonlinearities of high orders., http://eprint.iacr.org/2007/444

  18. MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland, New York (1977)

    MATH  Google Scholar 

  19. Mesnager, S.: Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity. IEEE Transactions on Information Theory 54(8), 3656–3662 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  20. Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Pasalic, E.: Probabilistic versus deterministic algebraic cryptanalysis – a performance comparison. IEEE Transactions on Information Theory 55(11), 5233–5240 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  22. Pometun, S.: Study of Probabilistic Scenarios of Algebraic Attacks on Stream Ciphers. Journal of Automation and Information Sciences 41(2), 67–80 (2009), http://eprint.iacr.org/2007/448

    Article  Google Scholar 

  23. Qu, L., Feng, G., Li, C.: On the Boolean functions with maximum possible algebraic immunity: construction and a lower bound of the count., http://eprint.iacr.org/2005/449

  24. Tu, Z., Deng, Y.: Algebraic Immunity Hierarchy of Boolean Functions. ChinaCrypt (2007), http://eprint.iacr.org/2007/259

  25. Zhang, X., Pieprzyk, J., Zheng, Y.: On algebraic immunity and annihilators. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 65–80. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, M., Lin, D., Pei, D. (2011). Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. In: Parampalli, U., Hawkes, P. (eds) Information Security and Privacy. ACISP 2011. Lecture Notes in Computer Science, vol 6812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22497-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22497-3_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22496-6

  • Online ISBN: 978-3-642-22497-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics