Skip to main content

Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6812))

Abstract

Algebraic immunity is an important cryptographic property for Boolean functions against algebraic attacks. Constructions of Boolean functions with the maximum algebraic immunity (MAI Boolean functions) by using univariate polynomial representation of Boolean functions over finite fields have received more and more attention. In this paper, how to obtain more MAI Boolean functions from a known MAI Boolean function under univariate polynomial representation is further investigated. The sufficient condition of Boolean functions having the maximum algebraic immunity obtained by changing a known MAI Boolean function under univariate polynomial representation is given. With this condition, more balanced MAI Boolean functions under univariate polynomial representation can be obtained. The algebraic degree and the nonlinearity of these Boolean functions are analyzed.

This work is supported by National Natural Science Foundation of China (Grant No. 61070168, Grant No. 10971246, Grant No. 10871222) and Research Fund for the Doctoral Program of Higher Education of China (20094410110001).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2729, pp. 345–359. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Canteaut, A.: Open problems related to algebraic attacks on stream ciphers. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 120–134. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 425–440. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Tu, Z., Deng, Y.: A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity. Cryptology ePrint Archive, Report 2009/272., http://eprint.iacr.org/2009/272.pdf

  6. Tang, X., Tang, D., Zeng, X., Hu, L.: Balanced Boolean functions with (almost) optimal algebraic immunity and very high nonlinearity. Cryptology ePrint Archive, Report 2010/443., http://eprint.iacr.org/2010/443

  7. Wang, Q., Peng, J., Kan, H., Xue, X.: Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans. Inform. Theory 56(6), 3048–3053 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  8. Rizomiliotis, P.: On the Resistance of Boolean Functions Against Algebraic Attacks Using Univariate Polynomial Representation. IEEE Trans. Inform. Theory 56(8), 4014–4024 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  9. Zeng, X., Carlet, C., Shan, J., Hu, L.: Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity. Cryptology ePrint Archive, Report /2010/606, http://eprint.iacr.org/2010/606

  10. Qu, L., Li, C.: On the Boolean functions with maximum possible algebraic immunity: construction and a lower bound of the count. Cryptology ePrint Archive, Report 2005 /449, http://eprint.iacr.org/2005/449

  11. Li, N., Qi, W.: Construction and analysis of boolean functions of 2t+1 variables with maximum algebraic immunity. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 84–98. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Li, N., Qi, W.: Boolean functions of an odd number of variables with maximum algebraic immunity. Sci. China Ser. F-Information Sciences 50(3), 307–317 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  13. Liu, M., Pei, D., Du, Y.: Identification and construction of Boolean functions with maximum algebraic immunity. Sci. China Ser. F-Information Sciences 53(7), 1379–1396 (2010)

    Article  MathSciNet  Google Scholar 

  14. Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction. IEEE Trans. Inform. Theory 52(7), 3105–3121 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  15. Dalai, D.K., Maitra, S., Sarkar, S.: Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. Designs, Codes and Cryptography 40(1), 41–58 (2006)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Du, Y., Zhang, F. (2011). Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation. In: Parampalli, U., Hawkes, P. (eds) Information Security and Privacy. ACISP 2011. Lecture Notes in Computer Science, vol 6812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22497-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22497-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22496-6

  • Online ISBN: 978-3-642-22497-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics