Skip to main content

Construction of correlation immune Boolean functions

  • Session 5: Boolean Functions and Stream Ciphers
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

It is shown in this paper that every correlation immune Boolean function of n variables can be written as f(x) = g(xG T ), where g is an algebraic non-degenerate Boolean function of k (kn) variables and G is a generating matrix of an [n, k, d] linear code. It is known that the correlation immunity of f (x) is at least d − 1. In this paper we further prove when the correlation immunity exceeds this lower bound. A method which can theoretically search exhaustively all possible correlation immune functions is proposed, while constructions of higher order correlation immune functions as well as algebraic non-degenerate correlation immune functions are discussed in particular. It is also shown that many cryptographic properties of g can be inherited by the correlation immune function f (x) = g(xG T) which is an important property for choosing useful correlation immune functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R.J.Anderson, Searching for the optimum correlation attacks, Proc. of K. U.Leuven workshop on Cryptographic Algorithms, Leuven, Belgium, 1994, pp.56–62.

    Google Scholar 

  2. P.Camion, et al., On correlation-immune functions, Advances in Cryptology, Proc. CRYPTO'91, Springer-Verlag 1992, pp.86–100.

    Google Scholar 

  3. J.Dj.Golic, On the security of shift register based keystream generators, Fast Software Encryption (Cambridge'93), Springer-Verlag 1994, pp.90–100.

    Google Scholar 

  4. J.Dj.Golic, Correlation properties of a general binary combiner with memory, Journal of Cryptology, Vol.9, No.2, 1996, pp. 111–126.

    Article  Google Scholar 

  5. R.L.Lechner, Harmonic Analysis of Switching Functions, in Recent Developments in switching Theory, Edited by A.Mukhopadhyay, Academic Press, 1971.

    Google Scholar 

  6. F.J.MacWilliams and N.J.A.Sloane, The Theory of Error-Correcting Codes, North-Holland 1977.

    Google Scholar 

  7. W.Meier and O.Staffelbach, Nonlinearity criteria for cryptographic functions, Advances in Cryptology, Proc. of Eurocrypt'89, Springer-Verlag 1990, pp.549–562.

    Google Scholar 

  8. J.Seberry, X.M.Zhang, and Y Zheng, On constructions and nonlinearity of correlation immune functions (extended abstract), Advances in Cryptology, Proc. of Eurocrypt'93, Springer-Verlag 1993, pp.181–197.

    Google Scholar 

  9. T.Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Trans. on Infor. Theory, Vol. IT-30, No.5, 1984, pp.776–780.

    Article  Google Scholar 

  10. T.Siegenthaler, Cryptanalysts' representation of nonlinearly filtered m-sequences, Advances in Cryptology. Proc. of Eurocrypt'85, Springer-Verlag 1986, pp. 103–110.

    Google Scholar 

  11. T.Siegenthaler, Methoden für den Entwurf von Stream Cipher Systemen, Diss. ETH Nr. 8185, 1986

    Google Scholar 

  12. C.K.Wu, X.M.Wang, and E.Dawson, Construction of correlation immune functions based on the theory of error-correcting codes, Proc. ISITA96, Canada September 1996, pp. 167–170.

    Google Scholar 

  13. G.Z.Xiao and J.L.Massey, A spectral characterization of correlation-immune combining functions, IEEE Trans. Inform. Theory, Vol. IT-34, 1988, pp.569–571.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Dawson, E., Wu, CK. (1997). Construction of correlation immune Boolean functions. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028473

Download citation

  • DOI: https://doi.org/10.1007/BFb0028473

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics