Skip to main content
Log in

The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity

  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract

The r-th order nonlinearity of Boolean functions is an important cryptographic criterion associated with some attacks on stream and block ciphers. It is also very useful in coding theory, since it is related to the covering radii of Reed-Muller codes. By investigating the lower bound of the nonlinearity of the derivative of the function f, this paper tightens the lower bound of the second-order nonlinearity of a class of Boolean functions over \({F_{2^n}}\) with high nonlinearity in the form f(x) = trx d), where \({\lambda\in F_{2^r}^*, d=2^{2r}+2^{r}+1}\) and n = 4r.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bracken, C., Leander, G.: A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Available at. http://arxiv.org/abs/0901.1824

  2. Canteaut A., Charpin P., Kyureghyan G.M.: A new class of monomial bent functions. Finite Fields Appl. 14, 221–241 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  3. Canteaut, A., Trabbia, M.: Improved fast correlation attacks using parity-check equations of weight 4 and 5. Advances in Cryptology-Eurocrypt 2000, LNCS 1807, Springer-Verlag, pp. 573–588 (2000)

  4. Carlet, C.: On the higher order nonlinearities of algebraic immune functions. Advances in Cryptology-CRYPTO 2006, LNCS 4117, Springer-Verlag, pp. 584–601 (2006)

  5. Carlet C.: Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. IEEE Trans. Inform. Theory 54(3), 1262–1272 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  6. Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Designs Codes Cryptography 15(2), 125–156 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  7. Carlet C., Dalai D., Gupta K., Maitra S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inform. Theory 52(7), 3105–3121 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  8. Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and goold nonlinearity. Advances in Cyrptology-ASIACRYPT 2008, LNCS 5350, Springer-Verlag, pp. 425–440 (2008)

  9. Carlet C., Mesnager S.: Improving the upper bounds on the covering radii of binary Reed-Muller codes. IEEE Trans. Inform. Theory 53(1), 162–173 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  10. Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. Advances in Cryptology-EUROCRYPT’94, LNCS 950, Springer-Verlag, pp. 356–365 (1995)

  11. Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering Codes. Amsterdam, The Netherlands: North-Holland (1977)

  12. Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers. LNCS 561, Springer-Verlag (1991)

  13. Dobbertin H.: One-to-one highly nonlinear power functions on GF(2n). Appl. Algebra Eng. Commun. Comput. 9, 139–152 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  14. Dumer, I., Kabatiansky, G., Tavernier, C.: List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity. In: Proceedings IEEE International Symposium Information Theory, Seattle, WA, pp.138–142 Jul. (2006)

  15. Fourquet, R., Tavernier, C.: List decoding of second order Reed-Muller and its covering radius implications. In: Proceedings WCC 2007, Versailles, France, pp. 147–156, Apr. (2007)

  16. Gangopadhyay S., Sarkar S., Telang R.: On the lower bounds of the second-order nonlinearity of some Boolean functions. Inf. Sci. 180(2), 266–273 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. Iwata, T., Kurosawa, K.: Probabilistic higher order differential attack and higher order bent functions. In: Proceedings ASIACRYPT’99, LNCS 1716, Berlin, Germany: Springer-Verlag, pp. 62–74 (1999)

  18. Kabatiansky, G., Tavernier, C.: List decoding of second-order Reed-Muller codes. In: Proceedings 8th International Symposium Communication Theory and Applications, Ambelside, UK, Jul. (2005)

  19. Lidl R., Niederreiter H.: Finite Fields. Addison-Wesley, Reading, MA (1983)

    MATH  Google Scholar 

  20. Sun G., Wu C.: The lower bounds on the second-order nonlinearity of three classes of Boolean functions with high nonlinearity. Inf. Sci. 179(3), 267–278 (2009)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guanghong Sun.

Additional information

This work was supported by the Natural Science Foundation of China under Grant No.60673068, the Fundamental Research Funds for the Central Universities No. 2009B27414, and the Natural Science Foundation of Hohai University under Grant No. 2084/409270.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sun, G., Wu, C. The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity. AAECC 22, 37–45 (2011). https://doi.org/10.1007/s00200-010-0136-y

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00200-010-0136-y

Keywords

Navigation