Skip to main content
Log in

On a conjecture of differentially 8-uniform power functions

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Let \(m \ge 5\) be an odd integer. For \(d=2^m+2^{(m+1)/2}+1\) or \(d=2^{m+1}+3\), Blondeau et al. conjectured that the power function \(F_d=x^d\) over \(\mathrm {GF}(2^{2m})\) is differentially 8-uniform in which all values \(0, \, 2, \, 4,\, 6,\, 8\) appear. In this paper, we confirm this conjecture and compute the differential spectrum of \(F_d\) for both values of d.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Berlekamp E.R., Rumsey H., Solomon G.: On the solution of algebraic equations over finite fields. Inf. Control 10, 553–564 (1967).

    Article  MathSciNet  MATH  Google Scholar 

  2. Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991).

    Article  MathSciNet  MATH  Google Scholar 

  3. Blondeau C., Perrin L.: More differentially \(6\)-uniform power functions. Des. Codes Cryptogr. 73(2), 487–505 (2014).

    Article  MathSciNet  MATH  Google Scholar 

  4. Blondeau C., Canteaut A., Charpin P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149–170 (2010).

    Article  MathSciNet  MATH  Google Scholar 

  5. Blondeau C., Canteaut A., Charpin P.: Differential properties of \(x \mapsto x^{2^t-1}\). IEEE Trans. Inf. Theory 57(12), 8127–8137 (2011).

    Article  MATH  Google Scholar 

  6. Canteaut A., Videau M.: Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. In: Advances in Cryptology (EUROCRYPT). Lecture Notes in Computer Science, vol. 2332, pp. 518–533. Springer, Berlin (2002).

  7. Carlitz L.: Kloosterman sums and finite field extensions. Acta Arith. 16(2), 179–183 (1969).

    Article  MathSciNet  MATH  Google Scholar 

  8. Courtois N., Pieprzyk J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Advances in Cryptology–ASIACRYPT. Lecture Notes in Computer Science, vol. 2501, pp. 267–287. Springer, Berlin (2002).

  9. Cusick T., Dobbertin H.: Some new three-valued crosscorrelation functions of binary \(m\)-sequences. IEEE Trans. Inform. Theory 42(4), 1238–1240 (1996).

    Article  MathSciNet  MATH  Google Scholar 

  10. Dempwolff U.: CCZ equivalence of power functions. Des. Codes Cryptogr. doi:10.1007/10623-017-0350-8.

  11. Helleseth T., Kholosha A.: On the equation \(x^{2^l+1}+x+a\) over \(GF(2^k)\). Finite Fields Appl. 14(1), 159–176 (2008).

    Article  MathSciNet  MATH  Google Scholar 

  12. Helleseth T., Kholosha A.: \(x^{2^l+1}+x+a\) and related affine polynomials over \(GF(2^k)\). Cryptogr. Commun. 2(1), 85–109 (2010).

    Article  MathSciNet  MATH  Google Scholar 

  13. Jakobsen T., Knudsen L.R.: The interpolation attack on block ciphers. In: Fast Software Encryption-FSE. Lecture Notes in Computer Science, vol. 1267, pp. 28–40. Springer, Berlin (1997).

  14. Lidl R., Niederreiter H.: Finite Fields. Encyclopedia of Mathematics and Its Applications, vol. 20, 2nd edn. Cambridge University Press, Cambridge (1997).

    Google Scholar 

  15. Ma J., Zhang T., Feng T., Ge G.: New results on permutation polynomials over finite fields. Des. Codes Cryptogr. 83(2), 425–443 (2017).

Download references

Acknowledgements

The authors are grateful to anonymous referees for careful reading and for many useful suggestions. Xiong’s research was supported by RGC No. 609513 from Hong Kong. Yan’s research was supported by National Cryptography Development Fund under Grant MMJJ20170119. Yuan’s research was supported by the NSF of China (Grant No. 11671153).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haode Yan.

Additional information

Communicated by P. Charpin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiong, M., Yan, H. & Yuan, P. On a conjecture of differentially 8-uniform power functions. Des. Codes Cryptogr. 86, 1601–1621 (2018). https://doi.org/10.1007/s10623-017-0416-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-017-0416-7

Keywords

Mathematics Subject Classification

Navigation