Abstract
Let \(m \ge 5\) be an odd integer. For \(d=2^m+2^{(m+1)/2}+1\) or \(d=2^{m+1}+3\), Blondeau et al. conjectured that the power function \(F_d=x^d\) over \(\mathrm {GF}(2^{2m})\) is differentially 8-uniform in which all values \(0, \, 2, \, 4,\, 6,\, 8\) appear. In this paper, we confirm this conjecture and compute the differential spectrum of \(F_d\) for both values of d.
Similar content being viewed by others
References
Berlekamp E.R., Rumsey H., Solomon G.: On the solution of algebraic equations over finite fields. Inf. Control 10, 553–564 (1967).
Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991).
Blondeau C., Perrin L.: More differentially \(6\)-uniform power functions. Des. Codes Cryptogr. 73(2), 487–505 (2014).
Blondeau C., Canteaut A., Charpin P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149–170 (2010).
Blondeau C., Canteaut A., Charpin P.: Differential properties of \(x \mapsto x^{2^t-1}\). IEEE Trans. Inf. Theory 57(12), 8127–8137 (2011).
Canteaut A., Videau M.: Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. In: Advances in Cryptology (EUROCRYPT). Lecture Notes in Computer Science, vol. 2332, pp. 518–533. Springer, Berlin (2002).
Carlitz L.: Kloosterman sums and finite field extensions. Acta Arith. 16(2), 179–183 (1969).
Courtois N., Pieprzyk J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Advances in Cryptology–ASIACRYPT. Lecture Notes in Computer Science, vol. 2501, pp. 267–287. Springer, Berlin (2002).
Cusick T., Dobbertin H.: Some new three-valued crosscorrelation functions of binary \(m\)-sequences. IEEE Trans. Inform. Theory 42(4), 1238–1240 (1996).
Dempwolff U.: CCZ equivalence of power functions. Des. Codes Cryptogr. doi:10.1007/10623-017-0350-8.
Helleseth T., Kholosha A.: On the equation \(x^{2^l+1}+x+a\) over \(GF(2^k)\). Finite Fields Appl. 14(1), 159–176 (2008).
Helleseth T., Kholosha A.: \(x^{2^l+1}+x+a\) and related affine polynomials over \(GF(2^k)\). Cryptogr. Commun. 2(1), 85–109 (2010).
Jakobsen T., Knudsen L.R.: The interpolation attack on block ciphers. In: Fast Software Encryption-FSE. Lecture Notes in Computer Science, vol. 1267, pp. 28–40. Springer, Berlin (1997).
Lidl R., Niederreiter H.: Finite Fields. Encyclopedia of Mathematics and Its Applications, vol. 20, 2nd edn. Cambridge University Press, Cambridge (1997).
Ma J., Zhang T., Feng T., Ge G.: New results on permutation polynomials over finite fields. Des. Codes Cryptogr. 83(2), 425–443 (2017).
Acknowledgements
The authors are grateful to anonymous referees for careful reading and for many useful suggestions. Xiong’s research was supported by RGC No. 609513 from Hong Kong. Yan’s research was supported by National Cryptography Development Fund under Grant MMJJ20170119. Yuan’s research was supported by the NSF of China (Grant No. 11671153).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by P. Charpin.
Rights and permissions
About this article
Cite this article
Xiong, M., Yan, H. & Yuan, P. On a conjecture of differentially 8-uniform power functions. Des. Codes Cryptogr. 86, 1601–1621 (2018). https://doi.org/10.1007/s10623-017-0416-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-017-0416-7