Skip to main content
Log in

Computing Walsh coefficients from the algebraic normal form of a Boolean function

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

We study the relationship between the Walsh Transform of a Boolean function and its Algebraic Normal Form(ANF), and present algorithms that compute the Walsh coefficients at a small set of points in terms of certain parameters derived from the ANF of a Boolean function. In the first part of this paper, based on the previous result by Gupta and Sarkar, we investigate the formula in Gupta-Sarkar’s algorithm in a novel iterative method and obtain a recurrence relation for the Walsh Transform of a Boolean function. The second part is devoted to applying this formula to algorithms to evaluate it. Experimental result shows that for the specified classes of Boolean functions, our algorithms can perform better than Gupta-Sarkar’s algorithm. For example, the proposed algorithm “ComputeWalsh” is able to compute the Walsh coefficients of the functions for which the complexity of Gupta-Sarkar’s algorithm is impractical. Besides, for functions acting on high number of variables (m>30) and having low number of monomials, the proposed algorithms are advantageous over the Fast Walsh Transform which is a standard method of computing the Walsh Transform with a complexity of O(m2m) operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. By convention, all α (j)’s are pairwise unequal.

  2. Properly speaking, we can use the term of component function only for v≠0, so we make an abuse here.

References

  1. Beauchamp, K.G.: Applications of Walsh and Related Functions[M]. Academic Press (1984)

  2. Bellare, M., Coppersmith, D., Hastad, J., et al.: Linearity testing in characteristic two[J]. IEEE Trans. Inf. Theory 42 (6), 1781–1795 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  3. Carlet, C., Guillot, P.: A New Representation of Boolean functions[M]. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, pp 94–103. Springer, Berlin Heidelberg (1999)

    Book  Google Scholar 

  4. Carlet, C, Sarkar, P.: Spectral domain analysis of correlation immune and resilient Boolean functions[J]. Finite Fields Their Appl. 8 (1), 120–130 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  5. Carlet, C.: Vectorial Boolean functions for cryptography[J]. Boolean Model. Methods Math. Comput. Sci. Eng. 134, 398–469 (2010)

    Article  Google Scholar 

  6. Carlet, C.: Boolean functions for cryptography and error correcting codes[J]. Boolean Model. Methods Math. Comput. Sci. Eng. 2, 257 (2010)

    Article  Google Scholar 

  7. Çalık, Ç, Doğanaksoy, A.: Computing the weight of a boolean function from its algebraic normal form[M]. Sequences and Their Applications - SETA 2012, pp 89–100. Springer, Berlin Heidelberg (2012)

    Book  Google Scholar 

  8. Gupta, K.C., Sarkar, P.: Computing partial Walsh transform from the algebraic normal form of a Boolean function[J]. IEEE Trans. Inf. Theory 55 (3), 1354–1359 (2009)

    Article  MathSciNet  Google Scholar 

  9. Linial, N, Mansour, Y, Nisan, N.: Constant depth circuits, Fourier transform, and learnability[J]. J. ACM (JACM) 40 (3), 607–620 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  10. MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes[M]. Elsevie (1977)

  11. Rothaus, O.S.: On “bent” functions[J]. J. Comb. Theory Series A 20 (3), 300–305 (1976)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgment

We thank all the anonymous reviewers for their helpful suggestions on the quality improvement of our paper. This work is supported by the National 973 Program of China (No.2011CB302400), the Strategic Priority Research Program of Chinese Academy of Sciences (No.XDA06010701, No.XDA06010702), the National Natural Science Foundation of China (No.61303257) and Institute of Information Engineering’s Research Project on Cryptography (No.Y3Z0023103, No.Y3Z0011102).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinxin Gong.

Appendices

Appendix A

The randomly generated Boolean function f 1(x) with m=128, p=64 in Example 5 is f 1(x 1,...,x 128)=x I1⊕...⊕x I64, where all I i s are as follows:

figure c

Appendix B

The randomly generated homogeneous function f(x) with m=64, p=64 and d=18 in Example 6 is f(x 1,...,x 64)=x I1⊕...⊕x I64, where.

figure d
figure e
figure f

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gong, X., Zhang, B., Wu, W. et al. Computing Walsh coefficients from the algebraic normal form of a Boolean function. Cryptogr. Commun. 6, 335–358 (2014). https://doi.org/10.1007/s12095-014-0103-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-014-0103-8

Keywords

Mathematics Subject Classifications (2010)

Navigation