Abstract
Quadratic differentially 4-uniform (n, n − 1)-functions are given in Carlet J. Adv. Math. Commun. 9(4), 541–565 (2015) where a question is raised of whether non-quadratic differentially 4-uniform (n, n − 1)-functions exist. In this paper, we give highly nonlinear differentially 4-uniform (n, n − 1)-functions of optimal algebraic degree for both n even and odd. Using the approach in Carlet J. Adv. Math. Commun. 9(4), 541–565 (2015), we construct these functions using two APN (n − 1, n − 1)-functions which are EA-equivalent Inverse functions satisfying some necessary and sufficient conditions when n is even. We slightly generalize the approach to construct differentially 4-uniform (n, n − 1)-functions from two differentially 4-uniform (n − 1, n − 1)-functions satisfying some necessary conditions. This allows us to derive the differentially 4-uniform (n, n − 1)-functions \((x,x_{n})\mapsto (x_{n}+1)x^{2^{n}-2}+x_{n} \alpha x^{2^{n}-2}\), \(x \in \mathbb {F}_{2^{n-1}}\), \(x_{n}\in \mathbb {F}_{2}\), and \(\alpha \in \mathbb {F}_{2^{n-1}}\setminus \mathbb {F}_{2}\), where \(Tr_{1}^{n-1}(\alpha )=Tr_{1}^{n-1}(\frac {1}{\alpha })=1\). These (n, n − 1)-functions are balanced whatever the parity of n is and are then better suited for use as S-boxes in a Feistel cipher. We also give some properties of the Walsh spectrum of these functions to prove that they are CCZ-inequivalent to the differentially 4-uniform (n, n − 1)-functions of the form L ∘ F, where F is a known APN (n, n)-function and L is an affine surjective (n, n − 1)-function. Finally, we also give two new constructions of differentially 8-uniform (n, n − 2)-functions from EA-equivalent Cubic functions and from EA-equivalent Inverse functions.
Similar content being viewed by others
References
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptology ePrint Archive Report 2013/404 (2013)
Berlekamp, E.R., Rumsey, H., Solomon, G.: On the solution of algebraic equations over finite fields. Inf. Control. 12(5), 553–564 (1967)
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Blondeau, C., Nyberg, K.: Links between truncated differential and multidimensional linear properties of block ciphers and underlying attack complexities. In: EUROCRYPT 2014. Lecture Notes in Computer Science, vol. 8441, pp. 165–182 (2014)
Bracken, C., Leander, G.: A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Appl. 16(4), 231–242 (2010)
Bracken, C., Tan, C.H., Tan, Y.: Binomial differentially 4-uniform permutations with high nonlinearity. Finite Fields Appl. 18, 537–546 (2012)
Canteaut, A., Charpin, P., Dobbertin, H.: Weight divisibility of cyclic codes, highly nonlinear functions on G F(2m, ) and crosscorrelation of maximum- length sequences. SIAM J. Discret. Math. 13(1), 105–138 (2000)
Carlet, C.: Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions. Des. Codes Crypt. 59(1-3), 89–109 (2011)
Carlet, C.: On known and new differentially uniform functions. In: Proceedings of Information Security and Privacy - 16th Australasian Conference (ACISP) 2011, Melbourne, pp. 1–15 (2011)
Carlet, C., Alsalami, Y.: A New construction of differentially 4-uniform (n, n − 1)-functions. J. Adv. Math. Commun. 9(4), 541–565 (2015)
Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent bunctions and permutations suitable for DES-like cryptosystems. Des. Codes Crypt. 15(2), 125–156 (1998)
Carlet, C., Tang, D., Tang, X., Liao, Q.: New construction of differentially 4-uniform bijections. In: Information Security and Cryptology, pp. 22–38. Springer (2014)
Chabaud, F., Vaudenay, S., differential: Links between differential and linear cryptanalysis. In: EUROCRYPT94, Advances in Cryptology. Lecture Notes in Computer Science, vol. 950, pp. 356–365. Springer (1995)
Dillon, J.F.: Elementary Hadamard difference sets. Ph.D. Dissertation University of Maryland (1974)
Dobbertin, H.: Almost perfect nonlinear power functions on G F(2n): a new case for n divisible by 5. In: Proceedings of Finite Fields and Applications F q5, pp. 113–121. Springer, Augsburg (2000)
Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inf. Theory 14, 154–156 (1968)
Kasami, T.: The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Inf. Control. 18, 369–394 (1971)
Knudsen, L.R., Robshaw, M.: The Block Cipher Companion. Springer (2011)
Knudsen, L.R.: Truncated and higher order differentials. In: Proceedings of Fast Software Encryption Second International Workshop. Lecture Notes in Computer Science, vol. 1008, pp. 196–211 (1995)
Lachaud, G., Wolfmann, J.: The weights of the orthogonals of the extended quadratic binary goppa codes. IEEE Trans. Inform. Theory 36(3), 686–692 (1990)
Lai, X.: Higher Order Derivatives and Differential Cryptanalysis. Communications and Cryptography. Springer, 227–233 (1994)
Matsui, M.: Linear cryptanalysis method for des cipher. In: Advances in Cryptology - EUROCRYPT’93, no. 765. Lecture Notes in Computer Science, pp. 386–397. Springer (1994)
National Institute of Standards and Technology: Advanced encryption standard (AES). Federal Information Processing Standards Publication 197 United States National Institute of Standards and Technology (NIST) (2001)
National Institute of Standards and Technology: Data Encryption Standard (DES). Federal Information Processing Standards Publication 49-3. United States National Institute Of Standards And Technology (NIST) Reaffirmed on October 25, 1999
Nyberg, K.: Perfect nonlinear S-boxes. In: Advances in Cryptology, EUROCRYPT’ 91. Lecture Notes in Computer Science, vol. 547, pp. 378–386. Springer (1992)
Nyberg, K., Knudsen, L.R.: Provable security against a differential attack. J. Cryptol. 8(1), 27–37 (1995)
Piret, G., Roche, T., Carlet, C.: PICARO - a block cipher allowing efficient higher-order side-channel resistance. In: Proceedings of 10th International Conference in Applied Cryptography and Network Security 2012. Lecture Notes in Computer Science, vol. 7341, pp. 311–328 (2012)
Rothaus, O.S.: On bent functions. J. Combin. Theory Ser. A 20(3), 300–305 (1976)
Sidelnikov, V.M.: On the mutual correlation of sequences. Soviet Math. Dokl. 12, 197–201 (1971)
Tan, Y., Qu, L., Tan, C., Li, C.: New Families of Differentially 4-Uniform Permutations over \(\mathbb {F}_{2^{2k}}\). In: Helleseth, T., Jedwab, J. (eds.) SETA2012 Lecture Notes on Computer Science, vol. 7280, pp. 25–39. Springer, Heidelberg (2012)
Xu, G., Cao, X., Xu, S.: Constructing New Differentially 4-Uniform Permutations and APN Functions over Finite fields. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences. Pre-print (2014)
Yu, Y., Wang, M., Li, Y.: Constructing low differential uniformity functions from known ones. Chin. J. Electron. 22(3), 495–499 (2013)
Zha, Z., Hu, L., Sun, S.: Constructing new differentially 4-uniform permutations from the Inverse function. Finite Fields Appl. 25, 64–78 (2014)
Acknowledgements
I would like thank Prof. Claude Carlet for providing insightful comments on many parts of the paper. Without his guidance, the paper would not be in this good shape. Additionally, I express my thanks and gratitude to the anonymous reviewers of this paper whose comments improved much the presentation of this paper.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Sequences and Their Applications
Rights and permissions
About this article
Cite this article
Alsalami, Y. Constructions with high algebraic degree of differentially 4-uniform (n, n − 1)-functions and differentially 8-uniform (n, n − 2)-functions. Cryptogr. Commun. 10, 611–628 (2018). https://doi.org/10.1007/s12095-017-0246-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-017-0246-5