Some results on fast algebraic attacks and higher-order non-linearities
Some results on fast algebraic attacks and higher-order non-linearities
- Author(s): Q. Wang ; T. Johansson ; H. Kan
- DOI: 10.1049/iet-ifs.2011.0090
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): Q. Wang 1 ; T. Johansson 2 ; H. Kan 3
-
-
View affiliations
-
Affiliations:
1: Department of Mathematics, Hunan University of Science and Engineering, Yongzhou, People's Republic of China
2: Department of Electrical and Information Technology, Lund University, Lund, Sweden
3: Shanghai Key Lab of Intelligent Information Processing, School of Computer Science, Fudan University, Shanghai, People's Republic of China
-
Affiliations:
1: Department of Mathematics, Hunan University of Science and Engineering, Yongzhou, People's Republic of China
- Source:
Volume 6, Issue 1,
March 2012,
p.
41 – 46
DOI: 10.1049/iet-ifs.2011.0090 , Print ISSN 1751-8709, Online ISSN 1751-8717
- « Previous Article
- Table of contents
- Next Article »
In this study, the authors investigate the resistance of Boolean functions against fast algebraic attacks and deduce a bound between fast algebraic immunity and higher-order non-linearity (it is the first time that a bound between these two cryptographic criteria is given). The authors then show that the fast algebraic immunity of the following two classes of Boolean functions is not good: (a) The repaired functions of the Tu–Deng function proposed by Carlet. The Tu–Deng function has optimum algebraic degree, optimum algebraic immunity and a very good non-linearity. However, it is weak against fast algebraic attacks. Carlet found this weakness and also tried to repair it. (b) An infinite class of balanced functions proposed by Tang et al., having optimum algebraic degree, optimum algebraic immunity and a very high non-linearity.
Inspec keywords: cryptography; Boolean functions
Other keywords:
Subjects: Algebra; Cryptography theory; Algebra; Cryptography
References
-
-
1)
- O.S. Rothaus . On bent functions. J. Comb. Theory, Ser. A , 3 , 300 - 305
-
2)
- Hawkes, P., Rose, G.G.: `Rewriting variables: the complexity of fast algebraic attacks on stream ciphers', Advances in Cryptology – CRYPTO 2004, (LNCS, 3152), 2004), Berlin, Germany, p. 390–406, (Springer-Verlag.
-
3)
- T.W. Cusick , Y. Li , P. Stanica . On a combinatoric conjecture.
-
4)
- Johansson, T., Jönsson, F.: `'Fast correlation attacks through reconstruction of linear polynomials', Advances in Cryptology – CRYPTO 2000, (LNCS, 1880), 2000), Berlin, Germany, p. 300–315, (Springer-Verlag.
-
5)
- Golic, J.: `Fast low order approximation of cryptographic functions', Proc. EUROCRYPT 1996, (LNCS, 1070), 1996), Berlin, Germany, p. 268–282, (Springer-Verlag.
-
6)
- Braeken, A.: `Cryptographic properties of Boolean functions and S-boxes', 2006, PhD, Katholieke University, Available at: http://www.cosic.esat.kuleuven.be/publications/thesis-129.pdf.
-
7)
- P. Rizomiliotis . On the resistance of boolean functions against algebraic attacks using univariate polynomial representation. IEEE Trans. Inf. Theory , 8 , 4014 - 4024
-
8)
- M. Liu , D. Lin , D. Pei . Fast algebraic attacks and decomposition of symmetric boolean functions. IEEE Trans. Inf. Theory , 7 , 4817 - 4821
-
9)
- Carlet, C.: `On the higher order nonlinearities of algebraic immune functions', Advances in Cryptology - CRYPTO 2006, (LNCS, 4117), 2006), Berlin, Germany, p. 584–601, (Springer-Verlag.
-
10)
- M. Lobanov . Tight bound between nonlinearity and algebraic immunity.
-
11)
- D.K. Dalai , S. Maitra , S. Sarkar . Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Designs, Codes Cryptogr. , 1 , 41 - 58
-
12)
- Carlet, C.: `On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations', Proc. SETA 2008, (LNCS, 5203), 2008), Berlin, Germany, p. 345–367, (Springer-Verlag.
-
13)
- Dalai, D.K., Maitra, K.C., Maitra, S.: `Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity', Proc. FSE 2005, (LNCS, 3557), 2005), Berlin, Germany, p. 98–111, (Springer-Verlag.
-
14)
- X. Tang , D. Tang , X. Zeng , L. Hu . Balanced Boolean functions with (almost) optimal algebraic immunity and very high nonlinearity.
-
15)
- Flori, J.P., Randriambololona, H., Cohen, G., Mesnager, S.: `On a conjecture about binary strings distribution', SETA 2010, (LNCS, 6338), 2010), p. 346–358, (Springer-Verlag.
-
16)
- Carlet, C., Feng, K.: `An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity', Advances in Cryptology – ASIACRYPT 2008, (LNCS, 5350), 2008), Berlin, Germany, p. 425–440, (Springer-Verlag.
-
17)
- C. Carlet , D.K. Dalai , K.C. Gupta , S. Maitra . Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inf. Theory , 7 , 3105 - 3121
-
18)
- Braeken, A., Preneel, B.: `On the algebraic immunity of symmetric Boolean functions', Progress in Cryptology-Indocrypt 2005, (LNCS, 3797), 2005), Berlin, Germany, p. 35–48, (Springer-Verlag.
-
19)
- Courtois, N.: `Fast algebraic attacks on stream ciphers with linear feedback', CRYPTO 2003, (LNCS, 2729), p. 176–194, Springer-Verlag.
-
20)
- Courtois, N.: `Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt', Proc. ICISC 2002, (LNCS, 2587), 2003), Berlin, Germany, p. 182–199, (Springer-Verlag.
-
21)
- Carlet, C., Feng, K.: `An infinite class of balanced vectorial Boolean functions with optimum algebraic immunity and good nonlinearity', IWCC 2009, (LNCS, 5557), 2009), Berlin, Germany, p. 1–11, (Springer-Verlag.
-
22)
- Q. Wang , J. Peng , H. Kan , X. Xue . Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans. Inf. Theory , 6 , 3048 - 3053
-
23)
- C. Carlet , S. Mesnager . Improving the upper bounds on the covering radii of binary Reed–Muller codes. IEEE Trans. Inf. Theory , 1 , 162 - 173
-
24)
- C. Carlet . On a weakness of the Tu–Deng function and its repair.
-
25)
- S. Mesnager . Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity. IEEE Trans. Inf. Theory , 8 , 3656 - 3662
-
26)
- C. Carlet . Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. IEEE Trans. Inf. Theory , 3 , 1262 - 1272
-
27)
- Courtois, N., Meier, W.: `Algebraic attacks on stream ciphers with linear feedback', EUROCRYPT 2003, (LNCS, 2656), 2003), p. 345–359, (Springer-Verlag.
-
28)
- Pasalic, E.: `Almost fully optimized infinite classes of Boolean functions resistant to (fast) algebraic cryptanalysis', Proc. ICISC 2008, (LNCS, 5461), 2009), Berlin, Germany, p. 399–414, (Springer-Verlag.
-
29)
- C. Carlet , Y. Crama , P.L. Hammer . (2010) Boolean functions for cryptography and error correcting codes, Boolean models and methods in mathematics, computer science, and engineering.
-
30)
- M.S. Lobanov . Tight bounds between algebraic immunity and nonlinearities of high orders.
-
31)
- Knudsen, L.R., Robshaw, M.J.B.: `Non-linear approximations in linear cryptanalysis', Proc. EUROCRYPT 1996, (LNCS, 1070), 1996), Berlin, Germany, p. 224–236, (Springer-Verlag.
-
32)
- X. Zeng , C. Carlet , J. Shan , L. Hu . More balanced Boolean functions with optimal algebraic immunity, and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inf. Theory , 9 , 6310 - 6320
-
33)
- J.P. Flori , H. Randriam . On the number of carries occurring in an addition mod 2k−1.
-
34)
- S. Rønjom , T. Helleseth . A new attack on the filter generator. IEEE Trans. Inf. Theory , 5 , 1752 - 1758
-
35)
- Meier, W., Staffelbach, O.: `Fast correlation attacks on stream ciphers', Proc. EUROCRYPT 1988, (LNCS, 330), 1988), Berlin, Germany, p. 301–314, (Springer-Verlag.
-
36)
- Li, N., Qi, W.F.: `Construction and analysis of Boolean functions of 2', Advances in Cryptology – ASIACRYPT 2006, (LNCS, 4284), 2006), Berlin, Germany, p. 84–98, (Springer-Verlag.
-
37)
- Iwata, T., Kurosawa, K.: `Probabilistic higher order differential attack and higher order bent functions', Proc. ASIACRYPT 1999, (LNCS, 1716), 1999), Berlin, Germany, p. 62–74, (Springer-Verlag.
-
38)
- Z. Tu , Y. Deng . A conjecture on binary string and its application on constructing Boolean functions of optimal algebraic immunity. Designs, Codes Cryptogr. , 1 , 1 - 14
-
1)