Skip to main content
Log in

The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

In a prior paper (Boukerrou et al. IACR Trans. Symmetric Cryptol. 2020(1), 331–362 2020), Boukerrou et al. introduced the Feistel Boomerang Connectivity Table (FBCT). FBCT is an important cryptanalytic technique on Feistel ciphers. In fact, the coefficients of FBCT are actually related to the second-order zero differential spectra of functions in even characteristic. In this paper, we push further the study initiated in Boukerrou et al. (IACR Trans. Symmetric Cryptol. 2020(1), 331–362 2020). Almost perfect nonlinear (APN) functions and the inverse function are interesting in cryptography and coding theory. In Boukerrou et al. (IACR Trans. Symmetric Cryptol. 2020(1), 331–362 2020), Boukerrou et al. determined the second-order zero differential spectra of APN functions and the inverse function in even characteristic. In order to derive further cryptographic properties of APN functions and the inverse function in odd characteristic, we calculate the second-order zero differential spectra of some APN functions and the inverse function in odd characteristic. In addition, these APN functions and the inverse function have low second-order zero differential uniformity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Biham, E., Dunkelman, O., Keller, N.: The rectangle attack-rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT LNCS, vol. 2045, pp 340–357. Springer, Heidelberg (2001)

  2. Biham, E., Dunkelman, O., Keller, N.: New results on boomerang and rectangle attacks. In: Daemen, J., Rijmen, V. (eds.) FSE LNCS, vol. 2365, pp 1–16. Springer (2002)

  3. Biryukov, A., De Cannière, C., Dellkrantz, G.: Cryptanalysis of SAFER++. In: Boneh, D. (ed.) CRYPTO LNCS, vol. 2729, pp 195–211. Springer (2003)

  4. Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT LNCS, vol. 5912, pp 1–18. Springer (2009)

  5. Boukerrou, H., Huynh, P., Lallemand, V., Mandal, B., Minier, M.: On the Feistel Counterpart of the Boomerang Connectivity Table introduction and analysis of the FBCT. IACR Trans. Symmetric Cryptol. 2020(1), 331–362 (2020)

    Article  Google Scholar 

  6. Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: Boomerang connectivity table: a new cryptanalysis tool. Eurocrypt 2018 LNCS 10821, 683–714 (2018)

    Article  MathSciNet  Google Scholar 

  7. Helleseth, T., Rong, C., Sandberg, D.: New families of almost perfect nonlinear power mappings. IEEE Trans. Inf. Theory 45, 475–485 (1999)

    Article  MathSciNet  Google Scholar 

  8. Helleseth, T., Sandberg, D.: Some power mappings with low differential uniformity. Appl. Algerbra Eng. Commun. Comput., 363–370 (1997)

  9. Kelsey, J., Kohno, T., Schneier, B.: Amplified boomerang attacks against reduced-round MARS and Serpent. In: HartmanisJan, G.G., Schneier, V.L. (eds.) FSE LNCS, vol. 1978, pp 75–93. Springer (2000)

  10. Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks: Theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948–4966 (2012)

    Article  MathSciNet  Google Scholar 

  11. Lidl, R., Niederreiter, H.: Finite fields. Addison Wesley, Reading (1983)

  12. Nyberg, K.: Differentially uniform mappings for cryptography. In: Advances in cryptology-EUROCRYPT’93, Lecture Notes in Computer Science, vol. 765, pp 55–64. Springer, New York (1994)

  13. Storer, T.: Cyclotomy and Difference Sets. Markham, Chicago (1967)

    MATH  Google Scholar 

  14. Wagner, D.: The boomerang attack. FSE 1999 LNCS 1636, 156–170 (1999)

    MATH  Google Scholar 

  15. Zha, Z., Wang, X.: Almost perfect nonlinear power functions in odd characteristic. IEEE Trans. Inf. Theory 57(7), 4826–4832 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qin Yue.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The paper was supported by National Natural Science Foundation of China (No. 61772015), the Postgraduate Research & Practice Innovation Program of Jiangsu Province (No. SJKY190167).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Yue, Q. & Tang, D. The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic. Cryptogr. Commun. 14, 653–662 (2022). https://doi.org/10.1007/s12095-021-00544-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-021-00544-5

Keywords

Mathematics Subject Classification (2010)

Navigation