Abstract
Spectra attacks proposed recently are more data efficient than algebraic attacks against stream cipher. They are also time-and-space efficient. A measurement of the security of a stream cipher against spectra attacks is the spectral immunity, the lowest linear complexity of annihilators of the key stream. Under the restriction to binary annihilators, this paper first studies the tight upper bound on spectral immunities of periodic sequences, and sequences whose spectral immunities achieve this upper bound are corresponding to Boolean functions achieving optimal algebraic immunities. Secondly, the asymptotic behavior on spectral immunities of sequences corresponding to \(n\)-variable balanced Boolean functions is discussed, which shows that almost all such sequences have high spectral immunities.
Similar content being viewed by others
References
Carlet C., Feng K.Q.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attack and good nonlinearity. In: Advances in Cryptology—ASIACRYPT 2008. LNCS, vol. 5350, pp. 425–440. Springer, Berlin (2008).
Courtois N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Berlin (2003).
Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Berlin (2003).
Courtois N., Pieprzyk J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Advances in Cryptology—ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Berlin (2002).
Dalai D.K., Maitra S., Sarkar S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des. Codes Cryptogr. 40(1), 41–58 (2006).
Didier F.: A new upper bound on the block error probability after decoding over the erasure channel. IEEE Trans. Inf. Theory 52(10), 4496–4503 (2006).
Gong G., Rønjom S., Helleseth T., Hu H.G.: Fast discrete fourier spectra attacks on stream ciphers. IEEE Trans. Inf. Theory 57(8), 5555–5565 (2011).
Gustavson F.G.: Analysis of Berlekamp–Massey linear feedback shift-register synthesis algorithm. IBM J. Res. Develop. 20, 204–212 (1976).
Helleseth T., Rønjom S.: Simplifying algebraic attacks with univariate analysis. In: Information Theory and Applications Workshop (ITA) 2011, pp. 1–7 (2011).
Hong S.J., Bossen D.C.: On some properties of self-reciprocal polynomials. IEEE Trans. Inf. Theory 21(4), 462–464 (1975).
Lidl R., Niedereiter H.: Finite Fields. Addison-Wesley, Boston (1983).
Liu M.C., Zhang Y., Lin D.D.: Perfect algebraic immune functions. In: Advances in Cryptology—ASIACRYPT 2012. LNCS, vol. 7658, pp. 172–189. Springer, Berlin (2012).
MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. Elsevier, Amsterdam (1977).
Meier W., Pasalic E., Carlet C.: Algebraic attacks and decomposition of Boolean functions. In: Advances in Cryptology—EUROCRYPT 2004. LNCS, vol. 3207, pp. 474–491. Springer, Berlin (2004).
Wang J.J., Chen K.F., Zhu S.X.: Annihilators of fast discrete fourier spectra attacks. In: Advances in Information and Computer Security 2012. LNCS, vol. 7631, pp. 182–196. Springer, Berlin (2012).
Acknowledgments
This paper was supported by NSF of China under Grant Nos. 61272042 and 61309017. The authors are grateful to the reviewers for their helpful comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by T. Helleseth.
Rights and permissions
About this article
Cite this article
Wu, D., Qi, W. & Chen, H. On the spectral immunity of periodic sequences restricted to binary annihilators. Des. Codes Cryptogr. 78, 533–545 (2016). https://doi.org/10.1007/s10623-014-0019-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-014-0019-5