Skip to main content
Log in

Equivalence classes for cubic rotation symmetric functions

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

Rotation symmetric Boolean functions, that is, Boolean functions which are invariant under any cyclic permutation of the variables, have been extensively studied in the last dozen years or so due to their importance in cryptography and coding theory. Little was known about the basic question of when two such functions are affine equivalent until very recently. The case of affine equivalence of quadratic rotation symmetric functions was solved in 2009 by Kim, Park and Hahn. In 2010, Cusick introduced the concept of patterns to study the more complicated case of cubic functions under permutations. This method made possible a detailed analysis of some special classes of cubic rotation symmetric functions in n variables where n has a special form, for example, n equal to a prime power. Here the affine equivalence classes under permutations in n variables for any n are examined. In particular, all possible sizes of these classes are identified and an exact count of the functions in the largest classes is given. It is conjectured that the classes of the largest size contain a positive proportion of all of the distinct functions in n variables.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Cusick, T.W.: Affine equivalence of cubic homogeneous rotation symmetric Boolean functions. Inf. Sci. 181, 5067–5083 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  2. Cusick, T.W., Brown, A.: Affine equivalence for rotation symmetric Boolean functions with p k variables. Finite Fields their Appl. 18, 547–562 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cusick, T.W., Cheon, Y.: Affine equivalence for for rotation symmetric Boolean functions with 2k variables. Designs Codes Cryptogr. 63, 273–294 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  4. Cusick, T.W., Stănică, P.: Fast evaluation, weights and nonlinearity of rotation symmetric functions. Discrete Math. 258, 289–301 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  5. Cusick, T.W., Stănică, P.: Cryptographic Boolean Functions and Applications. Academic Press, San Diego (2009)

    Google Scholar 

  6. Filiol, E., Fontaine, C.: Highly nonlinear balanced Boolean functions with a good correlation immunity. In: Advances in Cryptology – Eurocrypt ’98. LNCS 1403, pp. 475–488. Springer, Berlin (1998)

    Chapter  Google Scholar 

  7. Hell, M., Maximov, A., Maitra, S.: On efficient implementation of a search strategy for rotation symmetric Boolean functions. In: Proceedings 9th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2004), Black Sea Coast, pp. 214–222. Kranevo, Bulgaria (2004)

    Google Scholar 

  8. Kavut, S., Maitra, S., Yücel, M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53, 1743–1751 (2007)

    Article  Google Scholar 

  9. Kavut, S., Yücel, M.D.: 9-variable Boolean functions with nonlinearity 242 in the generalized rotation symmetric class. Inf. Comput. 208, 341–350 (2010)

    Article  MATH  Google Scholar 

  10. Kim, H., Park, S-M., Hahn, S.G.: On the weight and nonlinearity of homogeneous rotation symmetric Boolean functions of degree 2. Discrete Appl. Math. 157, 428–432 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  11. Maitra, S., Sarkar, P.: Modifications of Patterson–Wiedemann functions for cryptographic applications. IEEE Trans. Inf. Theory 48, 278–284 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  12. Maximov, A.: Classes of plateaued rotation symmetric Boolean functions under transformation of Walsh spectra. In: Workshop on Coding and Cryptography (WCC 2005). LNCS 3969, pp. 325–334. Springer, Berlin (2006)

    Google Scholar 

  13. Maximov, A., Hell, M., Maitra, S.: Plateaued rotation symmetric Boolean functions on odd number of variables. In: Boolean Functions and Cryptographic Applications (BFCA 2005), pp. 83–104. University of Rouen, France (2005)

    Google Scholar 

  14. Patterson, N.J., Wiedemann, D.H.: The covering radius of the (215, 16) Reed–Muller code is at least 16276. IEEE Trans. Inf. Theory 29, 354–356 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  15. Pieprzyk, J., Qu, C.X.: Fast hashing and rotation-symmetric functions. J. Univers. Comput. Sci. 5(1), 20–31 (1999)

    MathSciNet  Google Scholar 

  16. Stănică, P., Maitra, S.: A constructive count of rotation symmetric functions. Inf. Process. Lett. 88, 299–304 (2003)

    Article  MATH  Google Scholar 

  17. Stănică, P., Maitra, S., Clark, J.: Results on rotation symmetric bent and correlation immune Boolean functions. In: Fast Software Encryption (FSE 2004). LNCS 3017, pp. 161–177. Springer, Berlin (2004)

    Google Scholar 

  18. Zhang, X., Guo, H., Feng, R., Li, Y.: Proof of a conjecture about rotation symmetric functions. Discrete Math. 311, 1281–1289 (2011)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Appendix: Examples

Appendix: Examples

1.1 n = 15

First we are going to do an example demonstrating the use of the ξ function defined in Definition 3.2. Look at the case n = 15 where the number of distinct primes is 2. By definition ξ(15) = ξ(3)·ξ(5) = 1·3 = 3. Too see that this is true, let us make the matrix in the proof of Lemma 3.10 with m 1 = 3 and m 2 = 5:

$$ \begin{array}{ccccc} 1 & 4 &7 & 10 &13\\[3pt] 2 & 5 & 8 & 11 & 14\\[3pt] 3 & 6 & 9 & 12 & 15\\ \end{array} $$

First, we cross off the rows that are not relatively prime to 3, and then from the remaining rows, cross off the values that are not relatively prime to 5. The result is shown below:

$$ \begin{array}{ccccc} 1 & 4 &7 & {{10}{\diagup}} &13\\[3pt] 2 & {{5}{\diagup}} & 8 & 11 & 14\\[3pt] {{3}{}} &{{6}{}} & {{9}{}} & {{12}{}} & {{15}{}}\\ \end{array} $$

To get the result, count the number of “vertical” pairs remaining. These are (1, 2), (7, 8) and (13, 14). So the answer is 3, as we calculated by the formula.

Now that we have seen how the ξ function works, let us begin doing some calculations for n = 15 (see Fig. 9). Since n is odd and \(5\not\equiv1\mod 6\) there will be no class of size φ(15)/3 and so we will use Fig. 3 when doing calculations.

Fig. 9
figure 9

n = 15 example

We can also calculate from Lemma 2.2 that there are 3 classes of size φ(15)/2 = 4; 1 class of size φ(5)/2 = 2; and 1 class of size φ(3)/2 = 1. Therefore, from Theorem 3.1, E 2(15) = 2 + 3 = 5. Figure 10 is a list of all of the equivalence classes when n = 15. As can be seen in this case, all of the equivalence classes we identified are actually a count for all of the equivalence classes altogether.

Fig. 10
figure 10

Equivalence classes when n = 15

1.2 n = 28

The second example we look at is n = 28 (see Fig. 11). This time, since n is even and the highest power of 2 dividing n is 2, we will use Fig. 7 to help with the calculations. Notice first that φ(28) = 12 and ξ(28) = 0.

Fig. 11
figure 11

n = 28 example

We can also calculate from Lemmas 2.2 and 2.4 that there are 3 classes of size φ(28)/2 = 6; 1 class of size φ(14)/2 = 3; 1 class of size φ(7)/2 = 3; 1 class of size φ(7)/3 = 2; and 1 class of size φ(4)/2. Therefore, we have identified 13 classes altogether and E 2(28) = 6 + 3 = 9. Figure 12 is a list of all equivalence classes when n = 28. As can be seen from the figure, there are more equivalence classes than those we found. In particular, the classes of size φ(14), φ(7) and φ(4) have not been counted.

Fig. 12
figure 12

Equivalence classes when n = 28

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brown, A., Cusick, T.W. Equivalence classes for cubic rotation symmetric functions. Cryptogr. Commun. 5, 85–118 (2013). https://doi.org/10.1007/s12095-012-0075-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-012-0075-5

Keywords

Mathematics Subject Classifications (2010)

Navigation