Skip to main content

Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed–Muller Codes

  • Conference paper
  • First Online:
Cryptography and Information Security in the Balkans (BalkanCryptSec 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9540))

  • 595 Accesses

Abstract

The construction of Boolean functions with an odd number of variables and maximum algebraic immunity is studied in this paper. Starting with any function f obtained by the Carlet–Feng construction, we develop an efficient method to properly modify f in order to provide new functions having maximum algebraic immunity. This new approach, which exploits properties of the punctured Reed–Muller codes, suffices to generate a large number of new functions with maximum algebraic immunity through swapping an arbitrary number of elements between the support of f and its complement.

This work is co–financed by the European Union (European Social Fund) and Greek national funds through the operational program “Education and Lifelong Learning” of the National Strategic Reference Framework (NSRF). Research funding program THALES: investing in knowledge society through the European Social Fund.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Canteaut, A.: Open problems related to algebraic attacks on stream ciphers. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 120–134. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inform. Theory 52, 3105–3121 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  3. Carlet, C.: Constructing balanced functions with optimum algebraic immunity. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), pp. 451–455 (2007)

    Google Scholar 

  4. Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 425–440. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Carlet, C., Gaborit, P.: On the construction of balanced Boolean functions with a good algebraic immunity. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), pp. 1101–1105 (2005)

    Google Scholar 

  6. Carlet, C., Zeng, X., Li, C., Hu, L.: Further properties of several classes of Boolean functions with optimum algebraic immunity. Des. Codes Cryptogr. 52, 303–338 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  7. Carlet, C.: Comments on “constructions of cryptographically significant Boolean functions using primitive polynomials”. IEEE Trans. Inform. Theor. 57, 4852–4853 (2011)

    Article  MathSciNet  Google Scholar 

  8. Chen, Y., Lu, P.: Two classes of symmetric Boolean functions with optimum algebraic immunity: construction and analysis. IEEE Trans. Inform. Theor. 57, 2522–2538 (2011)

    Article  MathSciNet  Google Scholar 

  9. Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, Eli (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Dalai, D.K., Maitra, S., Sarkar, S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des. Codes Cryptogr. 40, 41–58 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  12. Li, N., Qi, W.: Construction and analysis of boolean functions of 2t+1 variables with maximum algebraic immunity. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 84–98. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Li, J., Carlet, C., Zeng, X., Li, C., Hu, L., Shan, J.: Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks. Des. Codes Cryptogr. 76, 279–305 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  14. Limniotis, K., Kolokotronis, N., and Kalouptsidis, N.: Constructing Boolean functions in odd number of variables with maximum algebraic immunity. In: IEEE International Symposium on Information Theory (ISIT), pp. 2686–2690 (2011)

    Google Scholar 

  15. Limniotis, K., Kolokotronis, N., Kalouptsidis, N.: Secondary constructions of Boolean functions with maximum algebraic immunity. Cryptogr. Comm. 5, 179–199 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  16. Liu, M., Zhang, Y., Lin, D.: Perfect algebraic immune functions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 172–189. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  17. Liu, M., Lin, D.: Fast algebraic attacks and decomposition of symmetric Boolean functions. IEEE Trans. Inform. Theory 57, 4817–4821 (2011)

    Article  MathSciNet  Google Scholar 

  18. MacWilliams, F.N., Sloane, N.: The Theory of Error Correcting Codes. North-Holland Publishing Company, Amsterdam (1977)

    MATH  Google Scholar 

  19. Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Mesnager, S.: Bent and hyper-bent functions in polynomial form and their link with some exponential sums and dickson polynomials. IEEE Trans. Inform. Theory 57, 5996–6009 (2011)

    Article  MathSciNet  Google Scholar 

  21. Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and its Applications, vol. 20. Cambridge University Press, Cambridge (1996)

    Book  MATH  Google Scholar 

  22. Pasalic, E.: Almost fully optimized infinite classes of Boolean functions resistant to (fast) algebraic cryptanalysis. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 399–414. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  23. Qu, L., Feng, K., Liu, F., Wang, L.: Constructing symmetric Boolean functions with maximum algebraic immunity. IEEE Trans. Inform. Theory 55, 2406–2412 (2009)

    Article  MathSciNet  Google Scholar 

  24. Rizomiliotis, P.: On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation. IEEE Trans. Inform. Theory 56, 4014–4024 (2010)

    Article  MathSciNet  Google Scholar 

  25. Sarkar, S., Maitra, S.: Construction of rotation symmetric Boolean functions on odd number of variables with maximum algebraic immunity. In: Boztaş, S., Lu, H.-F.F. (eds.) AAECC 2007. LNCS, vol. 4851, pp. 271–280. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  26. Su, S., Tang, X., Zeng, X.: A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller code. Des. Codes Cryptogr. 72, 653–673 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  27. Su, S., Tang, X.: Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity. Des. Codes Cryptogr. 71, 183–199 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  28. Tang, D., Carlet, C., Tang, X.: Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inform. Theory 59, 653–664 (2013)

    Article  MathSciNet  Google Scholar 

  29. Tu, Z., Deng, Y.: A conjecture on binary string and its applications on constructing Boolean functions of optimal algebraic immunity. Des. Codes Cryptogr. 60, 1–14 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  30. Wang, Q., Peng, J., Kan, H.: Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans. Inform. Theory 56, 3048–3053 (2010)

    Article  MathSciNet  Google Scholar 

  31. Zeng, X., Carlet, C., Shan, J., Hu, L.: More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inform. Theory 57, 6310–6320 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgment

The authors would like to thank the anonymous reviewers for the helpful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Konstantinos Limniotis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Limniotis, K., Kolokotronis, N. (2016). Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed–Muller Codes. In: Pasalic, E., Knudsen, L. (eds) Cryptography and Information Security in the Balkans. BalkanCryptSec 2015. Lecture Notes in Computer Science(), vol 9540. Springer, Cham. https://doi.org/10.1007/978-3-319-29172-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29172-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29171-0

  • Online ISBN: 978-3-319-29172-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics