Skip to main content

A Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic Attacks

  • Conference paper
  • First Online:
Mathematics and Computing (ICMC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 655))

Included in the following conference series:

  • 912 Accesses

Abstract

The immunity of Boolean functions against fast algebraic attacks is an important cryptographic property. When deciding the optimal immunity of an n-variable Boolean function against fast algebraic attacks, one may need to compute the ranks of a series of matrices of size \(\sum _{i=d+1}^{n}{n \atopwithdelims ()i}\times \sum _{i=0}^e{n \atopwithdelims ()i}\) over binary field \(\mathbb {F}_2\) for each positive integer e less than \(\lceil \frac{n}{2}\rceil \) and corresponding d. In this paper, for an n-variable balanced Boolean function, exploiting the combinatorial properties of the binomial coefficients, when n is odd, we show that the optimal immunity is only determined by the ranks of those matrices such that \(\sum _{i=0}^e{n \atopwithdelims ()i}\) is even. When n is even but not the power of 2, we show that the optimal immunity is only determined by the ranks of those matrices such that \(\sum _{i=0}^e{n \atopwithdelims ()i}\) is even or such that both \(\sum _{i=0}^e{n \atopwithdelims ()i}\) and \(\sum _{i=0}^{e+1}{n \atopwithdelims ()i}\) are odd.

This work is supported by National Natural Science Foundations of China (Grant No. 61309028, Grant No. 61472457, Grant No. 61502113), Science and Technology Planning Project of Guangdong Province, China (Grant No. 2014A010103017), and Natural Science Foundation of Guangdong Province, China (Grant No. 2016A030313298).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 65–82. Springer, Heidelberg (2004). doi:10.1007/978-3-540-25937-4_5

    Chapter  Google Scholar 

  2. Armknecht, F., Carlet, C., Gaborit, P., Künzli, S., Meier, W., Ruatta, O.: Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 147–164. Springer, Heidelberg (2006). doi:10.1007/11761679_10

    Chapter  Google Scholar 

  3. Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic immunity for cryptographically significant boolean functions: analysis and construction. IEEE Trans. Inform. Theory 52(7), 3105–3121 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  4. Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 425–440. Springer, Heidelberg (2008). doi:10.1007/978-3-540-89255-7_26

    Chapter  Google Scholar 

  5. Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45146-4_11

    Chapter  Google Scholar 

  6. Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003). doi:10.1007/3-540-39200-9_21

    Chapter  Google Scholar 

  7. Courtois, N.T.: Cryptanalysis of sfinks. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 261–269. Springer, Heidelberg (2006). doi:10.1007/11734727_22

    Chapter  Google Scholar 

  8. Crama, Y., Hammer, P.: Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Encyclopedia of Mathematics and its Applications. Cambridge University Press, Cambridge (2010)

    MATH  Google Scholar 

  9. Dalai, D.K.: Computing the rank of incidence matrix and algebraic immunity of Boolean functions. http://eprint.iacr.org/2013/273.pdf

  10. Du, Y., Zhang, F., Liu, M.: On the resistance of boolean functions against fast algebraic attacks. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 261–274. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31912-9_18

    Chapter  Google Scholar 

  11. Liu, M., Lin, D.: Fast algebraic attacks and decomposition of symmetric boolean functions. IEEE Trans. Inform. Theory 57(7), 4817–4821 (2011)

    Article  MathSciNet  Google Scholar 

  12. Liu, M., Zhang, Y., Lin, D.: Perfect algebraic immune functions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 172–189. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34961-4_12

    Chapter  Google Scholar 

  13. Liu, M., Lin, D.: Almost perfect algebraic immune functions with good nonlinearity. In: International Symposium on Information Theory, ISIT 2014, pp. 1837–1841. IEEE, New York (2014)

    Google Scholar 

  14. Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_28

    Chapter  Google Scholar 

  15. Pasalic, E.: Almost fully optimized infinite classes of boolean functions resistant to (Fast) algebraic cryptanalysis. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 399–414. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00730-9_25

    Chapter  Google Scholar 

  16. Rizomiliotis, P.: On the resistance of boolean functions against algebraic attacks using univariate polynomial representation. IEEE Trans. Inform. Theory 56(8), 4014–4024 (2010)

    Article  MathSciNet  Google Scholar 

  17. Tang, D., Carlet, C., Tang, X.: Highly nonlinear boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inform. Theory 59(1), 653–664 (2013)

    Article  MathSciNet  Google Scholar 

  18. Wang, W., Liu, M., Zhang, Y.: Comments on “A design of boolean functions resistant to (Fast) algebraic cryptanalysis with efficient implementation”. Crypt. Commun. 5(1), 1–6 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  19. Zhang, Y., Liu, M., Lin, D.: On the immunity of rotation symmetric Boolean functions against fast algebraic attacks. Discrete Appl. Math. 162(1), 17–27 (2014)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yusong Du .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Shen, J., Du, Y. (2017). A Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic Attacks. In: Giri, D., Mohapatra, R., Begehr, H., Obaidat, M. (eds) Mathematics and Computing. ICMC 2017. Communications in Computer and Information Science, vol 655. Springer, Singapore. https://doi.org/10.1007/978-981-10-4642-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4642-1_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4641-4

  • Online ISBN: 978-981-10-4642-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics