Abstract
To resist the fast algebraic attack and fast selective discrete Fourier transform attacks, spectral immunity of a sequence or a Boolean function was proposed. At the same time, an algorithm to compute the spectral immunity of the binary sequence with odd period N was presented, here N is a factor of 2n − 1, where n is an integer. The case is more complicated when the period is even. In this paper, we compute linear complexity of every orthogonal sequence of a given sequence using Chan-Games algorithm and k - error linear complexity algorithm. Then, an algorithm for spectral immunity of binary sequence with period N = 2n is obtained. Furthermore, the time complexity of this algorithm is proved to be O(n).
Similar content being viewed by others
References
Armknecht F, Rause M. Algebraic attacks on combiners with memory [C] //Proc Advances in Cryptology — CRYPTO 2003, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2003, 2729: 162–175.
Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback [C] //Proc Advances in Cryptology— EUROCRYPT 2003, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2003, 2656: 345–359.
Courtois N. Fast algebraic attacks on stream ciphers with linear feedback [C] //Proc Advances in Cryptology—CRYPTO 2003, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2003, 2729: 176–194.
Armknecht F. Improving fast algebraic attacks [C] //Proc Fast Software Encryption 2004, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2004, 3017: 65–82.
Armknecht F, Ars G. Introducing a new variant of fast algebraic attacks and minimizing their successive data complexsity [C] //Proc Mycrypt 2005(International Conference on Cryptology in Malaysia), Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005, 3715: 16–32.
Hawkes P, Rose G G. Rewriting variables: The complexcity of fast algebraic attacks on stream ciphers [C] //Proc Advances in Cryptology — CRYPTO, Lecture Notes in Computer Science. Berlin: Spring-Verlag, 2004, 3152: 390–406.
Meier W, Pasalic E, Carlet C. Algebraic attacks and decom-position of Boolean functions [C]//Advances in Cryptology— EURO-CRYPT 2004, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2004, 3027: 474–491.
Dalai D K, Maitra S, Sarkar S. Basic theory in construction Boolean functions with maximum possible annihilator immunity [J]. Designs, Codes and Cryptography, 2006, 40(1): 41–58.
Li N, Qi W F. Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity [J]. IEEE Trans Inf Theory, 2006, 52(5): 2271–2273.
Qu L J, Li C. On the 2m-variable symmetric Boolean functions with maximum algebraic immunity [J]. Science in China Series F: Information Sciences, 2008, 51(2): 120–127.
Liao Q Y, Feng K Q, Liu F. On the 2m+1-variable symmetric Boolean functions with maximum algebraic immunity 2m-1 [J]. Science in China Series A: Mathematics, 2009, 52(1): 17–28.
Qu L J, Feng K Q, Liu F, et al. Constructing symmetric boolean functions with maximum algebraic immunity [J]. IEEE Trans Inf Theory, 2009, 55(5): 2406–2412.
Carlet C, Zeng X Y, Li C L, et al. Further properties of several classes of Boolean functions with optimum algebraic immunity [J]. Designs, Codes and Cryptography, 2009, 52(3): 303–338.
Li C L, Zeng X Y, Su W, et al. A class of rotation symmetric Boolean functions with optimum algebraic immunity [J]. Wuhan University Journal of Natural Science, 2008, 13(6): 702–706.
Liu M C, Pei D Y, Du Y S. Identification and construction of Boolean functions with maximum algebraic immunity[J]. Science in China Series F: Information Sciences, 2010, 53(7): 1379–1396.
Wang Q C, Peng J, Kan H B, et al. Constructions of cryptographically significant Boolean functions using primitive polynomials[ J]. IEEE Trans Inf Theory, 2010, 56(6): 3048–3053.
Gong G, Ronjom S, Helleseth T, et al. Fast discrete Fourier spectra attacks on stream ciphers[J]. IEEE Trans Inf Theory, 2011, 57(8): 5555–5565.
Helleseth T, Ronjom S. Simplifying algebraic attacks with univariate analysis [C] // Information Theory and Applications Workshoo(ITA). Washington D C: IEEE Press, 2011: 1–7.
Stamp M, Martin C F. An algorithm for the k-error linear complexity of binary sequence with period 2n [J]. IEEE Trans Inf Theory, 1993, 39(4): 1398–1401.
Games R A, Chan A H. A fast algorithm for determining the complexity of a binary sequence with period 2n [J]. IEEE Trans Inf Theory, 1983, 29(1): 144–146.
Acknowledgements
The author would like to thank the reviewers for their constructive comments that much improved the presentation and quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China( 61300181, 61272057, 61202434, 61170270, 61100203, 61121061)
Biography: LIU Zhenhua, male, Master, Lecturer, research direction: information system.
Rights and permissions
About this article
Cite this article
Liu, Z. An algorithm for the spectral immunity of binary sequence with period 2n . Wuhan Univ. J. Nat. Sci. 21, 121–125 (2016). https://doi.org/10.1007/s11859-016-1147-8
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-016-1147-8