Abstract
A necessary condition for the security of cryptographic functions is to be “sufficiently distant” from linear, and cryptographers have proposed several measures for this distance. In this paper, we show that six common measures, nonlinearity, algebraic degree, annihilator immunity, algebraic thickness, normality, and multiplicative complexity, are incomparable in the sense that for each pair of measures, μ 1,μ 2, there exist functions f 1,f 2 with f 1 being more nonlinear than f 2 according to μ 1, but less nonlinear according to μ 2. We also present new connections between two of these measures. Additionally, we give a lower bound on the multiplicative complexity of collision-free functions.
Similar content being viewed by others
Notes
Unfortunately, this introduces an overloading of the word “nonlinearity” since it also refers to the more general concept of distance to linear functions. The meaning will be clear from context.
In this paper we use the term “annihilator immunity” rather than “algebraic immunity”, see the remark in [17].
We have experimentally verified that all functions on four bits have multiplicative complexity at most three. This is somewhat surprising, as circuit realization of random functions (e.g. x 1 x 2 x 3 x 4+x 1 x 2 x 3+x 2 x 3 x 4+x 1 x 3 x 4+x 1 x 3+x 2 x 4+x 1 x 4) would appear to need more than three AND gates. In [2] we conjectured that some function on five bits should have multiplicative complexity five. It turns out this is false ([42]). We expect that some function on six bits will have multiplicative complexity six.
References
Boyar, J., Damgård, I., Peralta, R.: Short non-interactive cryptographic proofs. J. Cryptol. 13, 449–472 (2000)
Boyar, J., Find, M., Peralta, R.: Four measures of nonlinearity. In: Spirakis, P.G., Serna, M.J. (eds.) CIAC, Lecture Notes in Computer Science, vol. 7878, pp 61–72. Springer (2013)
Boyar, J., Find, M.G.: Constructive relationships between algebraic thickness and normality. In: The Proceedings of FCT 2015 (Lecture Notes in Computer Science vol. 9210). CoRR arXiv:http://arxiv.org/abs/1410.1318 (2014)
Boyar, J., Find, M.G.: The relationship between multiplicative complexity and nonlinearity. In: Csuhaj-Varju̇, E., Dietzfelbinger, M., Ėsik, Z. (eds.) Mathematical Foundations of Computer Science 2014 - 39th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, 2014. Proceedings, Part II, Lecture Notes in Computer Science, vol. 8635, pp 130–140. Springer (2014), doi:10.1007/978-3-662-44465-812
Boyar, J., Peralta, R.: Tight bounds for the multiplicative complexity of symmetric functions. Theor. Comput. Sci. 396(1-3), 223–246 (2008)
Boyar, J., Peralta, R., Pochuev, D.: On the multiplicative complexity of Boolean functions over the basis (∧,⊕,1). Theor. Comput. Sci. 235(1), 43–57 (2000)
Braeken, A., Preneel, B.: On the algebraic immunity of symmetric Boolean functions. In: Maitra, S., Madhavan, C.E.V., Venkatesan, R. (eds.) INDOCRYPT, Lecture Notes in Computer Science, vol. 3797, pp 35–48. Springer, Heidelberg (2005)
Canteaut, A., Videau, M.: Symmetric Boolean functions. IEEE Trans. Inf. Theory 51(8), 2791–2811 (2005)
Carlet, C.: On cryptographic complexity of Boolean functions. In: Finite Fields with Applications to Coding Theory, Cryptography and Related Areas, pp 53–69. Springer (2002)
Carlet, C.: On the degree, nonlinearity, algebraic thickness, and nonnormality of Boolean functions, with developments on symmetric functions. IEEE Trans. Inf. Theory 50(9), 2178–2185 (2004)
Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, chap. 8, pp 257–397. Cambridge University Press, Cambridge, UK (2010)
Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction. IEEE Trans. Inf. Theory 52(7), 3105–3121 (2006)
Cohen, G., Tal, A.: Two structural results for low degree polynomials and applications. In: The Proceedings for RANDOM 2015. CoRR arXiv:http://arxiv.org/abs/1404.0654 (2015)
Courtois, N., Hulme, D., Mourouzis, T.: Solving circuit optimisation problems in cryptography and cryptanalysis. E-print can be found at http://eprint.iacr.org/2011/475.pdf
Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT, Lecture Notes in Computer Science, vol. 2656, pp 345–359. Springer, Heidelberg (2003)
Dalai, D.K., Gupta, K.C., Maitra, S.: Results on algebraic immunity for cryptographically significant Boolean functions. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT, Lecture Notes in Computer Science, vol. 3348, pp 92–106. Springer, Heidelberg (2004)
Dalai, D.K., Maitra, S., Sarkar, S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des. Codes Cryptography 40 (1), 41–58 (2006)
Demenkov, E., Kulikov, A.S.: An elementary proof of a 3n - o(n) lower bound on the circuit complexity of affine dispersers. In: Murlak, F., Sankowski, P. (eds.) MFCS, Lecture Notes in Computer Science, vol. 6907, pp 256–265. Springer, Heidelberg (2011)
Didier, F.: A new upper bound on the block error probability after decoding over the erasure channel. IEEE Trans. Inf. Theory 52(10), 4496–4503 (2006)
Dobbertin, H.: Construction of bent functions and balanced Boolean functions with high nonlinearity. In: Preneel, B. (ed.) FSE, Lecture Notes in Computer Science, vol. 1008, pp 61–74. Springer, Heidelberg (1994)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the nineteenth annual ACM symposium on Theory of computing, STOC ’87, pp 218–229. ACM, New York, NY, USA (1987). doi:10.1145/28395.28420
Jukna, S.: Boolean Function Complexity: Advances and Frontiers. Springer, Berlin (2012)
Kavut, S., Maitra, S., Yücel, M.D.: There exist Boolean functions on n (odd) variables having nonlinearity > 2 n−1 - 2 (n−1)/2 if and only if n >7. IACR Cryptology ePrint Archive 2006, 181 (2006)
Knudsen, L.R.: Truncated and higher order differentials. In: Fast Software Encryption, pp 196–211. Springer (1995)
Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP (2), Lecture Notes in Computer Science, vol. 5126, pp 486–498. Springer, Heidelberg (2008)
Lai, X.: Higher order derivatives and differential cryptanalysis. In: Communications and Cryptography, pp 227–233. Springer (1994)
Lobanov, M.: Exact relations between nonlinearity and algebraic immunity. J. Appl. Ind. Math. 3, 367–376 (2009)
Lupanov, O.: On rectifier and switching-and-rectifier schemes. Dokl. Akad. 30 Nauk SSSR 111, 1171–1174 (1965)
Maitra, S., Sarkar, P.: Maximum nonlinearity of symmetric Boolean functions on odd number of variables. IEEE Trans. Inf. Theory 48(9), 2626–2630 (2002)
McFarland, R.L.: Sub-difference sets of Hadamard difference sets. J. Comb. Theory, Ser. A 54(1), 112–122 (1990)
Meier, W., Staffelbach, O.: Nonlinearity criteria for cryptographic functions. In: Quisquater, J.J., Vandewalle, J. (eds.) EUROCRYPT, Lecture Notes in Computer Science, vol. 434, pp 549–562. Springer (1989)
Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)
Nechiporuk, E.I.: On the complexity of schemes in some bases containing nontrivial elements with zero weights (in russian). Problemy Kibernetiki 8, 123–160 (1962)
Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO, Lecture Notes in Computer Science, vol. 7417, pp 681–700. Springer, Heidelberg (2012)
O’Connor, L., Klapper, A.: Algebraic nonlinearity and its applications to cryptography. J. Cryptol. 7(4), 213–227 (1994)
O’Donnell, R.: Analysis of Boolean Functions. Book draft. Available at http://www.analysisofbooleanfunctions.org (2012)
Rodier, F.: Asymptotic nonlinearity of Boolean functions. Des. Codes Cryptography 40(1), 59–70 (2006)
Rothaus, O.S.: On “bent” functions. J. Comb. Theory. Ser. A 20(3), 300–305 (1976)
Savický, P.: On the bent Boolean functions that are symmetric. Eur. J. Comb. 15(4), 407–410 (1994)
Schnorr, C.P.: The multiplicative complexity of Boolean functions. In: Mora, T. (ed.) AAECC, Lecture Notes in Computer Science, vol. 357, pp 45–58. Springer, Heidelberg (1988)
Shaltiel, R.: Dispersers for affine sources with sub-polynomial entropy. In: Ostrovsky, R. (ed.) FOCS, pp 247–256. IEEE (2011)
Turan, M.S., Peralta, R.: The multiplicative complexity of Boolean functions on four and five variables. In: Proceedings of LightSec’14. Springer (2014)
Zhang, X., Pieprzyk, J., Zheng, Y.: On algebraic immunity and annihilators. Inf. Secur. Cryptol.–ICISC 2006, 65–80 (2006)
Zheng, Y., Zhang, X.M., Imai, H.: Restriction, terms and nonlinearity of boolean functions. Theor. Comput. Sci. 226(1-2), 207–223 (1999). doi:10.1016/S0304-3975(99)00073-0
Acknowledgments
We are grateful to Meltem Sönmez Turan for many discussions on the subject of this work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Joan Boyar is partially supported by the Danish Council for Independent Research, Natural Sciences. Part of this work was done while visiting the University of Waterloo.
Most of this work was done while Magnus Gausdal Find was at the Department of Mathematics and Computer Science, University of Southern Denmark. Part of this work was done while he was visiting the University of Toronto.
Parts of this work appeared in [2].
Rights and permissions
About this article
Cite this article
Boyar, J., Find, M.G. & Peralta, R. On various nonlinearity measures for boolean functions. Cryptogr. Commun. 8, 313–330 (2016). https://doi.org/10.1007/s12095-015-0150-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-015-0150-9
Keywords
- Boolean functions
- Nonlinearity
- Multiplicative complexity
- Algebraic degree
- Annihilator immunity
- Thickness
- Normality
- Collision-free