Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- 264 Downloads
- 24 Citations
Abstract
We survey the properties of two parameters introduced by C. Ding and the author for quantifying the balancedness of vectorial functions and of their derivatives. We give new results on the distribution of the values of the first parameter when applied to F + L, where F is a fixed function and L ranges over the set of linear functions: we show an upper bound on the nonlinearity of F by means of these values, we determine then the mean of these values and we show that their maximum is a nonlinearity parameter as well, we prove that the variance of these values is directly related to the second parameter. We briefly recall the known constructions of bent vectorial functions and introduce two new classes obtained with Gregor Leander. We show that bent functions can be used to build APN functions by concatenating the outputs of a bent (n, n/2)-function and of some other (n, n/2)-function. We obtain this way a general infinite class of quadratic APN functions. We show that this class contains the APN trinomials and hexanomials introduced in 2008 by L. Budaghyan and the author, and a class of APN functions introduced, in 2008 also, by Bracken et al.; this gives an explanation of the APNness of these functions and allows generalizing them. We also obtain this way the recently found Edel–Pott cubic function. We exhibit a large number of other sub-classes of APN functions. We eventually design with this same method classes of quadratic and non-quadratic differentially 4-uniform functions.
Keywords
Substitution boxes Block ciphers NonlinearityMathematics Subject Classification (2000)
11T71 06E30Preview
Unable to display preview. Download preview PDF.
References
- 1.Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)MathSciNetCrossRefMATHGoogle Scholar
- 2.Bracken C., Byrne E., Markin N., McGuire G.: Determining the nonlinearity of a new family of APN functions. In: Proceedings of AAECC-17 Conference. Lecture Notes in Computer Science, vol. 4851, pp. 72–79. Versaille, France (2007).Google Scholar
- 3.Bracken C., Byrne E., Markin N., McGuire G.: A few more quadratic APN functions. arXiv:0804.4799v1 (2007).Google Scholar
- 4.Bracken C., Byrne E., Markin N., McGuire G.: New families of quadratic almost perfect nonlinear trinomials and multinomials. Finite Fields Appl. 14, 703–714 (2008)MathSciNetCrossRefMATHGoogle Scholar
- 5.Bracken C., Leander G.: New families of functions with differential uniformity of 4. In: Proceedings of the Conference BFCA 2008, Copenhagen (2008). http://www.liafa.jussieu.fr/bfca.
- 6.Brinkmann M., Leander G.: On the classification of APN functions up to dimension five. Des. Codes Cryptogr. 49(1–3), 273–288 (2008). Revised and extended version of a paper with the same title in the Proceedings of the Workshop on Coding and Cryptography WCC 2007, pp. 39–48 (2007).Google Scholar
- 7.Browning K., Dillon J.F., Kibler R.E., McQuistan M.: APN polynomials and related codes. Special volume of J. Comb. Inf. Syst. Sci. 34 (1–4), 135–159 (2008). Honoring the 75-th birthday of Prof. D.K.Ray-Chaudhuri.Google Scholar
- 8.Budaghyan L., Carlet C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inform. Theory 54(5), 2354–2357 (2008)MathSciNetCrossRefMATHGoogle Scholar
- 9.Budaghyan L., Carlet C.: On CCZ-equivalence and its use in secondary constructions of bent functions. In: Proceedings of WCC (2009).Google Scholar
- 10.Budaghyan L., Carlet C., Pott A.: New classes of almost bent and almost perfect nonlinear polynomials. In: Proceedings of the Workshop on Coding and Cryptography 2005, Bergen. pp. 306–315 (2005).Google Scholar
- 11.Budaghyan L., Carlet C., Leander G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inform. Theory 54(9), 4218–4229 (2008)MathSciNetCrossRefMATHGoogle Scholar
- 12.Budaghyan L., Carlet C., Leander G.: Constructing new APN functions from known ones. Finite Fields Appl. 15(2), 150–159 (2009)MathSciNetCrossRefMATHGoogle Scholar
- 13.Carlet C.: Boolean models and methods in mathematics, computer science, and engineering. In: Crama Y., Hammer P.L. (eds.) Boolean Functions for Cryptography and Error Correcting Codes. Cambridge University Press, pp. 257–397 (2010).Google Scholar
- 14.Carlet, C.: Monography Boolean methods and models. In: Crama Y., Hammer P. (eds.) Vectorial Boolean Functions for Cryptography. Cambridge University Press, Cambridge (2009) http://www-rocq.inria.fr/codes/Claude.Carlet/pubs.html.
- 15.Carlet C., Ding C.: Nonlinearities of S-boxes. Finite Fields Appl. 13(1), 121–135 (2007)MathSciNetCrossRefMATHGoogle Scholar
- 16.Carlet C., Mesnager S.: On the construction of bent vectorial functions. Special issue of the Int. J. Inf. Coding Theory (IJICoT). 1(2), 133–148 (2010). Dedicated to Vera Pless.Google Scholar
- 17.Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125–156 (1998)MathSciNetCrossRefMATHGoogle Scholar
- 18.Chabaud F., Vaudenay S.: Links between differential and linear cryptanalysis. In: Proceedings of EUROCRYPT’94, Perugia, Italy. Lecture Notes in Computer Science, vol. 950, pp. 356–365 (1995).Google Scholar
- 19.Dillon J.: A survey of bent functions. NSA Tech. J. (Special issue) 191–215 (1972).Google Scholar
- 20.Dillon J.F.: Elementary Hadamard Difference sets. Ph.D. Thesis, University of Maryland (1974).Google Scholar
- 21.Edel Y., Pott A.: A new almost perfect nonlinear function which is not quadratic. 3, 59–81 (2009)MathSciNetMATHGoogle Scholar
- 22.Edel Y., Kyureghyan G., Pott A.: A new APN function which is not equivalent to a power mapping. IEEE Trans. Inform. Theory 52(2), 744–747 (2006)MathSciNetCrossRefGoogle Scholar
- 23.Leander G.: Monomial bent functions. In: Proceedings of the Workshop on Coding and Cryptography 2005, Bergen, pp. 462–470 (2005) and IEEE Trans. Inform. Theory 52(2), 738–743 (2006).Google Scholar
- 24.Lidl R., Niederreiter H.: Finite Fields, Encyclopedia of Mathematics and its Applications, vol. 20. Addison-Wesley, Reading, MA (1983).Google Scholar
- 25.Matsui M.: Linear cryptanalysis method for DES cipher. In: Proceedings of EUROCRYPT’93, Loftus, Norway. Lecture Notes in Computer Science, vol. 765, pp. 386–397 (1994).Google Scholar
- 26.Nakagawa N., Yoshiara S.: A construction of differentially 4-uniform functions from commutative semifields of characteristic 2. In: Proceedings of the International Workshop on the Arithmetic of Finite Fields, WAIFI 2007, Madrid, Spain. Lecture Notes in Computer Science, vol. 4547, pp. 134–146 (2007).Google Scholar
- 27.Nyberg K.: Perfect non-linear S-boxes. In: Proceedings of EUROCRYPT’ 91. Lecture Notes in Computer Science vol. 547, pp. 378–386 (1992).Google Scholar
- 28.Nyberg K.: On the construction of highly nonlinear permutations. In: Proceedings of EUROCRYPT’ 92, Balatonfured, Hungary. Lecture Notes in Computer Science, vol. 658, pp. 92–98 (1993).Google Scholar
- 29.Nyberg K.: New bent mappings suitable for fast implementation. In: Proceedings of Fast Software Encryption 1993, Cambridge, UK. Lecture Notes in Computer Science, vol. 809, pp. 179–184 (1994).Google Scholar
- 30.Nyberg K.: Differentially uniform mappings for cryptography. In: Proceedings of EUROCRYPT’ 93, Loftus, Norway. Lecture Notes in Computer Science, vol. 765, pp. 55–64 (1994).Google Scholar
- 31.Sidelnikov V.M.: On the mutual correlation of sequences. Soviet Math. Dokl. 12, 197–201 (1971)Google Scholar
- 32.Yoshiara S.: Dimensional dual hyperovals associated with quadratic APN functions. Innov. Inciden. Geom. 8, 147–169 (2008)MathSciNetMATHGoogle Scholar