Skip to main content
Log in

Covering Sequences of Boolean Functions and Their Cryptographic Significance

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

We introduce the notion of covering sequence of a Boolean function, related to the derivatives of the function. We give complete characterizations of balancedness, correlation immunity and resiliency of Boolean functions by means of their covering sequences. By considering particular covering sequences, we define subclasses of (correlation-immune) resilient functions. We derive upper bounds on their algebraic degrees and on their nonlinearities. We give constructions of resilient functions belonging to these classes. We show that they achieve the best known trade-off between order of resiliency, nonlinearity and algebraic degree.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J. Bierbrauer, K. Gopalakrishnan and D. R. Stinson, Bounds for resilient functions and orthogonal arrays, Advances in Cryptology, CRYPTO '94, Lecture Notes in Computer Sciences, Springer-Verlag, 839 (1994) pp. 247–256.

  2. E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol. 4, No.1 (1991) pp. 3–72.

    Google Scholar 

  3. R. A. Brualdi, N. Cai and V. S. Pless, Orphan structure of the first-order Reed-Muller codes, Discrete Mathematics, Vol. 102 (1992) pp. 239–247.

    Google Scholar 

  4. P. Camion and A. Canteaut, Construction of t-resilient functions over a finite alphabet, Advanced in Cryptology, Eurocrypt '96, Lecture Notes in Computer Sciences, Vol. 1070 (1996) pp. 283–293.

  5. P. Camion and A. Canteaut, Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations, In (N. Koblitz, ed.), Advances in Cryptology—CRYPTO '96, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag (1996) pp. 372–386.

  6. P. Camion, C. Carlet, P. Charpin and N. Sendrier,On correlation-immune functions, Advances in Cryptology: Crypto '91, Proceedings, Lecture Notes in Computer Science, Vol. 576 (1991) pp. 86–100.

  7. A. Canteaut, C. Carlet, P. Charpin and C. Fontaine, Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions, Advances in Cryptology—EUROCRYPT '2000, Lecture Notes in Computer Science, LNCS 1807 (2000) pp. 507–522.

  8. C. Carlet, Generalized partial spreads, IEEE Transactions on Information Theory, Vol. 41, No.5, (1995) pp. 1482–1487.

    Google Scholar 

  9. C. Carlet and P. Guillot, A new representation of Boolean functions, Proceedings of AAECC '13, LNCS 1719 (1999) pp. 94–103.

  10. S. Chee, S. Lee, D. Lee and S. Hak Sung, On the correlation immune functions and their nonlinearity, Advances in Cryptology—Asiacrypt '96, Lecture Notes in Computer Science, Vol. 1163 (1996) pp. 232–243.

  11. B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich and R. Smolensky, The bit extraction problem or t-resilient functions, IEEE Symposium on Foundations of Computer Science, Vol. 26 (1985) pp. 396–407.

    Google Scholar 

  12. B. Courteau and A. Montpetit, Dual distances of completely regular codes, Discrete Mathematics, Vol. 89 (1991) pp. 7–15.

    Google Scholar 

  13. Ph. Delsarte, Four fundamental parameters of a code and their combinatorial significance, Information and Control, Vol. 23, No.5 (1973) pp. 407–438.

    Google Scholar 

  14. J. F. Dillon, Elementary Hadamard Difference Sets, Ph.D. Thesis, Univ. of Maryland (1974).

  15. H. Dobbertin, Construction of bent functions and balanced Boolean functions with high nonlinearity, In (B. Preneel, ed.), Fast Software Encryption, Lecture Notes in Computer Sciences, Vol. 1008 (1994) pp. 61–74.

  16. E. Filiol and C. Fontaine, Highly nonlinear balanced Boolean functions with a good correlation immunity, Advances in Cryptology—Eurocrypt '98, Helsinki, Finland, Lecture Notes in Computer Sciences, Vol. 1403 (1998) pp. 475–488.

  17. F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam (1977).

    Google Scholar 

  18. S. Maitra and P. Sarkar, Highly nonlinear resilient functions optimizing Siegenthaler's inequality, Advances in Cryptology—Crypto '99, Lecture Notes in Computer Science, Vol. 1666 (1999) pp. 198–215.

  19. S. Maitra and P. Sarkar, Construction of nonlinear Boolean functions with important cryptographic properties, Advances in Cryptology—Eurocrypt '2000, Lecture Notes in Computer Science, Vol. 1807 (2000) pp. 491–512.

  20. S. Maitra and P. Sarkar, Nonlinearity bounds and constructions of resilient Boolean functions, In (Mihir Bellare, ed.), Advances in Cryptology—CRYPTO '2000, LNCS, Vol. 1880 (2000) pp. 515–532.

  21. N. J. Patterson and D. H. Wiedemann, The covering radius of the [215 , 16] Reed–Muller code is at least 16276, IEEE Transactions on Information Theory, Vol. 29, No.3 (1983) pp. 354–356.

    Google Scholar 

  22. N. J. Patterson and D. H. Wiedemann, Correction to [21], IEEE Transactions on Information Theory, Vol. 36, No.2 (1990) p. 443.

    Google Scholar 

  23. B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts and J. Vandevalle, Propagation characteristics of Boolean functions, Advances in Cryptology, EUROCRYPT '90,Lecture Notes in Computer Sciences, Vol. 473, Springer-Verlag, (1991) pp. 161–173.

  24. O. S. Rothaus, On bent functions, J. Comb. Theory, Vol. 20A (1976) pp. 300–305.

    Google Scholar 

  25. M. Schneider, A note on the construction and upper bounds of correlation-immune functions, 6th IMA International Conference, Cirencester, UK, Dec. 1997, Proceedings, Lecture Notes in Computer Science, Vol. 1355 (1997) pp. 295–306.

  26. C. P. Schnorr and S. Vaudenay, Black box cryptanalysis of hash networks based on multipermutations, Advances in Cryptology, EUROCRYPT '94, Lecture Notes in Computer Science, Vol. 950, Springer-Verlag (1995) pp. 47–57.

  27. C. E. Shannon. Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28 (1949) pp. 656–715.

    Google Scholar 

  28. T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Transactions on Information theory, Vol. IT-30, No.5 (1984) pp. 776–780.

    Google Scholar 

  29. T. Siegenthaler, Decrypting a class of stream ciphers using ciphertext only, IEEE Transactions on Computer, Vol. C-34, No.1 (1985) pp. 81–85.

    Google Scholar 

  30. H.-U. Simon, A tight Ω (log log n)-bound on the time for parallel RAM's to compute nondegenerated Boolean functions, FCT '83, Lecture Notes in Computer Science, Vol. 158 (1984) pp. 439–444.

  31. I. Wegener, The Complexity of Boolean Functions, Stuttgart, B. G. Teubner, Chichester, JohnWiley & Sons (1987).

    Google Scholar 

  32. X. Guo-Zhen and J. L. Massey, A spectral characterization of correlation-immune combining functions, IEEE Trans. Inf. Theory, Vol. IT 34, No.3 (1988) pp. 569–571.

    Google Scholar 

  33. Yu. Tarannikov, On resilient Boolean functions with maximal possible nonlinearity, Cryptology ePrint archive (http://eprint.iacr.org/), Report 2000/005 (2000), 18 pp.; Proceedings of Indocrypt 2000, Lecture Notes in Computer Science, Vol. 1977, Springer-Verlag (2000) pp. 19–30.

  34. Y. Zheng and X.-M. Zhang, Improved upper bound on nonlinearity of high order correlation immune functions, to appear in Selected Areas in Cryptography, 7th annual international workshop, SAC 2000, Lecture Notes in Computer Science, Springer-Verlag (2001). (Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptography (SAC 2000), pp. 258–269, 2000.)

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Carlet, C., Tarannikov, Y. Covering Sequences of Boolean Functions and Their Cryptographic Significance. Designs, Codes and Cryptography 25, 263–279 (2002). https://doi.org/10.1023/A:1014935513734

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1014935513734

Navigation