Abstract
We introduce the notion of covering sequence of a Boolean function, related to the derivatives of the function. We give complete characterizations of balancedness, correlation immunity and resiliency of Boolean functions by means of their covering sequences. By considering particular covering sequences, we define subclasses of (correlation-immune) resilient functions. We derive upper bounds on their algebraic degrees and on their nonlinearities. We give constructions of resilient functions belonging to these classes. We show that they achieve the best known trade-off between order of resiliency, nonlinearity and algebraic degree.
Similar content being viewed by others
References
J. Bierbrauer, K. Gopalakrishnan and D. R. Stinson, Bounds for resilient functions and orthogonal arrays, Advances in Cryptology, CRYPTO '94, Lecture Notes in Computer Sciences, Springer-Verlag, 839 (1994) pp. 247–256.
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol. 4, No.1 (1991) pp. 3–72.
R. A. Brualdi, N. Cai and V. S. Pless, Orphan structure of the first-order Reed-Muller codes, Discrete Mathematics, Vol. 102 (1992) pp. 239–247.
P. Camion and A. Canteaut, Construction of t-resilient functions over a finite alphabet, Advanced in Cryptology, Eurocrypt '96, Lecture Notes in Computer Sciences, Vol. 1070 (1996) pp. 283–293.
P. Camion and A. Canteaut, Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations, In (N. Koblitz, ed.), Advances in Cryptology—CRYPTO '96, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag (1996) pp. 372–386.
P. Camion, C. Carlet, P. Charpin and N. Sendrier,On correlation-immune functions, Advances in Cryptology: Crypto '91, Proceedings, Lecture Notes in Computer Science, Vol. 576 (1991) pp. 86–100.
A. Canteaut, C. Carlet, P. Charpin and C. Fontaine, Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions, Advances in Cryptology—EUROCRYPT '2000, Lecture Notes in Computer Science, LNCS 1807 (2000) pp. 507–522.
C. Carlet, Generalized partial spreads, IEEE Transactions on Information Theory, Vol. 41, No.5, (1995) pp. 1482–1487.
C. Carlet and P. Guillot, A new representation of Boolean functions, Proceedings of AAECC '13, LNCS 1719 (1999) pp. 94–103.
S. Chee, S. Lee, D. Lee and S. Hak Sung, On the correlation immune functions and their nonlinearity, Advances in Cryptology—Asiacrypt '96, Lecture Notes in Computer Science, Vol. 1163 (1996) pp. 232–243.
B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich and R. Smolensky, The bit extraction problem or t-resilient functions, IEEE Symposium on Foundations of Computer Science, Vol. 26 (1985) pp. 396–407.
B. Courteau and A. Montpetit, Dual distances of completely regular codes, Discrete Mathematics, Vol. 89 (1991) pp. 7–15.
Ph. Delsarte, Four fundamental parameters of a code and their combinatorial significance, Information and Control, Vol. 23, No.5 (1973) pp. 407–438.
J. F. Dillon, Elementary Hadamard Difference Sets, Ph.D. Thesis, Univ. of Maryland (1974).
H. Dobbertin, Construction of bent functions and balanced Boolean functions with high nonlinearity, In (B. Preneel, ed.), Fast Software Encryption, Lecture Notes in Computer Sciences, Vol. 1008 (1994) pp. 61–74.
E. Filiol and C. Fontaine, Highly nonlinear balanced Boolean functions with a good correlation immunity, Advances in Cryptology—Eurocrypt '98, Helsinki, Finland, Lecture Notes in Computer Sciences, Vol. 1403 (1998) pp. 475–488.
F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam (1977).
S. Maitra and P. Sarkar, Highly nonlinear resilient functions optimizing Siegenthaler's inequality, Advances in Cryptology—Crypto '99, Lecture Notes in Computer Science, Vol. 1666 (1999) pp. 198–215.
S. Maitra and P. Sarkar, Construction of nonlinear Boolean functions with important cryptographic properties, Advances in Cryptology—Eurocrypt '2000, Lecture Notes in Computer Science, Vol. 1807 (2000) pp. 491–512.
S. Maitra and P. Sarkar, Nonlinearity bounds and constructions of resilient Boolean functions, In (Mihir Bellare, ed.), Advances in Cryptology—CRYPTO '2000, LNCS, Vol. 1880 (2000) pp. 515–532.
N. J. Patterson and D. H. Wiedemann, The covering radius of the [215 , 16] Reed–Muller code is at least 16276, IEEE Transactions on Information Theory, Vol. 29, No.3 (1983) pp. 354–356.
N. J. Patterson and D. H. Wiedemann, Correction to [21], IEEE Transactions on Information Theory, Vol. 36, No.2 (1990) p. 443.
B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts and J. Vandevalle, Propagation characteristics of Boolean functions, Advances in Cryptology, EUROCRYPT '90,Lecture Notes in Computer Sciences, Vol. 473, Springer-Verlag, (1991) pp. 161–173.
O. S. Rothaus, On bent functions, J. Comb. Theory, Vol. 20A (1976) pp. 300–305.
M. Schneider, A note on the construction and upper bounds of correlation-immune functions, 6th IMA International Conference, Cirencester, UK, Dec. 1997, Proceedings, Lecture Notes in Computer Science, Vol. 1355 (1997) pp. 295–306.
C. P. Schnorr and S. Vaudenay, Black box cryptanalysis of hash networks based on multipermutations, Advances in Cryptology, EUROCRYPT '94, Lecture Notes in Computer Science, Vol. 950, Springer-Verlag (1995) pp. 47–57.
C. E. Shannon. Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28 (1949) pp. 656–715.
T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Transactions on Information theory, Vol. IT-30, No.5 (1984) pp. 776–780.
T. Siegenthaler, Decrypting a class of stream ciphers using ciphertext only, IEEE Transactions on Computer, Vol. C-34, No.1 (1985) pp. 81–85.
H.-U. Simon, A tight Ω (log log n)-bound on the time for parallel RAM's to compute nondegenerated Boolean functions, FCT '83, Lecture Notes in Computer Science, Vol. 158 (1984) pp. 439–444.
I. Wegener, The Complexity of Boolean Functions, Stuttgart, B. G. Teubner, Chichester, JohnWiley & Sons (1987).
X. Guo-Zhen and J. L. Massey, A spectral characterization of correlation-immune combining functions, IEEE Trans. Inf. Theory, Vol. IT 34, No.3 (1988) pp. 569–571.
Yu. Tarannikov, On resilient Boolean functions with maximal possible nonlinearity, Cryptology ePrint archive (http://eprint.iacr.org/), Report 2000/005 (2000), 18 pp.; Proceedings of Indocrypt 2000, Lecture Notes in Computer Science, Vol. 1977, Springer-Verlag (2000) pp. 19–30.
Y. Zheng and X.-M. Zhang, Improved upper bound on nonlinearity of high order correlation immune functions, to appear in Selected Areas in Cryptography, 7th annual international workshop, SAC 2000, Lecture Notes in Computer Science, Springer-Verlag (2001). (Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptography (SAC 2000), pp. 258–269, 2000.)
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Carlet, C., Tarannikov, Y. Covering Sequences of Boolean Functions and Their Cryptographic Significance. Designs, Codes and Cryptography 25, 263–279 (2002). https://doi.org/10.1023/A:1014935513734
Issue Date:
DOI: https://doi.org/10.1023/A:1014935513734