Advertisement

Duality of Boolean functions and its cryptographic significance

  • Xian-Mo Zhang
  • Yuliang Zheng
  • Hideki Imai
Session 5: Boolean Functions and Stream Ciphers
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1334)

Abstract

Recent advances in interpolation and high order differential cryptanalysis have highlighted the cryptographic significance of Boolean functions with a high algebraic degree. However, compared with other nonlinearity criteria such propagation, resiliency, differential and linear characteristics, apparently little progress has been made in relation to algebraic degree in the context of cryptography. The aim of this work is to research into relationships between algebraic degree and other nonlinearity criteria. Making use of duality properties of Boolean functions, we have obtained several results that are related to lower bounds on nonlinearity, as well as on the number of terms, of Boolean functions. We hope that these results would stimulate the research community's interest in further exploring this important area.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    T. Jakobsen and L. Knudsen. The interpolation attack on block ciphers. In Fast Software Encryption, Lecture Notes in Computer Science, Berlin, New York, Tokyo, 1997. Springer-Verlag.Google Scholar
  2. 2.
    R. J. Lechner. Harmonic Analysis of Switching Functions. in Recent Developments in Switching Theory, cited by Amar Mukhopadhyay. Academic Press, New York, 1971.Google Scholar
  3. 3.
    F. J. MacWilliams and N. J. A. Sloane: The Theory of Error-Correcting Codes. North-Holland, Amsterdam, New York, Oxford, 1978.Google Scholar
  4. 4.
    J. Seberry, X. M. Zhang, and Y. Zheng. Nonlinearity and propagation characteristics of balanced boolean functions. Information and Computation, 119(1):1–13, 1995.CrossRefGoogle Scholar
  5. 5.
    T. Shimoyama, S. Moriai, and T. Kaneko. Cryptanalysis of the cipher KN, May 1997. (presented at the rump session of Eurocrypt'97).Google Scholar
  6. 6.
    X. M. Zhang and Y. Zheng. Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors. Design, Codes and Cryptography, 7(1/2):111–134, 1996. special issue dedicated to Gus Simmons.Google Scholar

Copyright information

© Springer-Verlag 1997

Authors and Affiliations

  • Xian-Mo Zhang
    • 1
  • Yuliang Zheng
    • 2
  • Hideki Imai
    • 3
  1. 1.The University of WollongongWollongongAustralia
  2. 2.Monash UniversityFrankston, MelbourneAustralia
  3. 3.The University of TokyoMinato-ku, TokyoJapan

Personalised recommendations