Skip to main content

On the Secondary Constructions of Resilient and Bent Functions

  • Conference paper
Coding, Cryptography and Combinatorics

Part of the book series: Progress in Computer Science and Applied Logic ((PCS,volume 23))

Abstract

We first give a survey of the known secondary constructions of Boolean functions, permitting to obtain resilient functions achieving the best possible trade-offs between resiliency order, algebraic degree and nonlinearity (that is, achieving Siegenthaler’s bound and Sarkar et al.’s bound). We introduce then, and we study, a general secondary construction of Boolean functions. This construction includes as particular cases the known secondary constructions previously recalled. We apply this construction to design more numerous functions achieving optimum trade-offs between the three characteristics (and additionally having no linear structure). We conclude the paper by indicating generalizations of our construction to Boolean and vectorial functions, and by relating it to a known secondary construction of bent functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Camion, C. Carlet, P. Charpin, N. Sendrier. On correlation-immune functions. Advances in Cryptology: Crypto ‘81 Proceedings Lecture Notes in Computer Science V. 576, pp. 86–100, 1991.

    Google Scholar 

  2. A. Canteaut and M. Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5 Advanced in Cryptology-EUROCRYPT 2000. Lecture Notes in Computer Science 1807, pp. 573–588, 2000.

    Article  Google Scholar 

  3. C. Carlet. A construction of bent functions. Finite Fields and Applications London Mathematical Society Lecture Series 233, Cambridge University Press, pp. 47–58, 1996.

    Google Scholar 

  4. C. Carlet. More correlation-immune and resilient functions over Galois fields and Galois rings. Advances in Cryptology EUROCRYPT’ 97 Lecture Notes in Computer Science 1233, Springer Verlag, pp. 422–433, 1997.

    Google Scholar 

  5. C. Carlet. On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions. Proceedings of SETA ‘01 (Sequences and their Applications 2001), Discrete Mathematics and Theoretical Computer Science, Springer, pp. 131–144, 2001.

    Google Scholar 

  6. C. Carlet. A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction. Advances in Cryptology - CRYPTO 2002 Lecture Notes in Computer Science 2442, pp. 549564, 2002.

    Article  MathSciNet  Google Scholar 

  7. C. Carlet and E. Prouff. On plateaued functions and their constructions. Proceedings of Fast Software Encryption 2003, Advances in Cryptology, Lecture Notes in Computer Scienc e 2887, pp. 54–73, Springer 2003.

    Article  Google Scholar 

  8. C. Carlet and P. Sarkar. Spectral domain analysis of correlation immune and resilient Boolean functions. Finite Fields and Applications 8, pp. 120–130, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  9. F. Chabaud and S. Vaudenay (1995). Links between differential and linear cryptanalysis. EUROCRYPT’94 Advances in Cryptology Lecture Notes in Computer Science 950, Springer Verlag, 356–365.

    Google Scholar 

  10. S. Chee, S. Lee, K. Kim and D. Kim. Correlation immune functions with controlable nonlinearity. ETRI Journal vol 19, no 4, pp. 389–401, 1997.

    Article  Google Scholar 

  11. S. Chee, S. Lee, D. Lee and S.H. Sung. On the correlation immune functions and their nonlinearity. Proceedings of Asiacrypt’96,LNCS 1163, pp. 232–243.

    Google Scholar 

  12. J.F. Dillon. Elementary Hadamard Difference sets. Ph. D. Thesis, Univ. of Maryland, 1974.

    Google Scholar 

  13. J.H. Evertse. Linear structures in block ciphers. In Advances in Cryptology - EUROCRYPT’ 87 no. 304 in Lecture Notes in Computer Science, Springer Verlag, pp. 249–266, 1988.

    Google Scholar 

  14. T. Jakobsen and L.R. Knudsen. The interpolation attack on block ciphers. Fast Software Encryption’97 Lecture Notes in Computer Science 1267, pp. 28–40, 1997.

    Article  Google Scholar 

  15. L.R. Knudsen. Truncated and higher order differentials. Fast Software Encryption Second International Workshop Lecture Notes in Computer Science, n 1008. pp. 196–211. - Springer Verlag, 1995.

    Google Scholar 

  16. X. Lai. Higher order derivatives and differential cryptanalysis. Proc. Symposium on Communication Coding and Cryptography in honor of J.L. Massey on the occasion of his 60’th birthday. R. Blahut, editor. Kluwer Academic Publishers, 1994.

    Google Scholar 

  17. S. Leveiller, G. Zemor, P. Guillot and J. Boutros. A new cryptanalytic attack for PN-generators filtered by a Boolean function. Proceedings of Selected Areas of Cryptography 2002 LNCS 2595, pp. 232–249 (2003).

    MathSciNet  Google Scholar 

  18. F.J. MacWilliams and N.J. Sloane. The Theory of Error-Correcting Codes Amsterdam, North Holland, 1977.

    MATH  Google Scholar 

  19. S. Maitra and E. Pasalic. Further constructions of resilient Boolean functions with very high nonlinearity. IEEE Transactions on Information Theory vol. 48 (7), pp. 1825–1834, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  20. S. Maitra and P. Sarkar. Modifications of Patterson-Wiedemann functions for cryptographic applications. IEEE Trans. Inform. Theory Vol. 48, pp. 278–284, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  21. M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology - EUROCRYPT’93 number 765 in Lecture Notes in Computer Science. Springer Verlag, pp. 386–397, 1994.

    Google Scholar 

  22. N.J. Patterson and D.H. Wiedemann. The covering radius of the [21s16] Reed-Muller code is at least 16276. IEEE Trans. Inform. Theory IT-29, pp. 354–356, 1983.

    Google Scholar 

  23. N.J. Patterson and D.H. Wiedemann. Correction to [22]. IEEE Trans. Inform. Theory IT-36(2), pp. 443, 1990.

    Google Scholar 

  24. E. Pasalic, S. Maitra, T. Johansson and P. Sarkar. New constructions of resilient functions and correlation immune Boolean functions achieving upper bound on non-linearity. Proceedings of the Workshop on Coding and Cryptography 2001, pp. 425434, 2001.

    Google Scholar 

  25. O.S. Rothaus. On bent functions. J. Comb. Theory 20A, 300–305, 1976.

    Article  MathSciNet  Google Scholar 

  26. R.A. Rueppel. Analysis and Design of Stream Ciphers Com. and Contr. Eng. Series, Springer, Berlin, 1986.

    Google Scholar 

  27. P. Sarkar and S. Maitra. Construction of nonlinear Boolean functions with important cryptographic properties. Advances in Cryptology - EUROCRYPT 2000 number 1807 in Lecture Notes in Computer Science, pp. 485–506. Springer Verlag, 2000.

    Google Scholar 

  28. P. Sarkar and S. Maitra. Nonlinearity bounds and constructions of resilient Boolean functions. CRYPTO 2000 LNCS Vol. 1880, ed. Mihir Bellare, pp. 515–532, 2000.

    Google Scholar 

  29. T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information theory V. IT-30, No. 5, pp. 776–780, 1984.

    MathSciNet  Google Scholar 

  30. T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computer V. C-34 No. 1, pp. 81–85, 1985.

    Article  Google Scholar 

  31. Y.V. Tarannikov On resilient Boolean functions with maximum possible nonlinearity. Proceedings of INDOCRYPT 2000 Lecture Notes in Computer Science 1977, pp. 19–30, 2000.

    Article  MathSciNet  Google Scholar 

  32. Y.V. Tarannikov. New constructions of resilient Boolean functions with maximum nonlinearity. Proceedings of FSE 2001 8th International Workshop, FSE 2001, Lecture Notes in Computer Science, vol. 2355, pp. 66–77, 2001.

    Article  Google Scholar 

  33. G.-Z. Xiao and J.L. Massey. A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory Vol IT 34, n° 3, pp. 569–571, 1988.

    MathSciNet  Google Scholar 

  34. G.-Z. Xiao, C. Ding and W. Shan. The Stability Theory of Stream Ciphers vol. LNCS 561, Springer Verlag, 1991.

    Google Scholar 

  35. Y. Zheng, X.-M. Zhang. Improving upper bound on the nonlinearity of high order correlation immune functions. Proceedings of Selected Areas in Cryptography 2000 Lecture Notes in Computer Science 2012, pp. 262–274, 2001.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Basel AG

About this paper

Cite this paper

Carlet, C. (2004). On the Secondary Constructions of Resilient and Bent Functions. In: Feng, K., Niederreiter, H., Xing, C. (eds) Coding, Cryptography and Combinatorics. Progress in Computer Science and Applied Logic, vol 23. Birkhäuser, Basel. https://doi.org/10.1007/978-3-0348-7865-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-0348-7865-4_1

  • Publisher Name: Birkhäuser, Basel

  • Print ISBN: 978-3-0348-9602-3

  • Online ISBN: 978-3-0348-7865-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics