Abstract
We first give a survey of the known secondary constructions of Boolean functions, permitting to obtain resilient functions achieving the best possible trade-offs between resiliency order, algebraic degree and nonlinearity (that is, achieving Siegenthaler’s bound and Sarkar et al.’s bound). We introduce then, and we study, a general secondary construction of Boolean functions. This construction includes as particular cases the known secondary constructions previously recalled. We apply this construction to design more numerous functions achieving optimum trade-offs between the three characteristics (and additionally having no linear structure). We conclude the paper by indicating generalizations of our construction to Boolean and vectorial functions, and by relating it to a known secondary construction of bent functions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
P. Camion, C. Carlet, P. Charpin, N. Sendrier. On correlation-immune functions. Advances in Cryptology: Crypto ‘81 Proceedings Lecture Notes in Computer Science V. 576, pp. 86–100, 1991.
A. Canteaut and M. Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5 Advanced in Cryptology-EUROCRYPT 2000. Lecture Notes in Computer Science 1807, pp. 573–588, 2000.
C. Carlet. A construction of bent functions. Finite Fields and Applications London Mathematical Society Lecture Series 233, Cambridge University Press, pp. 47–58, 1996.
C. Carlet. More correlation-immune and resilient functions over Galois fields and Galois rings. Advances in Cryptology EUROCRYPT’ 97 Lecture Notes in Computer Science 1233, Springer Verlag, pp. 422–433, 1997.
C. Carlet. On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions. Proceedings of SETA ‘01 (Sequences and their Applications 2001), Discrete Mathematics and Theoretical Computer Science, Springer, pp. 131–144, 2001.
C. Carlet. A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction. Advances in Cryptology - CRYPTO 2002 Lecture Notes in Computer Science 2442, pp. 549564, 2002.
C. Carlet and E. Prouff. On plateaued functions and their constructions. Proceedings of Fast Software Encryption 2003, Advances in Cryptology, Lecture Notes in Computer Scienc e 2887, pp. 54–73, Springer 2003.
C. Carlet and P. Sarkar. Spectral domain analysis of correlation immune and resilient Boolean functions. Finite Fields and Applications 8, pp. 120–130, 2002.
F. Chabaud and S. Vaudenay (1995). Links between differential and linear cryptanalysis. EUROCRYPT’94 Advances in Cryptology Lecture Notes in Computer Science 950, Springer Verlag, 356–365.
S. Chee, S. Lee, K. Kim and D. Kim. Correlation immune functions with controlable nonlinearity. ETRI Journal vol 19, no 4, pp. 389–401, 1997.
S. Chee, S. Lee, D. Lee and S.H. Sung. On the correlation immune functions and their nonlinearity. Proceedings of Asiacrypt’96,LNCS 1163, pp. 232–243.
J.F. Dillon. Elementary Hadamard Difference sets. Ph. D. Thesis, Univ. of Maryland, 1974.
J.H. Evertse. Linear structures in block ciphers. In Advances in Cryptology - EUROCRYPT’ 87 no. 304 in Lecture Notes in Computer Science, Springer Verlag, pp. 249–266, 1988.
T. Jakobsen and L.R. Knudsen. The interpolation attack on block ciphers. Fast Software Encryption’97 Lecture Notes in Computer Science 1267, pp. 28–40, 1997.
L.R. Knudsen. Truncated and higher order differentials. Fast Software Encryption Second International Workshop Lecture Notes in Computer Science, n 1008. pp. 196–211. - Springer Verlag, 1995.
X. Lai. Higher order derivatives and differential cryptanalysis. Proc. Symposium on Communication Coding and Cryptography in honor of J.L. Massey on the occasion of his 60’th birthday. R. Blahut, editor. Kluwer Academic Publishers, 1994.
S. Leveiller, G. Zemor, P. Guillot and J. Boutros. A new cryptanalytic attack for PN-generators filtered by a Boolean function. Proceedings of Selected Areas of Cryptography 2002 LNCS 2595, pp. 232–249 (2003).
F.J. MacWilliams and N.J. Sloane. The Theory of Error-Correcting Codes Amsterdam, North Holland, 1977.
S. Maitra and E. Pasalic. Further constructions of resilient Boolean functions with very high nonlinearity. IEEE Transactions on Information Theory vol. 48 (7), pp. 1825–1834, 2002.
S. Maitra and P. Sarkar. Modifications of Patterson-Wiedemann functions for cryptographic applications. IEEE Trans. Inform. Theory Vol. 48, pp. 278–284, 2002.
M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology - EUROCRYPT’93 number 765 in Lecture Notes in Computer Science. Springer Verlag, pp. 386–397, 1994.
N.J. Patterson and D.H. Wiedemann. The covering radius of the [21s16] Reed-Muller code is at least 16276. IEEE Trans. Inform. Theory IT-29, pp. 354–356, 1983.
N.J. Patterson and D.H. Wiedemann. Correction to [22]. IEEE Trans. Inform. Theory IT-36(2), pp. 443, 1990.
E. Pasalic, S. Maitra, T. Johansson and P. Sarkar. New constructions of resilient functions and correlation immune Boolean functions achieving upper bound on non-linearity. Proceedings of the Workshop on Coding and Cryptography 2001, pp. 425434, 2001.
O.S. Rothaus. On bent functions. J. Comb. Theory 20A, 300–305, 1976.
R.A. Rueppel. Analysis and Design of Stream Ciphers Com. and Contr. Eng. Series, Springer, Berlin, 1986.
P. Sarkar and S. Maitra. Construction of nonlinear Boolean functions with important cryptographic properties. Advances in Cryptology - EUROCRYPT 2000 number 1807 in Lecture Notes in Computer Science, pp. 485–506. Springer Verlag, 2000.
P. Sarkar and S. Maitra. Nonlinearity bounds and constructions of resilient Boolean functions. CRYPTO 2000 LNCS Vol. 1880, ed. Mihir Bellare, pp. 515–532, 2000.
T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information theory V. IT-30, No. 5, pp. 776–780, 1984.
T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computer V. C-34 No. 1, pp. 81–85, 1985.
Y.V. Tarannikov On resilient Boolean functions with maximum possible nonlinearity. Proceedings of INDOCRYPT 2000 Lecture Notes in Computer Science 1977, pp. 19–30, 2000.
Y.V. Tarannikov. New constructions of resilient Boolean functions with maximum nonlinearity. Proceedings of FSE 2001 8th International Workshop, FSE 2001, Lecture Notes in Computer Science, vol. 2355, pp. 66–77, 2001.
G.-Z. Xiao and J.L. Massey. A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory Vol IT 34, n° 3, pp. 569–571, 1988.
G.-Z. Xiao, C. Ding and W. Shan. The Stability Theory of Stream Ciphers vol. LNCS 561, Springer Verlag, 1991.
Y. Zheng, X.-M. Zhang. Improving upper bound on the nonlinearity of high order correlation immune functions. Proceedings of Selected Areas in Cryptography 2000 Lecture Notes in Computer Science 2012, pp. 262–274, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Basel AG
About this paper
Cite this paper
Carlet, C. (2004). On the Secondary Constructions of Resilient and Bent Functions. In: Feng, K., Niederreiter, H., Xing, C. (eds) Coding, Cryptography and Combinatorics. Progress in Computer Science and Applied Logic, vol 23. Birkhäuser, Basel. https://doi.org/10.1007/978-3-0348-7865-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-0348-7865-4_1
Publisher Name: Birkhäuser, Basel
Print ISBN: 978-3-0348-9602-3
Online ISBN: 978-3-0348-7865-4
eBook Packages: Springer Book Archive