Abstract
In this paper, we introduce a new notion called the dual function for studying Boolean functions. First, we discuss general properties of the dual function that are related to resiliency and additive autocorrelation. Second, we look at preferred functions which are Boolean functions with the lowest 3-valued spectrum. We prove that if a balanced preferred function has a dual function which is also preferred, then it is resilient, has high nonlinearity and optimal additive autocorrelation. We demonstrate four such constructions of optimal Boolean functions using the Kasami, Dillon-Dobbertin, Segre hyperoval and Welch-Gong Transformation functions. Third, we compute the additive autocorrelation of some known resilient preferred functions in the literature by using the dual function. We conclude that our construction yields highly nonlinear resilient functions with better additive autocorrelation than the Maiorana-McFarland functions. We also analysed the saturated functions, which are resilient functions with optimized algebraic degree and nonlinearity. We show that their additive autocorrelation have high peak values, and they become linear when we fix very few bits. These potential weaknesses have to be considered before we deploy them in applications.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology 4 (1991)
Canteaut, A., Carlet, C., Charpin, P., Fontaine, C.: Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 507–522. Springer, Heidelberg (2000)
Carlet, C.: A Larger Class of Cryptographic Boolean Functions via a Study of the Moriana-McFarland Construction. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 549–564. Springer, Heidelberg (2002)
Carlet, C., Prouff, E.: On Plateaued Functions and their Constructions. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 54–73. Springer, Heidelberg (2003)
Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356–365. Springer, Heidelberg (1995)
Clark, J., Jacob, J., Stepney, S., Maitra, S., Millan, W.: Evolving Boolean Functions satisfying Multiple Criteria. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 246–259. Springer, Heidelberg (2002)
Dillon, J.F.: Multiplicative Difference Sets via Characters. Designs, Codes and Cryptography 17, 225–235 (1999)
Dillon, J.F., Dobbertin, H.: Cyclic Difference Sets with Singer Parameters (August 12, 1999) (preprint)
Dobbertin, H.: Kasami Power Functions, Permutation Polynomials and Cyclic Difference Sets. In: N. A. T.O.-A. S. I. Workshop: Difference Sets, Sequences and their Correlation Properties, Bad Windsheim, August 3-14 (1998)
Gold, R.: Maximal Recursive Sequences with 3-valued Cross Correlation Functions. IEEE Transactions on Information Theory 14, 154–156 (1968)
Gong, G., Youssef, A.M.: Cryptographic Properties of the Welch-Gong Transformation Sequence Generators. IEEE Trans. Inform. Theory 48(11), 2837–2846 (2002)
Helleseth, T., Kumar, P.V.: Sequences with Low Correlation, Chapter in Handbook of Coding Theory, North-Holland (1998)
Jacobsen, T., Knudsen, L.: The Interpolation Attack on Block Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)
Kasami, T.: The Weight Enumerators for several Classes of Subcodes of Second Order Binary Reed Muller Codes. Information and Control 18, 369–394 (1971)
Khoo, K., Gong, G.: New Constructions for Highly Nonlinear and Resilient Boolean Functions. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 498–509. Springer, Heidelberg (2003)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
McWilliams, F.J., Sloane, N.J.A.: Theory of Error-Correcting Codes, North- Holland, Amsterdam (1977)
Patterson, N.J., Wiedemann, D.H.: The Covering Radius of the (215, 16) Reed- Muller Code is at least 16276. IEEE Trans. Inform. Theory 29(3), 354–356 (1983)
Sarkar, P., Maitra, S.: Construction of Nonlinear Boolean Functions with Important Cryptographic Properties. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 485–506. Springer, Heidelberg (2000)
Sarkar, P., Maitra, S.: Nonlinearity Bounds and Constructions of Resilient Boolean Functions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 515–532. Springer, Heidelberg (2000)
Seberry, J., Zhang, X.M., Zheng, Y.: On Constructions and Nonlinearity of Correlation Immune Functions. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 181–199. Springer, Heidelberg (1994)
Siegenthaler, T.: Decrypting a Class of Stream Ciphers using Ciphertexts only. IEEE Transactions on Computers C34(1), 81–85 (1985)
Tarannikov, Y., Korolev, P., Botev, A.: Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 460–479. Springer, Heidelberg (2001)
Zhang, X.M., Zheng, Y.: GAC - The Criterion for Global Avalanche Criteria of Cryptographic Functions. Journal for Universal Computer Science 1(5), 316–333 (1995)
Zhang, X.M., Zheng, Y.: Autocorrelations and New Bounds on the Nonlinearity of Boolean Functions. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 294–306. Springer, Heidelberg (1996)
Zheng, Y., Zhang, X.M.: New Results on Correlation Immune Functions. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 264–274. Springer, Heidelberg (2001)
Zheng, Y., Zhang, X.M.: Relationships between Bent Functions and Complementary Plateaued Functions. In: Song, J.S. (ed.) ICISC 1999. LNCS, vol. 1787, pp. 60–75. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gong, G., Khoo, K. (2004). Additive Autocorrelation of Resilient Boolean Functions. In: Matsui, M., Zuccherato, R.J. (eds) Selected Areas in Cryptography. SAC 2003. Lecture Notes in Computer Science, vol 3006. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24654-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-24654-1_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21370-3
Online ISBN: 978-3-540-24654-1
eBook Packages: Springer Book Archive