Algebraic immunity of vectorial boolean functions and boolean groebner bases
نویسندگان
چکیده
منابع مشابه
Algebraic Immunity Hierarchy of Boolean Functions
Algebraic immunity of Boolean functions is a very important concept in recently introduced algebraic attacks of stream cipher. For a n-variable Boolean function f , the algebraic immunity AIn(f) takes values in {0, 1, . . . , d2 e}. For every k in this range, denote Bn,k the set of all n-variable Boolean functions with algebraic immunity k, and we know that Bn,k is always non-empty. According t...
متن کاملVectorial Boolean Functions for Cryptography
To appear as a chapter of the volume " Boolean Methods and Models " ,
متن کاملConstructing vectorial Boolean functions with high algebraic immunity based on group decomposition
In this paper, we construct a class of vectorial Boolean functions over F2n with high algebraic immunity based on the decomposition of the multiplicative group of F2n . By viewing F2n as G1G2 ∪ {0} (where G1 and G2 are subgroups of F2n , (#G1,#G2) = 1 and #G1 × #G2 = 2 − 1), we give a generalized description for constructing vectorial Boolean functions with high algebraic immunity. Moreover, wh...
متن کاملAlgebraic Immunity of Boolean Functions Analysis and Construction
In this paper, we first analyse the method of finding algebraic immunity of a Boolean function. Given a Boolean function f on n-variables, we identify a reduced set of homogeneous linear equations by solving which one can decide whether there exist annihilators of f at a specific degree. Moreover, we analyse how an affine transformation on the input variables of f can be exploited to achieve fu...
متن کاملGeneralized Correlation Analysis of Vectorial Boolean Functions
We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those based on the usual correlation attack. In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical and Applied Cybersecurity
سال: 2020
ISSN: 2708-1397,2664-2913
DOI: 10.20535/tacs.2664-29132020.1.209431