Boolean Functions: Cryptography and Applications

نویسندگان

  • Yuriy Izbenko
  • Vladislav Kovtun
  • Alexandr Kuznetsov
چکیده

With cryptographic investigations, the design of Boolean functions is a wide area. The Boolean functions play important role in the construction of a symmetric cryptosystem. In this paper the modified hill climbing method is considered. The method allows using hill climbing techniques to modify bent functions used to design balanced, highly nonlinear Boolean functions with high algebraic degree and low autocorrelation. The experimental results of constructing the cryptographically strong Boolean functions are presented. When designing block and stream ciphers, Boolean functions play an important role and define the cryptographic strength of applications to differential and linear cryptanalysis particularly. Often the resistance of cryptosystems to known types of attacks is discussed in terms of Boolean functions used in them. A lot of attention has been given to construction of Boolean functions with desired cryptographic properties in cryptology [1–6]. The main strength criteria of Boolean functions are balancedness, high nonlinearity, high algebraic degree and low autocorrelation. There are three types of methods of constructing nonlinear Boolean functions: random generation, algebraic (or direct) and heuristic methods. Each of them has its own advantages and drawbacks. Generating nonlinear Boolean function via random generation is too difficult to find functions that possess high cryptographic 1 Nrjetix company. email: [email protected] 2 Nrjetix company. email: [email protected] 3 Nrjetix company. email: [email protected] J-F. Michon, P. Valarcher, J-B. Yunès (Eds.): BFCA’08 2 Y. IZBENKO, V. KOVTUN, A. KUZNETSOV properties due to the vast size of search space, especially for function with n > 8, where n is the space size. The attractiveness of these techniques comes out of the simplicity in their implementation. Algebraic methods allow constructing functions that have a set of desired cryptographic properties with low computation complexity, but these functions can have low algebraic complexity [4]. The heuristic methods [1–6] are the newest techniques capable of effective Boolean functions generation with desired cryptographic properties. Because of some intuitive approaches used in heuristic methods and the fact that heuristic methods are not limited by algebraic constructions, these methods can construct Boolean functions with properties that are close to the maximum attained. The core of all heuristic methods is the hill climbing method (HC) introduced in [1]. The HC method allows increasing the nonlinearity of a Boolean function, particularly of the randomly generated one. The HC method may be effectively used with genetic and simulated annealing methods. In this paper we consider a modification of the HC method, which allows constructing highly nonlinear Boolean functions with low autocorrelation. The main idea of the proposed method is ’inverting’ of the HC’s algorithm. There are two main differences in our method from HC method: 1) we are using a bent function as input data instead of a randomly generated Boolean function, 2) we are decreasing nonlinearity of the bent function to a required value instead of increasing nonlinearity of a randomly generated Boolean function. This paper is structured as follows: Section 2 presents the main definitions and terms, Section 3 describes the modified hill climbing method, Section 4 shows the main results. In the final part we make conclusions of our investigations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ON THE FUZZY SET THEORY AND AGGREGATION FUNCTIONS: HISTORY AND SOME RECENT ADVANCES

Several fuzzy connectives, including those proposed by Lotfi Zadeh, can be seen as linear extensions of the Boolean connectives from the scale ${0,1}$ into the scale $[0,1]$. We discuss these extensions, in particular, we focus on the dualities arising from the Boolean dualities. These dualities allow to transfer the results from some particular class of extended Boolean functions, e.g., from c...

متن کامل

A construction of binary linear codes from Boolean functions

Boolean functions have important applications in cryptography and coding theory. Two famous classes of binary codes derived from Boolean functions are the Reed-Muller codes and Kerdock codes. In the past two decades, a lot of progress on the study of applications of Boolean functions in coding theory has been made. Two generic constructions of binary linear codes with Boolean functions have bee...

متن کامل

Boolean Functions: Cryptography and Applications

I recall some properties of the distribution for the nonlinearity of Boolean functions, and I introduce new ones which are related to large deviation theorems in probability.

متن کامل

Applications of Boolean Functions in Cryptography

Nonlinear Boolean functions are considered for a long time to construct symmetric cryptosystems. In order to resist the known attacks, many properties of Boolean functions must be utilized. In this paper we analyze some major properties according to different attacks and list some research topics. We also analyze the performance of the S-box in classical algorithms such as DES and AES, and the ...

متن کامل

Boolean Functions: Cryptography and Applications

In this paper theoretical aspects of multidimensional linear distinguishing attacks are investigated. Using known examples of highly nonlinear Boolean functions we demonstrate how multidimensional linear approximations offer significant reduction in data complexity in distinguishing attacks. We also get concrete examples where one-dimensional linear approximations are never statistically indepe...

متن کامل

On Cryptographic Properties of Random Boolean Functions

Boolean functions used in cryptographic applications have to satisfy various cryptographic criteria. Although the choice of the criteria depends on the cryptosystem in which they are used, there are some properties (balancedness, nonlinearity, high algebraic degree, correlation immunity, propagation criteria) which a cryptographically strong Boolean function ought to have. We study the above me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008