Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions

نویسندگان

  • Yuri L. Borissov
  • An Braeken
  • Svetla Nikova
چکیده

INTRODUCTION In an important class of stream ciphers, called combination generators, the key stream is produced by combining the outputs of several independent Linear Feedback Shift Register (LFSR) sequences with a nonlinear Boolean function. Siegenthaler [12] was the first to point out that the combining function should possess certain properties in order to resist divide-and-conquer attacks.A Boolean function to be used in the combination generator (or more general also in stream ciphers) should satisfy several properties. Balancedness – the Boolean function has to output zeros and ones with equal probabilities. High nonlinearity-the Boolean function has to be at sufficiently high distance from any affine function. Correlation-immunity (of order t)-the output of the function should be statistically independent of the combination of any t of its inputs. A balanced correlation-immune function is called resilient. Besides the divide-and-conquer attacks, another important class of attacks on combination generators are the algebraic attacks [4, 5]. The central idea in the algebraic attacks is to use a lower degree approximation of the combining Boolean function and then to solve an over-defined system of nonlinear multivariate equations of low degree by efficient methods such as XL or simple linearization [3]. In order to resist these attacks, the Boolean function should have not only a a high algebraic degree but also a high distance to lower order degree functions. The trade-off between resiliency and algebraic degree is well-known. To achieve the desired trade-off designers typically fix one or two parameters and try to optimize the others. In this paper, we investigate the generalization of the trade-off between re-siliency and algebraic degree. In particular, we study the relation between re-siliency and distance to lower order degree functions. In order to define a the-oretic model for combining these properties, Kurosawa et al. [6] have introduced a new covering radiusˆ(t, r, n), which measures the maximum distance between t-resilient functions and r-th degree functions or the r-th order Reed-Muller code RM (r, n). That isˆ(t, r, n) = max d(f (x), RM (r, n)), where the maximum is taken over the set R t,n of t-resilient Boolean functions of n variables. Note that as the covering radius of Reed-Muller codes is defined by (r, n) = max d(f, RM (r, n)) where the maximum is taken over all Boolean functions f , it holds that 0 ≤ ˆ (t, r, n) ≤ (r, n). Kurosawa et al. also provide a …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions

Let Rt,n denote the set of t-resilient Boolean functions of n variables. First, we prove that the covering radius of the binary ReedMuller code RM(2, 6) in the sets Rt,6, t = 0, 1, 2 is 16. Second, we show that the covering radius of the binary Reed-Muller code RM(2, 7) in the set R3,7 is 32. We derive a new lower bound for the covering radius of the Reed-Muller code RM(2, n) in the set Rn−4,n....

متن کامل

On the Covering Radius of the Second Order Reed-Muller Code of Length 128

In 1981, Schatz proved that the covering radius of the binary ReedMuller code RM(2, 6) is 18. For RM(2, 7), we only know that its covering radius is between 40 and 44. In this paper, we prove that the covering radius of the binary Reed-Muller code RM(2, 7) is at most 42. Moreover, we give a sufficient and necessary condition for Boolean functions of 7-variable to achieve the second-order nonlin...

متن کامل

Asymptotically optimal Boolean functions

The largest Hamming distance between a Boolean function in $n$ variables and the set of all affine Boolean functions in $n$ variables is known as the covering radius $\rho_n$ of the $[2^n,n+1]$ Reed-Muller code. This number determines how well Boolean functions can be approximated by linear Boolean functions. We prove that \[ \lim_{n\to\infty}2^{n/2}-\rho_n/2^{n/2-1}=1, \] which resolves a conj...

متن کامل

Best Quadratic Approximations of Cubic Boolean Functions

The problem of computing best low order approximations of Boolean functions is treated in this paper. We focus on the case of best quadratic approximations of a wide class of cubic functions of arbitrary number of variables, and provide formulas for their efficient calculation. Our methodology is developed upon Shannon’s expansion formula and properties of best affine approximations of quadrati...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2004  شماره 

صفحات  -

تاریخ انتشار 2004