Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms

نویسنده

  • Vladimir Bayev
چکیده

Low degree annihilators for Boolean functions are of great interest in cryptology because of algebraic attacks on LFSR-based stream ciphers. Several polynomial algorithms for construction of low degree annihilators are introduced in this paper. The existence of such algorithms is studied for the following forms of the function representation: algebraic normal form (ANF), disjunctive normal form (DNF), conjunctive normal form (CNF), and arbitrary formula with the Boolean operations of negation, conjunction, and disjunction. For ANF and DNF of a Boolean function f there exist polynomial algorithms that nd the vector space Ad(f) of all annihilators of degree 6 d. For CNF this problem is NP-hard. Nevertheless author introduces one polynomial algorithm that constructs some subspace of Ad(f) having formula that represents f .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extensions of the Cube Attack Based on Low Degree Annihilators

At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degr...

متن کامل

Reducing the Number of Homogeneous Linear Equations in Finding Annihilators

Given a Boolean function f on n-variables, we find a reduced set of homogeneous linear equations by solving which one can decide whether there exist annihilators at degree d or not. Using our method the size of the associated matrix becomes νf × ( ∑d

متن کامل

Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions

The incidence matrix between a set of monomials and a set of vectors in IF2 has a great importance in the study of coding theory, cryptography, linear algebra, combinatorics. The rank of these matrices are very useful while computing algebraic immunity(AI) of Boolean functions in cryptography literature [18, 7]. Moreover, these matrices are very sparse and well structured. Thus, for aesthetic r...

متن کامل

Algorithm to Determine the Fixed Degree Polynomial of Boolean Function for Cryptography

Every Boolean function is uniquely defined by a polynomial modulo 2. The degree of a Boolean function is the degree of its defining polynomial. In cryptography, the Boolean functions of fixed degree played important role, for example, 1 or 2 degrees. Therefore, in finding algorithms that recognize properties of Boolean functions polynomials by their values vectors, it makes sense consider only ...

متن کامل

Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions

The incidence matrix between a set of monomials and a set of vectors in IF2 has a great importance in the study of coding theory, cryptography, linear algebra, combinatorics. The rank of these matrices are very useful while computing algebraic immunity(AI) of Boolean functions in cryptography literature [18, 7]. Moreover, these matrices are very sparse and well structured. Thus, for aesthetic r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006