Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties

نویسندگان

  • An Braeken
  • Yuri L. Borissov
  • Svetla Nikova
  • Bart Preneel
چکیده

This paper presents an efficient approach for classification of the affine equivalence classes of cosets of the first order Reed-Muller code with respect to cryptographic properties such as correlationimmunity, resiliency and propagation characteristics. First, we apply the method to completely classify all the 48 classes into which the general affine group AGL(2, 5) partitions the cosets of RM(1, 5). Second, we describe how to find the affine equivalence classes together with their sizes of Boolean functions in 6 variables. We perform the same classification for these classes. Moreover, we also determine the classification of RM(3, 7)/RM(1, 7). We also study the algebraic immunity of the corresponding affine equivalence classes. Moreover, several relations are derived between the algebraic immunity and other cryptographic properties. Finally, we introduce two new indicators which can be used to distinguish affine inequivalent Boolean functions when the known criteria are not sufficient. From these indicators a method can be derived for finding the affine relation between two functions (if such exists). The efficiency of the method depends on the structure of the Walsh or autocorrelation spectrum.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties

This paper presents an efficient approach to the classification of the affine equivalence classes of cosets of the first order ReedMuller code with respect to cryptographic properties such as correlationimmunity, resiliency and propagation characteristics. First, we apply the method to completely classify all the 48 classes into which the general affine group AGL(2, 5) partitions the cosets of ...

متن کامل

Cryptographic Boolean Functions with R

A Boolean function is a mapping {0,1}n → {0,1}. Those mappings are of much interest in the design of cryptographic algorithms such as secure pseudorandom number generators (for the design of stream ciphers among other applications), hash functions and block ciphers. The lack of open source software to assess cryptographic properties of Boolean functions and the increasing interest for statistic...

متن کامل

Structures of Highly Nonlinear Cryptographic Functions

This paper studies the properties and constructions of nonlinear Boolean functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contribution of this paper is to completely characterise the structures of cryptographic functions that satisfy the propagation criterion with respect to all but six or less vectors.

متن کامل

On Boolean Functions with Generalized Cryptographic Properties

By considering a new metric, we generalize cryptographic properties of Boolean functions such as resiliency and propagation characteristics. These new definitions result in a better understanding of the properties of Boolean functions and provide a better insight in the space defined by this metric. This approach leads to the construction of “handmade” Boolean functions, i.e., functions for whi...

متن کامل

Rotation Symmetric Boolean Functions -; Count and Cryptographic Properties

In 1999, Pieprzyk and Qu presented rotation symmetric (RotS) functions as components in the rounds of hashing algorithm. Later, in 2002, Cusick and Stănică presented further advancement in this area. This class of Boolean functions are invariant under circular translation of indices. In this paper, using Burnside’s lemma, we prove that the number of n-variable rotation symmetric Boolean functio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2004  شماره 

صفحات  -

تاریخ انتشار 2004