On Existence and Invariant of Algebraic Attacks
نویسنده
چکیده
In this paper, we investigate the existence and invariant of algebraic attacks, which have been recently shown as an important cryptanalysis method for symmetric-key cryptographical systems. For a given boolean function f in n variables and two positive integers d and e, we observe that the sufficient condition d + e ≥ n, shown in [8] or [9], cannot guarantee the existence of a function g with deg(g) ≤ d such that deg(fg) ≤ e where fg 6= 0. Based on this observation, we find a sufficient and necessary condition for the existence of such a multiplier g, which also yields an algorithm to construct them. The algorithm is more efficient when the polynomial basis is employed for linearization than the boolean basis is employed. We then introduce the concept of invariants of algebraic attacks in terms of the algebraic security criterion, proposed by Courtois and Meier in 2003, and characterize these invariants. Applying this criterion to the hyper-bent functions, we derive that for a randomly selected boolean function g, the probability of the degree of fg is greater than or equal to deg(f) = n/2 is close to 1 where f is a given hyper-bent function in n variables. The tool for establishing our assertions in this paper is to use the (discrete) Fourier transform of boolean functions in terms of technics of analysis of pseudo-random sequences.
منابع مشابه
AMENABILITY OF VECTOR VALUED GROUP ALGEBRAS
The purpose of this article is to develop the notions of amenabilityfor vector valued group algebras. We prove that L1(G, A) is approximatelyweakly amenable where A is a unital separable Banach algebra. We givenecessary and sufficient conditions for the existence of a left invariant meanon L∞(G, A∗), LUC(G, A∗), WAP(G, A∗) and C0(G, A∗).
متن کاملSEMIGROUP ACTIONS , WEAK ALMOST PERIODICITY, AND INVARIANT MEANS
Let S be a topological semigroup acting on a topological space X. We develop the theory of (weakly) almost periodic functions on X, with respect to S, and form the (weakly) almost periodic compactifications of X and S, with respect to each other. We then consider the notion of an action of Son a Banach space, and on its dual, and after defining S-invariant means for such a space, we give a...
متن کاملAlgebraic Attacks on Stream Ciphers (survey)
Most stream ciphers based on linear feedback shift registers (LFSR) are vulnerable to recent algebraic attacks. In this survey paper, we describe generic attacks: existence of algebraic equations and fast algebraic attacks. The generic attacks only states the existence and gives the upper bound of the complexity. Thus we should find good algebraic equations, case by case, in order to apply the ...
متن کاملOn the two-wavelet localization operators on homogeneous spaces with relatively invariant measures
In the present paper, we introduce the two-wavelet localization operator for the square integrable representation of a homogeneous space with respect to a relatively invariant measure. We show that it is a bounded linear operator. We investigate some properties of the two-wavelet localization operator and show that it is a compact operator and is contained in a...
متن کاملOn Heyting algebras and dual BCK-algebras
A Heyting algebra is a distributive lattice with implication and a dual $BCK$-algebra is an algebraic system having as models logical systems equipped with implication. The aim of this paper is to investigate the relation of Heyting algebras between dual $BCK$-algebras. We define notions of $i$-invariant and $m$-invariant on dual $BCK$-semilattices and prove that a Heyting semilattice is equiva...
متن کامل