Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
نویسندگان
چکیده
Walsh-Hadamard transform is used in a wide variety of scientific and engineering applications, including bent functions and cryptanalytic optimization techniques in cryptography. In linear cryptanalysis, it is a key question to find a good linear approximation, which holds with probability (1 + d)/2 and the bias d is large in absolute value. Lu and Desmedt (2011) take a step toward answering this key question in a more generalized setting and initiate the work on the generalized bias problem with linearly-dependent inputs. In this paper, we give fully extended results. Deep insights on assumptions behind the problem are given. We take an information-theoretic approach to show that our bias problem assumes the setting of the maximum input entropy subject to the input constraint. By means of Walsh transform, the bias can be expressed in a simple form. It incorporates Piling-up lemma as a special case. Secondly, as application, we answer a long-standing open problem in correlation attacks on combiners with memory. We give a closed-form exact solution for the correlation involving the multiple polynomial of any weight for the first time. We also give Walsh analysis for numerical approximation. An interesting bias phenomenon is uncovered, i.e., for even and odd weight of the polynomial, the correlation behaves differently. Thirdly, we introduce the notion of weakly biased distribution, and study bias approximation for a more general case by Walsh analysis. We show that for weakly biased distribution, Piling-up lemma is still valid. Our work shows that Walsh analysis is useful and effective to a broad class of cryptanalysis problems.
منابع مشابه
Optimized Fast Walsh-Hadamard Transform on GPUs for non-binary LDPC decoding
The Fourier Transform Sum-Product Algorithm (FT-SPA) used in non-binary Low-Density Parity-Check (LDPC) decoding makes extensive use of the Walsh-Hadamard Transform (WHT). We have developed a massively parallel Fast Walsh-Hadamard Transform (FWHT) which exploits the Graphics Processing Unit (GPU) pipeline and memory hierarchy, thereby minimizing the level of memory bank conflicts and maximizing...
متن کاملSpectral Characterization and Analysis of Avalanche in Cryptographic Substitution Boxes using Walsh-Hadamard Transformations
This paper presents a novel analytical technique of examining the avalanche characteristics of cryptographic substitution boxes (s-boxes) using the Walsh Hadamard spectral analysis of their Boolean maps. Avalanche is a desirable cryptographic property that is necessary to ensure that a cipher is not susceptible to statistical attacks and small difference between two plaintexts results in a sign...
متن کاملAnalysis of some ternary functions in terms of their Walsh-Hadamard transform
In this paper, we use the Walsh Hadamard transform (WHT) as a fundamental tool for analysis of some properties of generalized ternary functions. Some existing binary results obtained for cryptographic functions are generalized to the ternary case, and hence obtain some new characterization of ternary functions based on their spectral analysis. The WHT of ternary functions is expressed in terms ...
متن کاملThe Cascading Haar Wavelet Algorithm for Computing the Walsh-Hadamard Transform
We propose a novel algorithm for computing the Walsh Hadamard Transform (WHT) which consists entirely of Haar wavelet transforms. We prove that the algorithm, which we call the Cascading Haar Wavelet (CHW) algorithm, shares precisely the same serial complexity as the popular divideand-conquer algorithm for the WHT. We also propose a natural way of parallelizing the algorithm which has a number ...
متن کاملGeneralization of Boolean Functions Properties to Functions Defined over GF(p)
Abstract: Problem statement: Traditionally, cryptographic applications designed on hardware have always tried to take advantage of the simplicity of implementation functions over GF(p), p = 2, to reduce costs and improve performance. On the contrast, functions defined over GF(p); p > 2, possess far better cryptographic properties than GF(2) functions. Approach: We generalize some of the previou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016