首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
级联函数的密码学性质   总被引:2,自引:0,他引:2  
孙光洪  武传坤 《电子学报》2009,37(4):884-888
 构造具有好的密码学性质的布尔函数一直是布尔函数的研究热点.在构造具有好的密码学性质的布尔函数的方法中,级联构造方法是一种重要的研究方法,利用级联构造方法可以构造密码学性质好的布尔函数.本文利用级联构造了布尔函数f1‖f3‖f3‖f2,并且在文中详细讨论了这类级联布尔函数的密码学性质:相关免疫性、扩散性、线性结构、代数免疫阶等.通过我们的讨论发现,在布尔函数f1,f2,f3的密码学性质较好的前提下,级联布尔函数f1‖f3‖f3‖f2的密码学性质也较好.  相似文献   

2.
该文提出构造具有良好密码学性质的2m元旋转对称布尔函数的新方法。该类函数是平衡的,具有最大代数免疫度、最优代数次数和高非线性度,是一类能够同时满足多种密码学指标的优良函数。  相似文献   

3.
温巧燕  杨义先 《电子学报》1999,27(7):108-109,112
布尔函数的非线性度是衡量及其密码学意义的重要标志,而非线性度和其它密码学强度指标,如代数次数,扩散性,相关免疫性等存在着制约关系,本文研究了高非线性度布尔函数的构造,讨论非线性度和其它密码学准则之间的折关系,给出高非线性度,高代数次数,高非线性平衡相关免疫以及具有较好扩散性的高非线性度布尔函数的几种构造方法。  相似文献   

4.
偶数变元代数免疫最优布尔函数的构造方法   总被引:1,自引:0,他引:1  
陈银冬  陆佩忠 《通信学报》2009,30(11):64-70
提出了构造偶数变元代数免疫最优的布尔函数的方法,这是一个二阶的递归构造方法.分析表明,利用该方法构造而得到的布尔函数具有优良的密码学特性,比如具有较好的平衡性,较高的代数次数和非线性度等.最后,还对该构造方法进行了推广,进一步导出了递归构造偶数变元代数免疫最优布尔函数的一类方法.  相似文献   

5.
级联构造作为布尔函数的主要构造方法之一,具有结构简单、实现快速灵活等优点,被广泛用于构造实用的布尔函数。文中给出了一种通过迭代来构造密码学性质好的布尔函数的级联方法,详细测试了这类函数主要的密码学性质及代数正规型项数,并从理论上分析了构造的这类函数能够具有平衡性、最优的代数次数、高非线性度、高的代数免疫阶等多种好的密码性质。文中的结果表明,提出的级联构造方法能够用于构造密码学性质良好的布尔函数。  相似文献   

6.
黄景廉  张椿玲 《通信技术》2012,45(3):43-45,48
通过将导数和自定义的e-导数结合,作为新的研究工具引入到布尔函数密码学性质研究中来。利用导数和e-导数可将布尔函数内部取值不同特点进行区分的特性,系统地证明了不同重量一次扩散布尔函数相关免疫最高阶数问题,得出了一些用传统研究工具,如频谱理论等,不易导出的布尔函数密码学性质。这一结果对提高密码系统抵抗相关攻击的能力,提供了理论依据。  相似文献   

7.
Symmetric Boolean functions   总被引:4,自引:0,他引:4  
We present an extensive study of symmetric Boolean functions, especially of their cryptographic properties. Our main result establishes the link between the periodicity of the simplified value vector of a symmetric Boolean function and its degree. Besides the reduction of the amount of memory required for representing a symmetric function, this property has some consequences from a cryptographic point of view. For instance, it leads to a new general bound on the order of resiliency of symmetric functions, which improves Siegenthaler's bound. The propagation characteristics of these functions are also addressed and the algebraic normal forms of all their derivatives are given. We finally detail the characteristics of the symmetric functions of degree at most 7, for any number of variables. Most notably, we determine all balanced symmetric functions of degree less than or equal to 7.  相似文献   

8.
This paper discusses the degree of completeness of cryptographic functions, which is one of the cryptographic criteria should be considered in the design of stream ciphers. We establish the re- lationships between the degree of completeness and other cryptographic criteria. For resilient Boolean functions, a method to enhance the degree of completeness is proposed, while the nonlinearity and the algebraic degree do not decrease. Moreover, two constructions of resilient functions are provided, which have optimal degree of completeness, high nonlinearity, and high algebraic degree.  相似文献   

9.
该文基于线性分组码和双射函数,给出了满足七阶PC(l)的均衡相关免疫布尔函数新的构造方法。并据此进一步给出满足七阶PC(l)的(n,m,t)弹性函数的一般构造方法。此外,该文还揭示了这些函数的其它良好的密码学性质,如较高的非线性度、良好的代数次数、良好的构造计数等。  相似文献   

10.
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we get bases with special constructions of vector space. Furthermore, through swapping some vectors of these two bases, we establish all kinds of odd-variable balanced Boolean functions with optimal algebraic immunity.  相似文献   

11.
欧智慧  赵亚群  李旭 《通信学报》2013,34(4):12-113
利用t+1个n元布尔函数(称为基函数)级联构造了一类n+t元布尔函数G(x,y),并给出了G(x,y)的Walsh循环谱和自相关系数。通过Krawtchouk多项式与Krawtchouk矩阵对G(x,y)和基函数的关系进行了研究。分析了G(x,y)的密码学性质:相关免疫性、扩散性和代数免疫性。特别地,当t=2时,分析了G(x,y)与基函数的具体关系。另外,一般化该构造方法构造了一类多输出布尔函数,给出了该类多输出布尔函数的广义Walsh循环谱,进而分析了该类多输出布尔函数的相关免疫性和代数免疫性。  相似文献   

12.
一种新的扩散混合机制   总被引:2,自引:0,他引:2  
陈勤  叶又新 《通信学报》2002,23(1):52-59
本文针对扩散混合新机制扩压函数,提出了它的基本设计原则。引入了级连布尔函数的概念,给出并证明了它的一些性质,在此基础上提出了单比特扩压函数的一种构造方法,并给出了一个具体的具有良好密码学性能且结构简单易于软硬件实现的单比特扩压函数实例。  相似文献   

13.
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained by multiplication with low degree nonzero functions. In this paper, we show that a Boolean function having low nonlinearity is (also) weak against algebraic attacks, and we extend this result to higher order nonlinearities. Next, we present enumeration results on linearly independent annihilators. We also study certain classes of highly nonlinear resilient Boolean functions for their algebraic immunity. We identify that functions having low-degree subfunctions are weak in terms of algebraic immunity, and we analyze some existing constructions from this viewpoint. Further, we present a construction method to generate Boolean functions on n variables with highest possible algebraic immunity /spl lceil/n/2/spl rceil/ (this construction, first presented at the 2005 Workshop on Fast Software Encryption (FSE 2005), has been the first one producing such functions). These functions are obtained through a doubly indexed recursive relation. We calculate their Hamming weights and deduce their nonlinearities; we show that they have very high algebraic degrees. We express them as the sums of two functions which can be obtained from simple symmetric functions by a transformation which can be implemented with an algorithm whose complexity is linear in the number of variables. We deduce a very fast way of computing the output to these functions, given their input.  相似文献   

14.
Further enumerating boolean functions of cryptographic significance   总被引:3,自引:0,他引:3  
Open problems about enumerating Boolean functions of cryptographic significance are (partially) solved in this paper.Project supported by Trans-Century Training Programme Foundation for the Talents by the State Education Commission.  相似文献   

15.
任何一个密码系统都可以用一个非线性函数来描述。本文利用频谱技术研究了布尔函数的非线性度,以及布尔函数的某些运算对非线性度的影响,并指出这些结果在密码学中的应用。  相似文献   

16.
k阶拟Bent函数在密码设计和通信中的应用   总被引:4,自引:0,他引:4  
王育民、何大可提出了布尔函数关于线性函数的r阶相关度E(r)的概念来刻划布尔函数抵抗相关攻击的能力,本文以极小化所有非零相关度E(r)为主要目的,利用k阶拟Bent函数的特殊性质,给出了一类基于k阶拟Bent函数的“最佳”非线性组合设计的实现,构造了一类平衡的,具有高阶相关免疫性,而且非零相关度一致地小的非退化的布尔函数,并比较了它与基于部分Bent函数的“最佳”非线性组合设计的优劣。最后我们又利用k阶拟Bent函数构造了一类Bent互补函数族和Bent侣,Bent互补函数族和Bent侣在最佳信号设计方面意义重大,这也表明k阶拟Bent函数在密码设计和通信领域都有比较广的应用前景。  相似文献   

17.
A new technique for Boolean random masking of the logic and operation in terms of nand logic gates is proposed and applied for masking the integer addition. The new technique can be used for masking arbitrary cryptographic functions and is more efficient than previously known techniques, recently applied to the Advanced Encryption Standard (AES). New techniques for the conversions from Boolean to arithmetic random masking and vice versa are also developed. They are hardware oriented and do not require additional random bits. Unlike the previous, software-oriented techniques showing a substantial difference in the complexity of the two conversions, they have a comparable complexity being about the same as that of one integer addition only. All the techniques proposed are in theory secure against the first-order differential power analysis on the logic gate level. They can be applied in hardware implementations of various cryptographic functions, including AES, (keyed) SHA-1, IDEA, and RC6  相似文献   

18.
本文给出布尔函数的自相关原点矩这一概念,讨论布尔函数密码学特征在自相关原点矩上的数值表现,得到了平衡布尔函数、仿射函数、Bent函数以及部分Bent函数的自相关原点矩的数值特征。  相似文献   

19.
引入了密码安全的一些新度量指标,讨论了这些指标之间的关系。以此为基础得到布尔函数安全准则的新定义,给出非线性度新的上界,说明了这些上界与一般上界之间的关系。  相似文献   

20.
密码学中布尔函数的零化子   总被引:2,自引:2,他引:0  
布尔函数的零化子与代数攻击息息相关,但是如何构造一个给定函数的低次零化子仍然是一个悬而未决的问题.本文对此问题进行了研究,研究结果表明,如果布尔函数的零点集有一个k维子空间,那么,函数就会有代数次数为n-k的零化子.然而如何找到函数的具有最低代数次数的零化子仍然是一个亟待解决的难题.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号