首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The criterion for the global avalanche characteristics (GAC) of cryptographic functions is an important property. To measure the correlation between two arbitrary Boolean functions, we propose two new criteria called the sum-of-squares indicator and the absolute indicator of the cross-correlation between two Boolean functions. The two indicators generalize the GAC criterion. Based on the properties of the cross-correlation function, we deduce the rough lower and the rough upper bounds on the two indicators by hamming weights of two Boolean functions, and generalize some properties between the Walsh spectrum and the cross-correlation function. Furthermore, we give the tight upper and the tight lower bounds on the two indicators. Finally, we show some relationships between the upper bounds on the two indicators and the higher order nonlinearity.  相似文献   

2.
The global avalanche characteristics (the sum-of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower bound on the sum-of-squares indicator for a balanced Boolean function satisfying the propagation criterion with respect to some vectors. In this paper, if balanced Boolean functions satisfy the propagation criterion with respect to some vectors, we give three necessary and sufficient conditions on the auto-correlation distribution of these functions reaching the minimum the bound on the sum-of-squares indicator. And we also find all Boolean functions with 3-variable, 4-variable, and 5-variable reaching the minimum the bound on the sum-of-squares indicator.  相似文献   

3.
Nonlinear Boolean functions play an important role in the design of block ciphers, stream ciphers and one-way hash functions. Over the years researchers have identified a number of indicators that forecast nonlinear properties of these functions. Studying the relationships among these indicators has been an area that has received extensive research. The focus of this paper is on the interplay of three notable nonlinear indicators, namely nonlinearity, avalanche and correlation immunity. We establish, for the first time, an explicit and simple lower bound on the nonlinearity Nf of a Boolean function f of n variables satisfying the avalanche criterion of degree p, namely, Nf⩾2n−1−2n−1−(1/2)p. We also identify all the functions whose nonlinearity attains the lower bound. As a further contribution of this paper, we prove that except for very few cases, the sum of the degree of avalanche and the order of correlation immunity of a Boolean function of n variables is at most n−2. The new results obtained in this work further highlight the significance of the fact that while avalanche property is in harmony with nonlinearity, both go against correlation immunity.  相似文献   

4.
Substitution boxes (S-boxes) are often used as the most important nonlinear components in many symmetric encryption algorithms. The cryptographic properties of an S-box directly affect the security of the whole cipher system. Recently, generalized global avalanche characteristics (GGAC) were introduced to measure the correlation between two arbitrary Boolean functions. In this paper, to better evaluate the security of an S-box, we present two cross-correlation indicators for it. In addition, by studying the related properties of the cross-correlation between two balanced Boolean functions, we propose the lower bounds on the sum-of-squares indicator related to GGAC for two balanced functions and also for an S-box.  相似文献   

5.
Boolean functions with high nonlinearity, high resiliency and strict avalanche criterion (SAC) play an important role in the designs of conventional cryptographic systems. In this paper, a method is proposed to construct resilient Boolean functions on n variables (n even) satisfying SAC with nonlinearity 〉 2n-1 -2n/2. A large class of cryptographic Boolean functions that were not known earlier were obtained.  相似文献   

6.
布尔函数的相关函数能刻画其扩散特征和线性结构特征,所以研究相关函数的性质对于布尔函数理论具有重要作用。为此,根据自相关和互相关函数的定义,分析通过迹表示的二次布尔函数f(x)=Tr_1~n(x~(2~i+1)+x(2~′+1))的自相关函数值,给出互相关函数平方的一个表达式C_(f,g)~2(α)=(?)(-1)~(D_(f,g)(a)+D_(f,g)(a+ω)),利用该表达式给出任意三次布尔函数的自相关函数平方和的上界,并借助该上界进一步研究两类迹表示的三次布尔函数的绝对值指标上界问题。  相似文献   

7.
在流密码和分组密码的设计中,所用布尔函数应该具有好的密码学性质来抵抗已知的各种有效攻击.布尔函数的低次零化子空间维数与其补函数低次零化子空间维数之和是评价该函数抵抗代数攻击能力的一个重要参数.根据Maiorana-McFarlands(M-M)Bent函数和布尔置换之间的一一对应关系,给出了一组布尔函数组并证明了它们是线性无关的.借助所给的线性无关布尔函数组和布尔置换中向量函数非零线性组合均是平衡函数的特性,给出了一类特殊M-M Bent函数低次零化子空间的维数与其补函数低次零化子空间的维数之和的一个上限.就这类特殊M-M Bent函数而言,该上限低于已知的限.进一步给出了适合所有M-M Bent函数的新上限.  相似文献   

8.
In this paper, we construct two classes of q-ary balanced functions which have good global avalanche characteristics (GAC) measured in terms of sum-of-squares-modulus indicator (SSMI), modulus indicator(MI), and propagation criterion (PC). We show that the SSMI, MI, and PC of q-ary functions are invariant under affine transformations. Also, we give a construction of q-ary s-plateaued functions and obtain their SSMI. We provide a relationship between the autocorrelation spectrum of a cubic Boolean function and the dimension of the kernel of the bilinear form associated with the derivative of the function. Using this result, we identify several classes of cubic semi-bent Boolean functions which have good bounds on their SSMI and MI, and hence show good behaviour with respect to the GAC.  相似文献   

9.
Fast S-box security mechanism research based on the polymorphic cipher   总被引:1,自引:0,他引:1  
In this study we propose a new design method for fast S-box construction. Its security is dependent upon the length of pseudorandom numbers generated by two communication parties. As the S-box is being built, we demonstrate that Boolean functions play an important role in the design of both block and stream ciphers. To satisfy a variety of cryptographic test methods, such as strict avalanche criterion (SAC), bit independence criterion (BIC), and nonlinearity, we apply polymorphic cipher (PMC) theory to the permutation function construction. Correlations among the test criteria in a real network environment are also evaluated.  相似文献   

10.
孙光洪  武传坤 《软件学报》2010,21(12):3165-3174
Sumanta Sarkar等人给出了一类具有最大代数免疫阶的旋转对称布尔函数,但对给出的旋转对称布尔函数仅研究了该函数的非线性度而对其他密码学性质未加以研究.因此,研究了上面给出的旋转对称布尔函数的其他密码学性质:代数次数、线性结构、扩散性、相关免疫性等.研究结果显示,虽然这类布尔函数的代数免疫阶达到最大,但是其他的密码学性质并不好.因此,此类布尔函数并不能直接应用在密码系统中.  相似文献   

11.
研究了相关免疫布尔函数和弹性布尔函数的平方和指标和绝对值指标,得到了满足p次扩散准则、次数为d的弹性布尔函数的绝对值指标的一个新的下界.同时,利用最大的Walsh谱值得到了此类函数的非零自相关函数数目的一个下界.  相似文献   

12.
首次将k阶严格雪崩准则的概念扩展到多输出布尔函数上,首先研究了多输出函数的严格雪崩准则、扩散准则,给出了多输出函数满足k阶严格雪崩准则的两个充分必要条件,证明了多输出布尔函数满足高阶严格雪崩准则时一定满足低阶严格雪崩准则。然后根据对称函数的特性,应用数论的知识,研究了多输出对称布尔函数的严格雪崩准则、扩散准则和k阶严格雪崩性质,给出了相应准则的充分必要条件,特别给出了两个k阶严格雪崩准则的组合判别公式。  相似文献   

13.
布尔函数是在密码学、纠错编码和扩频通信等领域有着广泛应用的密码函数,寻找性能优良的布尔函数一直是密码学领域的重要问题之一。基于引力搜索算法设计了一种搜索布尔函数的新算法。该算法模仿万有引力定律,以n维空间中的质量点表示布尔函数,以布尔函数的密码特性作为目标适应度函数进行搜索。实验结果表明,算法使用新设计的目标适应度函数可以直接生成具有1阶弹性、1阶扩散准则和高非线性度、高代数次数以及低自相关指标等多种密码学指标的平衡布尔函数,并且进一步给出了直接生成2输出平衡布尔函数的计算机搜索算法。  相似文献   

14.
15.
构造具有好的代数免疫度的布尔函数是布尔函数研究的重要问题之一。基于布尔函数的级联构造方法,给出了一类具有好的代数免疫度的布尔函数;分析了所构造函数的性质,证明了构造布尔函数hn+1与其子函数代数免疫度之间的关系,并确定了已构造一阶级联函数的代数次数、平衡性以及非线性度。研究结果表明,在级联构造方法下,i次级联构造函数比一阶构造H0的代数免疫度有显著提高。  相似文献   

16.
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p(x) with deg(p(x)) < , we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than . Supported by the National Natural Science Foundation of China (Grant No. 60673068), and the Natural Science Foundation of Shandong Province (Grant Nos. Y2007G16, Y2008G01)  相似文献   

17.
5元饱和最优布尔函数的计数问题   总被引:1,自引:0,他引:1  
谢敏  裴定一 《软件学报》2005,16(4):595-600
同时达到代数次数上界n-m-1和非线性度上界2n-1-2m+1nm阶弹性布尔函数(mn/2-2)具有3个Walsh谱值:0,±2m+2这样的函数被称为饱和最优函数(saturated best,简称SB).将利用(32,6)Reed-Muller码陪集重量的分布,从一种全新的构造角度出发,给出n=5的饱和最优函数的个数.  相似文献   

18.
We consider the deterministic and the randomized decision tree complexities for Boolean functions, denotedDC(f) andRC(f), respectively. A major open problem is how smallRC(f) can be with respect toDC(f). It is well known thatRC(f)DC(f) 0.5 for every Boolean functionf (called 0.5-exponent). On the other hand, some Boolean functionf is known to haveRC(f) = (DC(f))0.753...) (or 0.753...-exponent). It is not known whether there is a Boolean function with exponent smaller than 0.753... Likewise, no lower bound for arbitrary Boolean functions with exponent greater than 0.5 is known.Our result is a 0.51 lower bound on the exponent for everyread-once function. Read-once means that each input variable appears exactly once in the Boolean formula representing the function. To obtain this result we generalize an existing lower bound technique and combine it with restriction arguments. This result provides a lower bound ofn 0.51 on the number of positions that have to be evaluated by any randomized - pruning algorithm computing the value of any two-person zero-sum game tree withn final positions.  相似文献   

19.
   Abstract. A graph-theoretic approach to study the complexity of Boolean functions was initiated by Pudlák, R?dl, and Savicky [PRS] by defining models of computation on graphs. These models generalize well-known models of Boolean complexity such as circuits, branching programs, and two-party communication complexity. A Boolean function f is called a 2-slice function if it evaluates to zero on inputs with less than two 1's and evaluates to one on inputs with more than two 1's. On inputs with exactly two 1's f may be nontrivially defined. There is a natural correspondence between 2-slice functions and graphs. Using the framework of graph complexity, we show that sufficiently strong superlinear monotone lower bounds for the very special class of {2-slice functions} would imply superpolynomial lower bounds over a complete basis for certain functions derived from them. We prove, for instance, that a lower bound of n 1+Ω(1) on the (monotone) formula size of an explicit 2-slice function f on n variables would imply a 2 Ω(ℓ) lower bound on the formula size over a complete basis of another explicit function g on l variables, where l=Θ( log n) . We also consider lower bound questions for depth-3 bipartite graph complexity. We prove a weak lower bound on this measure using algebraic methods. For instance, our result gives a lower bound of Ω(( log n) 3 / ( log log n) 5 ) for bipartite graphs arising from Hadamard matrices, such as the Paley-type bipartite graphs. Lower bounds for depth-3 bipartite graph complexity are motivated by two significant applications: (i) a lower bound of n Ω(1) on the depth-3 complexity of an explicit n -vertex bipartite graph would yield superlinear size lower bounds on log-depth Boolean circuits for an explicit function, and (ii) a lower bound of
would give an explicit language outside the class Σ 2 cc of the two-party communication complexity as defined by Babai, Frankl, and Simon [BFS]. Our lower bound proof is based on sign-representing polynomials for DNFs and lower bounds on ranks of ±1 matrices even after being subjected to sign-preserving changes to their entries. For the former, we use a result of Nisan and Szegedy [NS] and an idea from a recent result of Klivans and Servedio [KS]. For the latter, we use a recent remarkable lower bound due to Forster [F1].  相似文献   

20.
Summary Neciporuk [3], Lamagna/Savage [1] and Tarjan [6] determined the monotone network complexity of a set of Boolean sums if each two sums have at most one variable in common. By this result they could define explicitely a set of n Boolean sums which depend on n variables and whose monotone complexity is of order n 3/2. In the main theorem of this paper we prove a more general lower bound on the monotone network complexity of Boolean sums. Our lower bound is for many Boolean sums the first nontrivial lower bound. On the other side we can prove that the best lower bound which the main theorem yields is the n 3/2-bound cited above. For the proof we use the technical trick of assuming that certain functions are given for free.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号