共查询到20条相似文献,搜索用时 0 毫秒
1.
任何一个密码系统都可以用一个非线性函数来描述。本文利用频谱技术研究了布尔函数的非线性度,以及布尔函数的某些运算对非线性度的影响,并指出这些结果在密码学中的应用。 相似文献
2.
该文研究了形如f(x,y)的n+1变元bent函数和半bent函数的二阶非线性度,其中xGF(2n), yGF(2)。首先给出了f(x,y)的2n-1个导数非线性度的精确值;然后推导出了函数f(x,y)的其余2n个导数的非线性度紧下界。进而给出了f(x,y)的二阶非线性度的紧下界。通过比较可知所得下界要优于现有的一般结论。结果表明f(x,y)具有较高的二阶非线性度,可以抵抗二次函数逼近和仿射逼近攻击。 相似文献
3.
Based on the properties of trace functions and quadratic forms, this paper presents value distributions of Walsh spectrum of the Plateaued functions of the form Tr(R(x)) with n=3r or 4r variables, where r > 1 is an odd integer. Our results can be used to determine the numbers of non-zero Walsh spectrum values and the nonlinearities of these functions, and estimate their resiliency orders. Especially, the value distributions can be used to deduce the tight lower bounds of the second order nonlinearity of two classes of Boolean functions. It is demonstrated that our bounds are better than the previously obtained bounds. 相似文献
4.
Zepeng ZHUO;Jinfeng CHONG;Hao CAO;Guozhen XIAO 《电子学报:英文版》2011,20(4):747-749
The relationship between the spectrums of two arbitrary Boolean functions and the spectrum of their derivatives is presented by using Convolution Theorem. Also, we deduce the relationship between the Walsh spectrums and the decompositions of two arbitrary Boolean functions in this paper. Based on them, we generalize some properties between the Walsh spectrum and the crosscorrelation function. 相似文献
5.
A necessary and sufficient condition for a Boolean function to be separable is presented. Several results towards a better understanding the characteristic properties of separable Boolean functions are derived. Some properties of separable plateaued functions are given. 相似文献
6.
Enumerating Boolean functions of cryptographic significance 总被引:14,自引:1,他引:14
Chris Mitchell 《Journal of Cryptology》1990,2(3):155-170
In this paper we describe applications of functions from GF(2)
m
onto GF(2)
n
in the design of encryption algorithms. If such a function is to be useful it must satisfy a set of criteria, the actual definition of which depends on the type of encryption technique involved. This in turn means that it is important to ensure that the selected criteria do not restrict the choice of function too severely, i.e., the set of functions must be enumerated. We discuss some of the possible sets of criteria and then give partial results on the corresponding enumeration problems. Many open problems remain, some of them corresponding to well-known hard enumeration questions. 相似文献
7.
8.
流密码中非线性组合函数的分析与设计 总被引:9,自引:2,他引:9
从互信息的观点出发,本文研究了非线性组合函数与其部分变量的组合之间的相关性,探讨了这种相关性对流密码安全性的影响。利用Walsh变换,分析了Bent函数与其部分变量之间的相关性,给出了一类与Bent函数有相同渐近谱特性的布尔函数的结构。 相似文献
9.
布尔函数若干设计准则的研究 总被引:6,自引:0,他引:6
张文政 《信息安全与通信保密》1994,(2)
本文在简要介绍密码应用中布尔函数应满足的一些设计准则及其各自构造方法的基础上,分析了这些设计准则的作用及相互关系,提出了同时满足几个最重要设计准则的较实用的构造方法,并给出了相应的例子。 相似文献
10.
11.
Open problems about enumerating Boolean functions of cryptographic significance are (partially) solved in this paper.Project supported by Trans-Century Training Programme Foundation for the Talents by the State Education Commission. 相似文献
12.
13.
14.
本文首次求出了重量为4(或2n-4)和6(或2n-6)的n元相关免疫布尔函数的精确个数。同时还用递归算法改进了现有的下界公式。 相似文献
15.
16.
From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary condition for resisting algebraic attacks.In this paper,we give some lower bounds on the algebraic immunity of Boolean functions.The results are applied to give lower bounds on the AI of symmetric Boolean functions and rotation symmetric Boolean functions.Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value「n/2」are constructed. 相似文献
17.
Shanqi PANG;Wenju XU;Jiao DU;Ying WANG 《电子学报:英文版》2017,26(6):1276-1283
This paper studies the properties of orbit matrix and gives a formula to compute the number of these orbit matrices on 4p variables, where p is an odd prime. It has been demonstrated that the construction of 1-resilient Rotation symmetric Boolean functions (RSBFs) on 4p variables is equivalent to solving an equation system. By the proposed method, all 1-resilient RSBFs on 12 variables can be constructed. We present a counting formula for the total number of all 1-resilient RSBFs on 4p variables. As application of our method, some 1-resilient RSBFs on 12 variables are presented. 相似文献
18.
A Boolean function b is a hard-core predicate for a one-way function f if b is polynomial-time computable but b(x) is difficult to predict from f(x) . A general family of hard-core predicates is a family of functions containing a hard-core predicate for any one-way function. A seminal result of Goldreich and Levin asserts that the family of parity functions is a general family of hard-core predicates. We show that no general family of hard-core predicates can consist of functions with O(n 1-ε ) average sensitivity, for any ε > 0 . As a result, such families cannot consist of • functions in AC 0 , • monotone functions, • functions computed by generalized threshold gates, or • symmetric d -threshold functions, for d = O(n 1/2 - ε ) and ε > 0 . Received April 2000 and revised September 2000 Online publication 9 April 2001 相似文献
19.
20.
The structured design of cryptographically good s-boxes 总被引:1,自引:1,他引:1
We describe a design procedure for the s-boxes of private key cryptosystems constructed as substitution-permutation networks (DES-like cryptosystems). Our procedure is proven to construct s-boxes which are bijective, are highly nonlinear, possess the strict avalanche criterion, and have output bits which act (vitually) independently when any single input bit is complemented. Furthermore, our procedure is very efficient: we have generated approximately 60 such 4 × 4 s-boxes in a few seconds of CPU time on a SUN workstation.This work was partially supported by a grant from the Natural Sciences and Engineering Research Council of Canada. 相似文献