New Characterizations for the Multi-output Correlation-Immune Boolean Functions

Correlation-immune (CI) multi-output Boolean functions have the property of keeping the same output distribution when some input variables are fixed. Recently, a new application of CI functions has appeared in the system of resisting side-channel attacks (SCA). In this paper, three new methods are proposed to characterize the $t$ th-order CI multi-output Boolean functions ($n$-input and $m$-output). The first characterization is to regard the multi-output Boolean functions as the corresponding generalized Boolean functions. It is shown that a generalized Boolean functions $f_g$ is a $t$ th-order CI function if and only if the Walsh transform of $f_g$ defined here vanishes at all points with Hamming weights between $1$ and $t$. Compared to the previous Walsh transforms of component functions, our first method can reduce the computational complexity from $(2^m-1)\sum^t_{j=1}\binom{n}{j}$ to $m\sum^t_{j=1}\binom{n}{j}$. The last two methods are generalized from Fourier spectral characterizations. Especially, Fourier spectral characterizations are more efficient to characterize the symmetric multi-output CI Boolean functions.

[1]  R. A. Rueppel Analysis and Design of Stream Ciphers , 2012 .

[2]  Hu Chuan-Gan,et al.  On The Shift Register Sequences , 2004 .

[3]  Oded Goldreich,et al.  The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[4]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[5]  Douglas R. Stinson,et al.  Orthogonal Arrays, Resilient Functions, Error-Correcting Codes, and Linear Programming Bounds , 1996, SIAM J. Discret. Math..

[6]  Xi Chen,et al.  Constructing Low-Weight $d$ th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform , 2018, IEEE Transactions on Information Theory.

[7]  Anne Canteaut,et al.  Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography , 1999, Des. Codes Cryptogr..

[8]  Serge Vaudenay,et al.  Black Box Cryptanalysis of Hash Networks Based on Multipermutations , 1994, EUROCRYPT.

[9]  R. McEliece Finite field for scientists and engineers , 1987 .

[10]  James L. Massey,et al.  A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.

[11]  Guang Gong,et al.  Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications , 2018, IEEE Transactions on Information Theory.

[12]  Claude Carlet,et al.  On Correlation-Immune Functions , 1991, CRYPTO.

[13]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[14]  Anne Canteaut,et al.  Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations , 1996, CRYPTO.

[15]  Kai-Uwe Schmidt,et al.  Quaternary Constant-Amplitude Codes for Multicode CDMA , 2006, IEEE Transactions on Information Theory.

[16]  Solomon W. Golomb,et al.  On the classification of Boolean functions , 1959, IRE Trans. Inf. Theory.

[17]  Lennart Brynielsson A short proof of the Xiao-Massey lemma , 1989, IEEE Trans. Inf. Theory.

[18]  Guang Gong,et al.  The Fourier spectral characterization for the correlation-immune functions over Fp$\phantom {\dot {i}\!}\mathbb {F}_{p}$ , 2019, Cryptogr. Commun..

[19]  Claude Carlet,et al.  Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.

[20]  Qichun Wang Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights , 2018, IACR Cryptol. ePrint Arch..

[21]  Victor K.-W. Wei,et al.  On the constructions and nonlinearity of binary vector-output correlation-immune functions , 2004, J. Complex..

[22]  Claude Carlet,et al.  Vectorial Boolean Functions for Cryptography , 2006 .

[23]  Solomon W. Golomb,et al.  On the Cryptanalysis of Nonlinear Sequences , 1999, IMACC.

[24]  Serge Vaudenay,et al.  On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.

[25]  Guang Gong,et al.  Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar , 2005 .

[26]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[27]  Douglas R. Stinson,et al.  Three characterizations of non-binary correlation-immune and resilient functions , 1995, Des. Codes Cryptogr..

[28]  Claude Carlet,et al.  Boolean Functions for Cryptography and Coding Theory , 2020 .

[29]  Sylvain Guilley,et al.  Correlation-immune Boolean functions for easing counter measures to side-channel attacks , 2014 .