For cryptographic purposes, we generally study the characteristics of a Boolean function in n-variables with the inherent assumption that each of the n-bit inputs take the value 0 or 1, independently and randomly with probability 1 / 2. However, in the context of the FLIP stream cipher proposed by Meaux et al. (Eurocrypt 2016), this type of analysis warrants a different approach. To this end, Carlet et al. (IACR Trans. Symm. Crypto. 2018) recently presented a detailed analysis of Boolean functions with restricted inputs (mostly considering inputs with weight \(\frac{n}{2}\)) and provided certain bounds on linear approximation, which are related to restricted nonlinearity. The Boolean function used in the FLIP cipher reveals that it is actually a direct sum of several Boolean functions on a small number of inputs. Thus, with a different approach, we start a study in order to understand how the inputs to the composite function are distributed on the smaller functions. In this direction, we obtain several results that summarize the exact biases related to such Boolean functions. Finally, for the nonlinear filter function of FLIP, we obtain the lower bound on the restricted Walsh–Hadamard transform (i.e., upper bound on restricted nonlinearity). Our techniques provide a general theoretical framework to study such functions and better than previously published estimations of the biases, which is directly linked to the security parameters of the stream cipher.
[1]
Claude Carlet,et al.
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
,
2016,
EUROCRYPT.
[2]
Anne Canteaut,et al.
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
,
2016,
FSE.
[3]
Virginie Lallemand,et al.
Cryptanalysis of the FLIP Family of Stream Ciphers
,
2016,
CRYPTO.
[4]
Claude Carlet,et al.
Boolean functions with restricted input and their robustness; application to the FLIP cipher
,
2017,
IACR Trans. Symmetric Cryptol..
[5]
Cunsheng Ding,et al.
On the nonlinearity of Boolean functions with restricted input
,
2018,
Cryptography and Communications.
[6]
Sugata Gangopadhyay,et al.
Cryptographic Boolean functions with biased inputs
,
2017,
Cryptography and Communications.