A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function

Based on the hidden weighted bit function, we propose a family of cryptographically significant Boolean functions. We investigate its algebraic degree and use Schur polynomials to study its algebraic immunity. For a subclass of this family, we deduce a lower bound on its nonlinearity. Moreover, we give an infinite class of balanced functions with very good cryptographic properties: optimum algebraic degree, optimum algebraic immunity, high nonlinearity (higher than the Carlet-Feng function and the function proposed by [25]) and a good behavior against fast algebraic attacks. These functions seem to have the best cryptographic properties among all currently known functions.

[1]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[2]  Donald E. Knuth,et al.  The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations (Art of Computer Programming) , 2005 .

[3]  Josef Pieprzyk,et al.  Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.

[4]  Wen-Feng Qi,et al.  Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity , 2006, ASIACRYPT.

[5]  O. S. Rothaus,et al.  On "Bent" Functions , 1976, J. Comb. Theory, Ser. A.

[6]  Xiaohu Tang,et al.  Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks , 2013, IEEE Transactions on Information Theory.

[7]  Martijn Stam,et al.  Understanding Adaptivity: Random Systems Revisited , 2012, ASIACRYPT.

[8]  Yongzhuang Wei,et al.  On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces , 2012, IEEE Transactions on Information Theory.

[9]  Jing Yang,et al.  Maximal values of generalized algebraic immunity , 2009, Des. Codes Cryptogr..

[10]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[11]  Chao Li,et al.  Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Claude Carlet,et al.  Cryptographic properties of the hidden weighted bit function , 2014, Discret. Appl. Math..

[13]  Pantelimon Stanica,et al.  Concatenations of the hidden weighted bit function and their cryptographic properties , 2014, Adv. Math. Commun..

[14]  Na Li,et al.  On the Construction of Boolean Functions With Optimal Algebraic Immunity , 2008, IEEE Transactions on Information Theory.

[15]  Claude Carlet,et al.  An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity , 2008, ASIACRYPT.

[16]  Panagiotis Rizomiliotis,et al.  On the Resistance of Boolean Functions Against Algebraic Attacks Using Univariate Polynomial Representation , 2010, IEEE Transactions on Information Theory.

[17]  Lei Hu,et al.  More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks , 2011, IEEE Transactions on Information Theory.

[18]  Claude Carlet,et al.  Algebraic immunity for cryptographically significant Boolean functions: analysis and construction , 2006, IEEE Transactions on Information Theory.

[19]  Qichun Wang,et al.  A Note on Fast Algebraic Attacks and Higher Order Nonlinearities , 2010, Inscrypt.

[20]  Haibin Kan,et al.  Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials , 2010, IEEE Transactions on Information Theory.

[21]  Claude Carlet,et al.  Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.

[22]  Philip Hawkes,et al.  Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers , 2004, CRYPTO.

[23]  Chik How Tan,et al.  A new method to construct Boolean functions with good cryptographic properties , 2013, Inf. Process. Lett..

[24]  Kefei Chen,et al.  Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.

[25]  Claude Carlet,et al.  Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.

[26]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[27]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.

[28]  Subhamoy Maitra,et al.  Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity , 2006, Des. Codes Cryptogr..

[29]  Harald Niederreiter,et al.  Introduction to finite fields and their applications: Preface , 1994 .

[30]  Yingpu Deng,et al.  A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity , 2011, Des. Codes Cryptogr..

[31]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[32]  Dongdai Lin,et al.  Perfect Algebraic Immune Functions , 2012, ASIACRYPT.

[33]  Matthew Franklin,et al.  Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.

[34]  Subhamoy Maitra,et al.  Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity , 2005, FSE.

[35]  Randal E. Bryant,et al.  On the Complexity of VLSI Implementations and Graph Representations of Boolean Functions with Application to Integer Multiplication , 1991, IEEE Trans. Computers.

[36]  Lei Hu,et al.  Further properties of several classes of Boolean functions with optimum algebraic immunity , 2009, Des. Codes Cryptogr..

[37]  Enes Pasalic,et al.  Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis , 2009, ICISC.

[38]  Peter L. Hammer,et al.  Boolean Models and Methods in Mathematics, Computer Science, and Engineering , 2010, Boolean Models and Methods.

[39]  Chik How Tan,et al.  Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity , 2014, Discret. Appl. Math..

[40]  Pantelimon Stanica,et al.  Cryptographic Boolean Functions and Applications , 2009 .

[41]  Dan Boneh,et al.  Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.

[42]  Chik How Tan,et al.  Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..