Fast algebraic immunity of Boolean functions and LCD codes

Nowadays, the resistance against algebraic attacks and fast algebraic attacks are considered as an important cryptographic property for Boolean functions used in stream ciphers. Both attacks are very powerful analysis concepts and can be applied to symmetric cryptographic algorithms used in stream ciphers. The notion of algebraic immunity has received wide attention since it is a powerful tool to measure the resistance of a Boolean function to standard algebraic attacks. Nevertheless, an algebraic tool to handle the resistance to fast algebraic attacks is not clearly identified in the literature. In the current paper, we propose a new parameter to measure the resistance of a Boolean function to fast algebraic attack. We also introduce the notion of fast immunity profile and show that it informs both on the resistance to standard and fast algebraic attacks. Further, we evaluate our parameter for two secondary constructions of Boolean functions. Moreover, A coding-theory approach to the characterization of perfect algebraic immune functions is presented. Via this characterization, infinite families of binary linear complementary dual codes (or LCD codes for short) are obtained from perfect algebraic immune functions. The binary LCD codes presented in this paper have applications in armoring implementations against so-called side-channel attacks (SCA) and fault non-invasive attacks, in addition to their applications in communication and data storage systems.

[1]  Yuliang Zheng,et al.  On Algebraic Immunity and Annihilators , 2006, ICISC.

[2]  Tor Helleseth,et al.  Simplifying algebraic attacks with univariate analysis , 2011, 2011 Information Theory and Applications Workshop.

[3]  Frederik Armknecht,et al.  Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks , 2006, EUROCRYPT.

[4]  Sihem Mesnager,et al.  Euclidean and Hermitian LCD MDS codes , 2017, Des. Codes Cryptogr..

[5]  Tadao Kasami,et al.  New generalizations of the Reed-Muller codes-I: Primitive codes , 1968, IEEE Trans. Inf. Theory.

[6]  Cunsheng Ding,et al.  Two Families of LCD BCH Codes , 2016, IEEE Transactions on Information Theory.

[7]  Pierrick Méaux,et al.  On the Fast Algebraic Immunity of Majority Functions , 2019, LATINCRYPT.

[8]  Claude Carlet,et al.  Boolean Functions for Cryptography and Coding Theory , 2020 .

[9]  Sihem Mesnager,et al.  Linear Codes Over 𝔽q Are Equivalent to LCD Codes for q>3 , 2018, IEEE Trans. Inf. Theory.

[10]  Sihem Mesnager,et al.  Some (almost) optimally extendable linear codes , 2019, Des. Codes Cryptogr..

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  Claude Carlet,et al.  Complementary dual codes for counter-measures to side-channel attacks , 2016, Adv. Math. Commun..

[13]  Enes Pasalic,et al.  Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis , 2009, ICISC.

[14]  Fangguo Zhang,et al.  On the (Fast) Algebraic Immunity of Boolean Power Functions , 2015, IACR Cryptol. ePrint Arch..

[15]  Pierrick Méaux,et al.  On the fast algebraic immunity of threshold functions , 2021, Cryptography and Communications.

[16]  Cunsheng Ding,et al.  Binary LCD Codes and Self-Orthogonal Codes From a Generic Construction , 2019, IEEE Transactions on Information Theory.

[17]  Sihem Mesnager,et al.  A Novel Application of Boolean Functions with High Algebraic Immunity in Minimal Codes , 2020, ArXiv.

[18]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[19]  Sihem Mesnager,et al.  On σ-LCD codes , 2017, ArXiv.

[20]  Sihem Mesnager,et al.  Complementary Dual Algebraic Geometry Codes , 2016, IEEE Transactions on Information Theory.

[21]  C. Carlet A Survey on Nonlinear Boolean Functions with Optimal Algebraic Immunity Suitable for Stream Ciphers , 2013 .

[22]  Claude Carlet,et al.  Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.

[23]  Sihem Mesnager,et al.  New Characterization and Parametrization of LCD Codes , 2019, IEEE Transactions on Information Theory.

[24]  Chaoping Xing,et al.  Algebraic Geometry Codes With Complementary Duals Exceed the Asymptotic Gilbert-Varshamov Bound , 2017, IEEE Transactions on Information Theory.

[25]  Dongdai Lin,et al.  Perfect Algebraic Immune Functions , 2012, ASIACRYPT.

[26]  Dongdai Lin,et al.  Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions , 2009, IEEE Transactions on Information Theory.

[27]  Cunsheng Ding,et al.  LCD Cyclic Codes Over Finite Fields , 2017, IEEE Transactions on Information Theory.

[28]  Gérard D. Cohen,et al.  Fast algebraic immunity of Boolean functions , 2017, Adv. Math. Commun..

[29]  Fangguo Zhang,et al.  On the Resistance of Boolean Functions against Fast Algebraic Attacks , 2011, ICISC.

[30]  Guang Gong,et al.  Sequences, DFT and Resistance against Fast Algebraic Attacks , 2008, SETA.

[31]  Claude Carlet,et al.  An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity , 2008, ASIACRYPT.

[32]  Tor Helleseth,et al.  A New Attack on the Filter Generator , 2007, IEEE Transactions on Information Theory.

[33]  W. Cary Huffman,et al.  Fundamentals of Error-Correcting Codes , 1975 .

[34]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[35]  Qichun Wang,et al.  A Note on Fast Algebraic Attacks and Higher Order Nonlinearities , 2010, Inscrypt.

[36]  James L. Massey,et al.  Linear codes with complementary duals , 1992, Discret. Math..

[37]  T. Aaron Gulliver,et al.  Constructions of good entanglement-assisted quantum error correcting codes , 2016, Designs, Codes and Cryptography.

[38]  Deng Tang,et al.  A note on the fast algebraic immunity and its consequences on modified majority functions , 2020, Adv. Math. Commun..

[39]  Claude Carlet,et al.  Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.

[40]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[41]  Claude Carlet,et al.  Enhanced Boolean functions suitable for the filter model of pseudo-random generator , 2015, Des. Codes Cryptogr..

[42]  장윤희,et al.  Y. , 2003, Industrial and Labor Relations Terms.