On Existence and Invariant of Algebraic Attacks

In this paper, we investigate the existence and invariant of algebraic attacks, which have been recently shown as an important cryptanalysis method for symmetric-key cryptographical systems. For a given boolean function f in n variables and two positive integers d and e, we observe that the sufficient condition d + e ≥ n, shown in [8] or [9], cannot guarantee the existence of a function g with deg(g) ≤ d such that deg(fg) ≤ e where fg 6= 0. Based on this observation, we find a sufficient and necessary condition for the existence of such a multiplier g, which also yields an algorithm to construct them. The algorithm is more efficient when the polynomial basis is employed for linearization than the boolean basis is employed. We then introduce the concept of invariants of algebraic attacks in terms of the algebraic security criterion, proposed by Courtois and Meier in 2003, and characterize these invariants. Applying this criterion to the hyper-bent functions, we derive that for a randomly selected boolean function g, the probability of the degree of fg is greater than or equal to deg(f) = n/2 is close to 1 where f is a given hyper-bent function in n variables. The tool for establishing our assertions in this paper is to use the (discrete) Fourier transform of boolean functions in terms of technics of analysis of pseudo-random sequences.

[1]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[2]  Guang Gong,et al.  Transform domain analysis of DES , 1999, IEEE Trans. Inf. Theory.

[3]  Anne Canteaut,et al.  On cryptographic properties of the cosets of R(1, m) , 2001, IEEE Trans. Inf. Theory.

[4]  Claude Carlet,et al.  Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.

[5]  Palash Sarkar,et al.  Nonlinearity Bounds and Constructions of Resilient Boolean Functions , 2000, CRYPTO.

[6]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[7]  Claude Carlet,et al.  More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings , 1997, EUROCRYPT.

[8]  Kaoru Kurosawa,et al.  Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria , 1997, EUROCRYPT.

[9]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[10]  Frederik Armknecht,et al.  Algebraic Attacks on Combiners with Memory , 2003, CRYPTO.

[11]  Hans Dobbertin,et al.  Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity , 1994, FSE.

[12]  Yuliang Zheng,et al.  Relationships between Bent Functions and Complementary Plateaued Functions , 1999, ICISC.

[13]  N. Courtois,et al.  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.

[14]  J. Dillon Elementary Hadamard Difference Sets , 1974 .

[15]  Nicolas Courtois,et al.  Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.

[16]  Amr M. Youssef,et al.  Hyper-bent Functions , 2001, EUROCRYPT.

[17]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[18]  Stafford E. Tavares,et al.  An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks , 1991, EUROCRYPT.

[19]  Claude Carlet,et al.  A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction , 2002, CRYPTO.

[20]  Claude Carlet,et al.  On Correlation-Immune Functions , 1991, CRYPTO.

[21]  Solomon W. Golomb,et al.  On the classification of Boolean functions , 1959, IRE Trans. Inf. Theory.

[22]  Yuliang Zheng,et al.  Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions , 2000, Selected Areas in Cryptography.

[23]  James L. Massey,et al.  A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.