Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks

Inspired by the previous work of Tu and Deng, we propose two infinite classes of Boolean functions of 2k variables where k ≥ 2. The first class contains unbalanced functions having high algebraic degree and nonlinearity. The functions in the second one are balanced and have maximal algebraic degree and high nonlinearity (as shown by a lower bound that we prove; as a byproduct we also prove a better lower bound on the nonlinearity of the Carlet-Feng function). Thanks to a combinatorial fact, first conjectured by the authors and later proved by Cohen and Flori, we are able to show that they both possess optimal algebraic immunity. It is also checked that, at least for numbers of variables n ≤ 16, functions in both classes have a good behavior against fast algebraic attacks. Compared with the known Boolean functions resisting algebraic attacks and fast algebraic attacks, both of them possess the highest lower bounds on nonlinearity. These bounds are however not enough for ensuring a sufficient nonlinearity for allowing resistance to fast correlation attack. Nevertheless, as for previously found functions with the same features, there is a gap between the bound that we can prove and the actual values computed for bounded numbers of variables (n ≤ 38). Moreover, these values are very good. The infinite class of functions we propose in Construction 2 presents, among all currently known constructions, the best provable tradeoff between all the important cryptographic criteria.

[1]  Qichun Wang,et al.  A Note on Fast Algebraic Attacks and Higher Order Nonlinearities , 2010, Inscrypt.

[2]  H. Niederreiter,et al.  Finite Fields: Encyclopedia of Mathematics and Its Applications. , 1997 .

[3]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[4]  Tor Helleseth,et al.  A New Attack on the Filter Generator , 2007, IEEE Transactions on Information Theory.

[5]  Yingpu Deng,et al.  Boolean functions with all main cryptographic properties , 2010, IACR Cryptol. ePrint Arch..

[6]  Risto M. Hakala,et al.  On the Nonlinearity of Discrete Logarithm in \mathbb F2n\mathbb F_{2^n} , 2010, SETA.

[7]  M. R. Spiegel Mathematical handbook of formulas and tables , 1968 .

[8]  Hugues Randriam,et al.  On the Number of Carries Occuring in an Addition mod 2k-1 , 2011, IACR Cryptol. ePrint Arch..

[9]  Claude Carlet On a weakness of the Tu-Deng function and its repair , 2009, IACR Cryptol. ePrint Arch..

[10]  Claude Carlet,et al.  Algebraic immunity for cryptographically significant Boolean functions: analysis and construction , 2006, IEEE Transactions on Information Theory.

[11]  Wen-Feng Qi,et al.  Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity , 2006, ASIACRYPT.

[12]  Frederik Armknecht,et al.  Improving Fast Algebraic Attacks , 2004, FSE.

[13]  K. Nyberg,et al.  On the nonlinearity of discrete logarithm in F2n , 2010 .

[14]  Lei Hu,et al.  Further properties of several classes of Boolean functions with optimum algebraic immunity , 2009, Des. Codes Cryptogr..

[15]  Hans Dobbertin,et al.  Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity , 1994, FSE.

[16]  Claude Carlet,et al.  Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.

[17]  Philip Hawkes,et al.  Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers , 2004, CRYPTO.

[18]  Yingpu Deng,et al.  A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity , 2011, Des. Codes Cryptogr..

[19]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[20]  Gérard D. Cohen,et al.  On a Conjecture about Binary Strings Distribution , 2010, SETA.

[21]  Na Li,et al.  On the Construction of Boolean Functions With Optimal Algebraic Immunity , 2008, IEEE Transactions on Information Theory.

[22]  Frederik Armknecht,et al.  Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks , 2006, EUROCRYPT.

[23]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[24]  Lei Hu,et al.  Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity , 2010, IACR Cryptol. ePrint Arch..

[25]  LI YUAN,et al.  ON A COMBINATORIC CONJECTURE , 2009 .

[26]  Claude Carlet,et al.  An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity , 2008, ASIACRYPT.

[27]  Haibin Kan,et al.  Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials , 2010, IEEE Transactions on Information Theory.

[28]  Panagiotis Rizomiliotis,et al.  On the Resistance of Boolean Functions Against Algebraic Attacks Using Univariate Polynomial Representation , 2010, IEEE Transactions on Information Theory.

[29]  Lei Hu,et al.  More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks , 2011, IEEE Transactions on Information Theory.

[30]  Lei Hu,et al.  Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[31]  Seokhie Hong,et al.  A note on "Improved Fast Correlation Attacks on Stream Ciphers" , 2010, IACR Cryptol. ePrint Arch..

[32]  Subhamoy Maitra,et al.  Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity , 2006, Des. Codes Cryptogr..

[33]  Mikhail Lobanov Tight bound between nonlinearity and algebraic immunity , 2005, IACR Cryptol. ePrint Arch..

[34]  Lei Hu,et al.  Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity , 2010, IACR Cryptol. ePrint Arch..

[35]  Tanja Lange,et al.  On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two , 2005, WCC.

[36]  Claude Carlet Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials" , 2011, IEEE Trans. Inf. Theory.

[37]  Jing Yang,et al.  Maximal values of generalized algebraic immunity , 2009, Des. Codes Cryptogr..

[38]  Yingpu Deng,et al.  A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity , 2009, IACR Cryptol. ePrint Arch..

[39]  Cunsheng Ding,et al.  The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.

[40]  Claude Carlet,et al.  Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.

[41]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[42]  Gérard Cohen,et al.  On a generalized combinatorial conjecture involving addition mod 2 k -1. , 2011 .

[43]  Hugues Randriam,et al.  On the Number of Carries Occurring in an Addition Mod , 2012 .