Evaluation of Algebraic Immunity of modern block ciphers

The methods for computing of Algebraic Immunity of cryptographic Boolean functions and non-linear substitutions (substitutions) blocks of symmetric ciphers are explored. The results of a comparative analysis of the Algebraic Immunity of nonlinear blocks of symmetric ciphers are denoted.

[1]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[2]  Gérard D. Cohen,et al.  Cyclic codes and algebraic immunity of Boolean functions , 2015, 2015 IEEE Information Theory Workshop (ITW).

[3]  V. Krasnobayev,et al.  A Method for Arithmetic Comparison of Data Represented in a Residue Number System , 2016 .

[4]  Luke O'Connor An analysis of a class of algorithms for S-box construction , 2006, Journal of Cryptology.

[5]  Bin Hu,et al.  Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers , 2018, China Communications.

[7]  Zhengchun Zhou,et al.  Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity , 2017, IEEE Transactions on Information Theory.

[8]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[9]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[10]  И.В. Лисицкая,et al.  Differential and linear properties analysis of the ciphers rijndael, serpent, threefish with 16-bit inputs and outputs , 2015 .

[11]  Y. Stasev,et al.  Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes , 2005 .

[12]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[13]  V. Dolgov,et al.  THE NEW CONCEPT OF BLOCK SYMMETRIC CIPHERS DESIGN , 2017 .

[14]  Hao Cao,et al.  Constructing Boolean Functions with Maximum Algebraic Immunity , 2011, 2011 International Conference on Management and Service Science.

[15]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[16]  Bart Preneel,et al.  Cryptographic hash functions , 2010, Eur. Trans. Telecommun..

[17]  Claude Carlet,et al.  Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.