Distinguishing Properties of Higher Order Derivatives of Boolean Functions

Higher order differential cryptanalysis is based on the property of higher order derivatives of Boolean functions that the degree of a Boolean function can be reduced by at least 1 by taking a derivative on the function at any point. We define fast point as the point at which the degree can be reduced by at least 2. In this paper, we show that the fast points of a n-variable Boolean function form a linear subspace and its dimension plus the algebraic degree of the function is at most n. We also show that non-trivial fast point exists in every n-variable Boolean function of degree n− 1, every symmetric Boolean function of degree d where n 6≡ d (mod 2) and every quadratic Boolean function of odd number variables. Moreover we show the property of fast points for n-variable Boolean functions of degree n− 2.

[1]  Michael Vielhaber Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack , 2007, IACR Cryptol. ePrint Arch..

[2]  Anne Canteaut,et al.  Symmetric Boolean functions , 2005, IEEE Transactions on Information Theory.

[3]  Adi Shamir,et al.  Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..

[4]  David A. Wagner,et al.  Integral Cryptanalysis , 2002, FSE.

[5]  Jan-Hendrik Evertse,et al.  Linear Structures in Blockciphers , 1987, EUROCRYPT.

[6]  Xuejia Lai,et al.  On the security of multivariate hash functions , 2009 .

[7]  Takeshi Kawabata,et al.  Higher Order Differential Attacks on Reduced-Round MISTY1 , 2008, ICISC.

[8]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[9]  J. Massey,et al.  Communications and Cryptography: Two Sides of One Tapestry , 1994 .

[10]  Lars R. Knudsen,et al.  Provable Security Against a Differential Attack , 1994 .

[11]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[12]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[13]  Stefan Lucks The Saturation Attack - A Bait for Twofish , 2000, FSE.

[14]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[15]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[16]  Toshinobu Kaneko,et al.  Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher , 1997, ISW.

[17]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.

[18]  S. Moriai,et al.  Higher order differential attack of a CAST cipher , 1998 .