A New Construction of Boolean Functions with Maximum Algebraic - - PowerPoint PPT Presentation

a new construction of boolean functions with maximum
SMART_READER_LITE
LIVE PREVIEW

A New Construction of Boolean Functions with Maximum Algebraic - - PowerPoint PPT Presentation

A New Construction of Boolean Functions with Maximum Algebraic Immunity National University of Defense Technology Deshuai Dong 2009-8-26 Outline Preliminaries on Boolean functions Algebraic attacks and Algebraic immunity The


slide-1
SLIDE 1

A New Construction of Boolean Functions with Maximum Algebraic Immunity

National University of Defense Technology Deshuai Dong 2009-8-26

slide-2
SLIDE 2

2009-9-27

2

Outline

Preliminaries on Boolean functions Algebraic attacks and Algebraic immunity The recent constructions of Boolean

functions with MAI

The main results of our paper

slide-3
SLIDE 3

2009-9-27

3

More formally map

2 2

: Fn f F →

1 2 2

( , , )

n n

x x F x F ⋅⋅⋅ ∈ → ∈ Preliminaries on Boolean functions

Boolean functions map n binary inputs

to a single binary output

slide-4
SLIDE 4

2009-9-27

4

Preliminaries on Boolean functions

It can be represented as a polynomial in

the ring

2 i i

x x =

This ring is simply a set of all polynomials

with binary coefficients in n indeterminates with property that

2 2 2 1 1 1

[ , , ]/ , ,

n n n

F x x x x x x < − − >

slide-5
SLIDE 5

2009-9-27

5

Algebraic Normal Form

A Boolean function can be formalized

further by defining

1 2 2 2

1 2 1

( ) , ( , , )

n n n

u u u u u u n n u F u F

f x a x a x x x u u u

∈ ∈

= = = ⋅⋅⋅

∑ ∑

  • This also can be called the algebraic normal

form (ANF) of f

slide-6
SLIDE 6

2009-9-27

6

Algebraic degree

Algebraic degree of a Boolean function is

defined as maximum length of terms in ANF

  • f f

The algebraic degree should be large

because of Berlekamp-Massey and Ronjom- Helleseth attacks (stream ciphers) and higher differential attack (block ciphers)

slide-7
SLIDE 7

2009-9-27

7

Affine and linear functions

The set of all Boolean functions in n variables

is denoted by

n

B

1 1 2 2 2

{ | ,0 }

n n n i

A a a x a x a x a F i n = + + + + ∈ ≤ ≤

  • Boolean Functions of degree at most one are

called affine

An affine function with is said to be

linear, and all linear functions are denoted by

a =

n

L

slide-8
SLIDE 8

2009-9-27

8

The Walsh Transform

The Walsh transform of Boolean functions is

defined by

2

( )

( ) ( 1)

n

f x u x x F

f u

∧ + ⋅ ∈

= −

( , ) ( ) { | ( ) ( )}

H H

d f g w f g x f x g x = + = ≠

The Hamming distance between two functions:

slide-9
SLIDE 9

2009-9-27

9

Nonlinearity definition

The nonlinearity of a Boolean function is the

minimum distance from f to all affine functions i.e.

min ( , )

n

f H g A

N d f g

=

2

1

1 2 max ( ) 2

n

n f a F

N f a

∧ − ∈

= −

The nonlinearity of a Boolean function f also

can be represented as:

slide-10
SLIDE 10

2009-9-27

10

The nonlinearity must be high to prevent the system from fast correlation attacks (stream ciphers) and linear attacks( block ciphers)

slide-11
SLIDE 11

2009-9-27

11

The application

slide-12
SLIDE 12

2009-9-27

12

The application

slide-13
SLIDE 13

2009-9-27

13

Before the introduction of algebraic attacks,

balancedness, high algebraic degree and high nonlinearity were considered as roughly sufficient for the filter model of PRG

slide-14
SLIDE 14

2009-9-27

14

Outline

Preliminaries on Boolean functions Algebraic attacks and Algebraic

immunity

slide-15
SLIDE 15

2009-9-27

15

Algebraic attacks principle( Shannon )

Find equations with the key bits as unknowns Solve the system of these equations

slide-16
SLIDE 16

2009-9-27

16

For stream ciphers (combining or filtering

Boolean functions):

1

( , , )

N

s s

  • denote by the initial state of the

linear part of the PRG

'

L

' 1 1

( ( , , , ))

i i N

s f L L s s s

=

  • there exists a linear automorphism L and

a linear mapping :

slide-17
SLIDE 17

2009-9-27

17

For stream ciphers we can have many

equations, so we can gain an over-defined system

One can linearize the system (or use

Grőbner bases) to solve it

slide-18
SLIDE 18

2009-9-27

18

Problem of algebraic attacks

However the number of unknowns is too

large

The common ways to solve this system are

mostly impossible

slide-19
SLIDE 19

2009-9-27

19

Algebraic attacks

Courtois-Meier 2003: if one can find

and of low degree such that , then the equation implies the following low degree equation:

g ≠

h

fg h =

' 1 1

( ( , , , ))

i i N

s f L L s s s

=

  • '

' 1 1

( ( , , )) ( ( , , ))

i i i N N

s g L L s s h L L s s

− −

=

  • Then the degree of the original nonlinear

system and the unknowns in the related linear system decrease

slide-20
SLIDE 20

2009-9-27

20

Meier-Pasalic-C.C. EUROCRYPY 2004 :

A necessary and sufficient condition for existence and of low degree such that : there exist of low degree such that

  • r

g ≠

h

fg h = g ≠

f g ⋅ =

(1 ) f g + ⋅ =

Algebraic immunity

slide-21
SLIDE 21

2009-9-27

21

Algebraic immunity

Given , a nonzero function is called

an annihilator of if

. By

we mean the set of annihilators of

n

f B ∈

g

f

f g ⋅ =

( ) AN f

f

The algebraic immunity of , denoted by

, where is the minimum degree nonzero function such that either

f

( ) deg( ) AI f g =

n

g B ∈

f g ⋅ =

(1 ) f g + ⋅ =

slide-22
SLIDE 22

2009-9-27

22

It is easy to prove that

and

If the AI of a Boolean function in n-variable

equals , we call it a maximum algebraic immunity (MAI) function.

( ) deg( ) AI f f ≤

( ) / 2 AI f n ≤ ⎡ ⎤ ⎢ ⎥

In practical situation, should be greater

than or equal to 7

So we need

( ) AI f 13 n ≥

/ 2 n

Algebraic immunity

⎡ ⎤ ⎢ ⎥

slide-23
SLIDE 23

2009-9-27

23

Lobanov (IACR e-print archive) given a tight

bound between nonlinearity and algebraic immunity:

( ) 2

1 2

AI f f i

n N i

− =

− ⎛ ⎞ ≥ ⎜ ⎟ ⎝ ⎠

Algebraic immunity and nonlinearity

This tight bound does not guarantee that an

maximum algebraic immunity implies a good enough nonlinearity

slide-24
SLIDE 24

2009-9-27

24

Design criteria

High algebraic degree High nonlinearity Resiliency ( for certain applications) High algebraic immunity

slide-25
SLIDE 25

2009-9-27

25

Outline

Preliminaries on Boolean functions Algebraic attacks and Algebraic immunity The recent constructions of Boolean

functions with MAI

slide-26
SLIDE 26

2009-9-27

26

Three Recent constructions

Construction based support-inclusion Construction based basis-exchange technique Construction based finite field expression

slide-27
SLIDE 27

2009-9-27

27

Construction based support-inclusion

Dalai, Basic theory in construction of MAI

functions, 2005

Lemma 1. Let f, f1, f2 in Bn , and

(1) f1, f2 both have no nonzero annihilators degree less than ; (2) Then

2 n ⎡ ⎤ ⎢ ⎥ ⎢ ⎥

1 2

( ) ( ), ( 1) ( ) Supp f Supp f Supp f Supp f ⊇ + ⊇

( ) 2 n AI f ⎡ ⎤ = ⎢ ⎥ ⎢ ⎥

slide-28
SLIDE 28

2009-9-27

28

Construction based support-inclusion (Cont.)

Theorem 1. Let f in Bn , if n is odd, let

0, ( ) 2 ( ) 1, ( ) 2 n wt x f x n wt x ⎧ ⎡ ⎤ < ⎪ ⎢ ⎥ ⎪ ⎢ ⎥ = ⎨ ⎡ ⎤ ⎪ ≥ ⎢ ⎥ ⎪ ⎢ ⎥ ⎩

( ) 2 n AI f ⎡ ⎤ = ⎢ ⎥ ⎢ ⎥

if n is even, let

0, ( ) 2 ( ) 1, ( ) 2 {0,1}, ( ) 2 n wt x n f x wt x n b wt x ⎧ ⎡ ⎤ < ⎪ ⎢ ⎥ ⎢ ⎥ ⎪ ⎪ ⎡ ⎤ = > ⎨ ⎢ ⎥ ⎢ ⎥ ⎪ ⎪ ⎡ ⎤ ∈ = ⎪ ⎢ ⎥ ⎢ ⎥ ⎩

Then

slide-29
SLIDE 29

2009-9-27

29

Construction based basis-exchange technique

Longjiang Qu, Na Li, et al., On MAI functions:

construction and a lower bound of the count, 2005.

Idea of basis-exchange technique:

slide-30
SLIDE 30

2009-9-27

30

Construction based basis-exchange technique (Cont.)

Lemma 2 Let U be an m-dimension vector space,

and be two bases of U, then for any integer , for any k integers 1 , there exist k integers such that and are two new bases of U.

1 2

, , ,

m

α α α

  • 1

2

, , ,

m

β β β

  • 1

k m ≤ ≤

1 2

1

k

i i i m ≤ < < < ≤

  • 1

2

1

k

j j j m ≤ < < < ≤

  • 1

1

1 2

{ , , , } { , , { , , } \ }

k k

m j j i i

α α α β β α α ∪

  • 1

1

1 2

{ , , , } { , , { , , } \ }

k k

m i i j j

β β β α α β β ∪

slide-31
SLIDE 31

2009-9-27

31

Construction based finite field expression

  • C. Carlet, K. Feng, An infinite class of

balanced functions with optimal AI, good immunity to fast algebraic attacks, 2008.

slide-32
SLIDE 32

2009-9-27

32

Construction based finite field expression (Cont.)

Theorem 3 Let n be any integer such that n≥ 2 and a primitive element of the field . Let f be the Boolean function on whose support is . Then f has optimal algebraic immunity .

α

2 n

F

2 n

F

1

2 2 2

{0,1, , , , }

n

α α α

− −

  • 2

n ⎡ ⎤ ⎢ ⎥ ⎢ ⎥

slide-33
SLIDE 33

2009-9-27

33

Outline

Preliminaries on Boolean functions Algebraic attacks and Algebraic immunity The recent constructions of Boolean

functions with MAI

The main results of our paper

slide-34
SLIDE 34

2009-9-27

34

Main idea

We will use a specific order on elements of

. More precisely an element are associated to the integer .

2 n

F

1

( , , )

n

X x x =

  • 1

1

2

n i i i

x

− =

We index from to the elements in

  • f weight arranged in increasing
  • rder .

Y

k

Y

2 n

F

/ 2 1 n ≤ − ⎡ ⎤ ⎢ ⎥

2 n

F

This identification allows us to compare

elements in .

slide-35
SLIDE 35

2009-9-27

35

Two lemmas

Lemma 2 [ A.Canteaut WCC2005]: Let n be odd, and be balanced. Then if and only if f does not have a nonzero annihilator of degree .

n

f B ∈

( ) / 2 AI f n = ⎡ ⎤ ⎢ ⎥

/ 2 1 n ≤ − ⎡ ⎤ ⎢ ⎥

slide-36
SLIDE 36

2009-9-27

36

Two lemmas

Lemma 3[ M.C. Liu Chinacrypt 2008]: Let n be even, , and its weight equals . Then if and only if f does not have a nonzero annihilator of degree

n

f B ∈

/2 1 n i

n i

− =

⎛ ⎞ ⎜ ⎟ ⎝ ⎠

( ) / 2 AI f n = ⎡ ⎤ ⎢ ⎥

/ 2 1 n ≤ − ⎡ ⎤ ⎢ ⎥

slide-37
SLIDE 37

2009-9-27

37

Main idea

Lemma 4: Given a monomial of degree d, then it is 1 on if and

  • nly if which means

. Moreover, this function is equal to zero on the interval , and is equal to 1 on the interval where is the first point in greater than of weight

1 2

1 2

n

y y y n

x x x

  • 1

2

( , , )

n n

X x x F = ∈

  • 1

( , , )

n

Y y y X = ⊂

  • supp( )

supp( ) Y X ⊆ [0, Y)

'

[Y, Y )

'

Y

2 n

F Y

d ≤

slide-38
SLIDE 38

2009-9-27

38

Algorithm 1

Step 1: From i=0 to k-1, choose element in ;

i

X

Step 2: if i=k, choose such that ;

k

X

k k

Y X ⊂

Step 3: Construct such that ;

n

f B ∈

supp( ) { }

k i i

f X

=

=∪

Step 4: Output f, then .

( ) / 2 AI f n = ⎡ ⎤ ⎢ ⎥

1

[ , )

i i

Y Y +

slide-39
SLIDE 39

2009-9-27

39

It is obvious that when n is even the

constructed functions are not balanced

So we give another algorithm for n is

even so that the constructed functions are also balanced

slide-40
SLIDE 40

2009-9-27

40

Algorithm 2

Step 1: From i=0 to k-1, choose element in and ;

i

X

( ) / 2

i

wt X n ≤

Step 2: if i=k, choose such that and ;

k

X

k k

Y X ⊂

( ) / 2

k

wt X n ≤

Step 3: From i=k+1 to , choose any and ;

1

2 1

n− −

1

{ }

i i j j

X X

− =

∉∪

( ) / 2

i

wt X n ≤

Step 4: Construct such that ;

n

f B ∈

1

2 1

supp( ) { }

n

i i

f X

=

=∪

− −

Step 5: Output f, then

.

( ) / 2 AI f n =

1

[ , )

i i

Y Y +

slide-41
SLIDE 41

2009-9-27

41

The enumeration

Theorem 3: Let , then the number of n-variable Boolean functions with MAI in Algorithm 1 is

/ 2 1 c n = − ⎡ ⎤ ⎢ ⎥

( )

min{ , 1} ( 2 ) 1 3 max{1, 3

2 2

c n d n d n t d c t n c d t c d − + − + − − − − = = + −

∏ ∏

slide-42
SLIDE 42

2009-9-27

42

The enumeration

Different from Algorithm 1, the accurate

number of constructed functions in Algorithm 2 is hard to calculate.

We just give a bound of this case during

Theorem 4, and we will not introduce it here.

slide-43
SLIDE 43

2009-9-27

43

The algebraic degree

Based on Theorem 5, we can modify the two

algorithms so that the degree of the constructed n-variable function is n-1.

Lastly, we give an example.

slide-44
SLIDE 44

2009-9-27

44

An example (n=5)

By using Algorithm 1, we choose =

{(00000), (10000), (01000), (11000), (00100), (10100), (11100), (00010), (10010), (11010), (11110), (00001), (10001), (11001), (11101), (00011)}

15

{ }

i i

X

=

The AI of the constructed function is 3, and

its degree is 4.

slide-45
SLIDE 45

2009-9-27

45

Conclusions

We give a new simple method to construct

Boolean functions with maximum algebraic immunity.

However, whether the constructed functions

against FAA and have good nonlinearity need to be further studied.

slide-46
SLIDE 46

2009-9-27

46

Thank you!