Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity

@inproceedings{Filiol1998HighlyNB,
  title={Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity},
  author={Eric Filiol and Caroline Fontaine},
  booktitle={EUROCRYPT},
  year={1998}
}
We study a corpus of particular Boolean functions: the idempotents. They enable us to construct functions which achieve the best possible tradeoffs between the cryptographic fundamental properties: balancedness, correlation-immunity, a high degree and a high nonlinearity (that is a high distance from the affine functions). They all represent extremely secure cryptographic primitives to be implemented in stream ciphers. 
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions
TLDR
This paper establishes the maximum non linearity for a fixed resiliency in certain cases and presents a simple search algorithm for finding Boolean functions with good nonlinearity and some fixed Resiliency.
Further constructions of resilient Boolean functions with very high nonlinearity
TLDR
A design of good combining Boolean functions that provide resilient Boolean functions with currently best known nonlinearity and achieve the provable upper bound on non linearity for resilience Boolean functions.
A Brief Outline of Research on Correlation Immune Functions
  • B. Roy
  • Computer Science, Mathematics
    ACISP
  • 2002
TLDR
This paper outlines the development in the field of constructing correlation immune Boolean functions with high nonlinearity and algebraic degree and briefly survey related issues in this area.
Two New Constructions of Resilient Boolean Functions Satisfying Propagation Criterion
Recently the relationships among cryptographic criteria of boolean functions, including balancedness, the algebraic degree, nonlinearity, propagation criterion and correlation immunity, have been
Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks
TLDR
Three 8-bit highly nonlinear balanced Boolean functions have been evolved in this work that have higher DPA resistance than others published previously.
Boolean functions with all main cryptographic properties
TLDR
A class of 2k-variable Boolean functions which have optimal algebraic degree, very high nonlinearity, and are 1-resilient is proposed, and it can be shown that the algebraic immunity of these functions is at least suboptimal.
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions
TLDR
It is shown that high nonlinearity is a necessary condition to resist algebraic attack and how the Walsh spectra values are related to the algebraic immunity (resistance against algebraic attacked) of a Boolean function is explained.
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions
TLDR
It is proved that highly nonlinear functions usually have good propagation properties regarding different criteria and that most highly non linear functions with a three-valued Walsh spectrum can be transformed into 1-resilient functions.
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
TLDR
An operational reconstruction technique of most stream ciphers is presented, primarily exposed for key-stream generators which consist of several linear feedback shift registers combined by a nonlinear Boolean function.
Nonlinearity Measures of Boolean Functions
TLDR
These properties of Boolean functions, including algebraic degree, linear structure property, and higher-order nonlinearity, are extensively studied in this chapter.
...
...

References

SHOWING 1-10 OF 22 REFERENCES
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications
TLDR
A new algorithm is developed for making attacks to certain comparatively simple LFSR based ciphersystems and is applied to crack the random bit generators of Geffe and Beth-Piper.
Correlation-immunity of nonlinear combining functions for cryptographic applications
TLDR
A new class of combining functions is presented, which provides better security against correlation attacks, and the security is quantified by the smallest number m + 1 of subsequences that must be simultaneously considered in a correlation attack.
Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity
TLDR
A general explicit construction of bent functions is described, which unifies well known constructions due to Maiorana-McFarland and Dillon as two opposite extremal cases and finds new ways to generate bent functions.
Nonlinearity Criteria for Cryptographic Functions
TLDR
Nonlinearity criteria for Boolean functions are classified in view of their suitability for cryptographic design and two criteria turn out to be of special interest, the distance to linear structures and the Distance to affine functions, which are shown to be invariant under all affine transformations.
On A Fast Correlation Attack on Certain Stream Ciphers
TLDR
A new algorithm for the recovery of the initial state of a linear feedback shift register when a noisy output sequence is given and the results show the importance of low-weight checks and show that the complexity of the recovery problem grows less than exponentially with the length of the shift register.
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence
A novel fast algorithm for the correlation attack on a class of stream ciphers is proposed. The algorithm is based on the error correction principle and the finite-state matrix representation of a
Decrypting a Class of Stream Ciphers Using Ciphertext Only
  • T. Siegenthaler
  • Computer Science, Mathematics
    IEEE Transactions on Computers
  • 1985
TLDR
The conclusion from the analysis is that the pseudonoise generator's output sequence and the sequences generated by the linear feedback shift registers should be uncorrelated, which leads to constraints for the nonlinear combining function to be used.
Some Applications of Coding Theory in Cryptography
The applicability of techniques in coding theory to problems in cryptography is illustrated by examples concerning secret-sharing schemes with tailored access priveleges, the design of perfect local
On Correlation-Immune Functions
TLDR
A recursive definition of any correlation-immune function of maximal degree is given and the set of quadratic balanced correlation- immune functions of maximal order is described.
Idempotents and the BCH bound
Using a characterization of the idempotents of a narrow-sense primitive binary BCH code, the authors are able to give classes of such codes whose minimum distance does not exceed the BCH bound. Their
...
...