Construction of cryptographically important Boolean functions

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

Boolean functions are used as nonlinear combining functions in certain stream ciphers. A Boolean function is said to be correlation immune if its output leaks no information about its input values. Balanced correlation immune functions are called resilient functions. Finding methods for easy construction of resilient functions with additional properties is an active research area. Maitra and Pasalic [3] have constructed 8-variable 1-resilient Boolean functions with nonlinearity 116. Their technique interlinks mathematical results with classical computer search. In this paper we describe a new technique to construct 8-variable 1-resilient Boolean functions with the same nonlinearity. Using a similar technique, we directly construct 10-variable (resp. 12-variable), 1-resilient functions with nonlinearity 488 (resp. 1996). Finally, we describe some results on the construction of n-variable t-resilient functions with maximum nonlinearity.
Original languageEnglish
Title of host publicationProgress in Cryptology / Lecture Notes in Computer Science
PublisherSpringer
Pages234-245
Volume2551
DOIs
Publication statusPublished - 2002
EventINDOCRYPT 2002: Third International Conference on Cryptology - India Hyderabad, India
Duration: 2002 Dec 162002 Dec 18

Publication series

Name
Volume2551
ISSN (Print)1611-3349
ISSN (Electronic)0302-9743

Conference

ConferenceINDOCRYPT 2002: Third International Conference on Cryptology
Country/TerritoryIndia
CityIndia Hyderabad
Period2002/12/162002/12/18

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Free keywords

  • function
  • stream cipher
  • combinatorial problems
  • resiliency
  • correlation immunity
  • algebraic degree
  • Boolean function
  • balancedness
  • bent function
  • nonlinearity
  • perfectly nonlinear

Fingerprint

Dive into the research topics of 'Construction of cryptographically important Boolean functions'. Together they form a unique fingerprint.

Cite this