期刊文献+

布尔函数线性等价的分析与应用 被引量:5

The Analysis of Linear Equivalence of Boolean Functions and Its Applications
下载PDF
导出
摘要 对于g(x) =f(xA +b) +l·x +c ,给定f(x) ,g(x) ,如何求取等价关系A ,b ,l,c是一个有用的问题 .该文利用Walsh谱和自相关函数谱作为工具 ,给出的算法 1可以求取g(x) =f(xA)型的等价关系 .针对g(x) =f(xA +b)+l·x +c类型的等价关系 ,当b已知时 ,基于Fuller Millan算法给出的算法 2比Fuller Millan算法至少要快k - 1倍 ,其中k为函数绝对自相关函数谱含有的谱类个数 .应用于AES的S 盒的 8个布尔函数间等价关系的求取 ,算法 2比Fuller Millan算法提高速度近 2 0倍 .应用于IP (IsomorphismofPolynomials)问题的分析 ,指出Patarin所给参数的IP问题是可解的 ,因此基于IP问题的密码体制是不安全的 . Let f(x),g(x) be two Boolean functions such that g(x)=f(xA+b)+l·x+c. Given the two functions, how to get equivalence relationship A,b,l,c is a useful problem. Using Walsh transform and autocorrelation transform, authors’ first algorithm can get the equivalence relationship of g(x)=f(xA). To g(x)=f(xA+b)+l·x+c, if b is known, authors’ second algorithm based on Fuller-Millan algorithm is at least k-1 times as fast as the Fuller-Millan algorithm, where k is the number of distinct absolute values of the autocorrelation function of f(x). In analyzing the equivalence relationship of Boolean functions in S -box of AES, the second algorithm is about 20 times as fast as the Fuller-Millan algorithm. In analysis of IP (isomorphism of polynomials) problem over F 2, authors point out that the IP problem with the parameters given by Patarin is solvable and thus the cryptosystem based on it is not secure.
出处 《计算机学报》 EI CSCD 北大核心 2004年第11期1528-1532,共5页 Chinese Journal of Computers
基金 国家自然科学基金 (90 10 40 0 5 66973 0 3 4) 国家"八六三"高技术研究发展计划项目基金 (2 0 0 2AA14 10 5 1) 教育部博士点基金项目 (2 0 0 2 0 4860 46)资助 .
关键词 布尔函数 线性等价 AES IP问题 Boolean functions linear equivalence AES isomorphism of polynomials
  • 相关文献

参考文献10

  • 1Tsai C.C., Malgorzata M.S.. Boolean functions classification via fixed polarity Reed-Muller forms. IEEE Transactions on Computers, 1997, 46(2): 173~186
  • 2Berlekamp E.R., Welch L.R.. Weight distributions of the costs of the (32,6) Reed-Muller code. IEEE Transactions on Information Theory, 1972, 18(1): 202~207
  • 3Maiorana J.A.. A classification of the cosets of the Reed-Muller code R(1,6). Mathematics of Computation, 1991, 57(195): 403~414
  • 4Hou Xiang-Dong.GL(m,2) acting on R(r,m)/R(r-1,m). Discrete Mathematics, 1996, 149(1-3):99-122
  • 5Fuller J., Millan W.. Linear redundancy in S -box. In: Thomas Johansson ed. Fast Software Encryption, Lecture Notes in Computer Science 2887, Berlin: Springer-Verlag, 2003, 74~86
  • 6Millan W., Clark A., Dawson E.. Smart hill climbing finds better Boolean functions. In: Proceedings of the Workshop on Selected Areas in Cryptology 1997, Ottawa, Canada, 1997, 50~63
  • 7Patarin J.. Hidden fields equations and isomorphisms of polynomials: Two new families of asymmetric algorithms. In: Maurer U. ed.. Advances in Cryptology-Eurocrypt'96, Lecture Notes in Computer Science 1070, Berlin: Springer-Verlag, 1996, 33~48
  • 8Feng Deng-Guo. The Theory of Spectra and Its Applications in Cryptography. Beijing: Science Press, 2002(in Chinese)(冯登国.频谱理论及其在密码学中的应用.北京:科学出版社,2000)
  • 9Rothaus O.S.. On "Bent" functions. Journal of Combinatorial Theory, Series A, 1976, 20: 300~305
  • 10Geiselmann W., Meier W., Steinwandt R.. An attack on the isomorphisms of polynomials problem with one secret. International Journal of Information Security, 2003, 2(1): 59~64

同被引文献57

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部