optimal boolean functions
play

Optimal Boolean Functions Irene Villa UiB - Universitetet i Bergen - PowerPoint PPT Presentation

Optimal Boolean Functions Irene Villa UiB - Universitetet i Bergen Selmer center Finse 2018 Communicate a secret message Communicate a secret message Cipher: M set of possible messages k K key-space k : M M encryption function


  1. Optimal Boolean Functions Irene Villa UiB - Universitetet i Bergen Selmer center Finse 2018

  2. Communicate a secret message

  3. Communicate a secret message Cipher: M set of possible messages k ∈ K key-space ϕ k : M → M encryption function

  4. Block ciphers Example of translation based cipher

  5. Vectorial Boolean Function Given n , m integers, an (n , m)-function is a function that transform a sequence of n bits into a sequence of m bits,

  6. Vectorial Boolean Function Given n , m integers, an (n , m)-function is a function that transform a sequence of n bits into a sequence of m bits, F : F n 2 → F m with F 2 = { 0 , 1 } 2  f 1 ( x 1 , . . . , x n )  . .  , f i : F n F ( x 1 , . . . , x n ) = 2 → F 2   .  f m ( x 1 , . . . , x n )

  7. Vectorial Boolean Function Given n , m integers, an (n , m)-function is a function that transform a sequence of n bits into a sequence of m bits, F : F n 2 → F m with F 2 = { 0 , 1 } 2  f 1 ( x 1 , . . . , x n )  . .  , f i : F n F ( x 1 , . . . , x n ) = 2 → F 2   .  f m ( x 1 , . . . , x n ) If n = m an equivalent representation (univariate polynomial) F ( x ) = � 2 n − 1 F : F 2 n → F 2 n i =0 c i x i , c i ∈ F 2 n .

  8. Symmetric ciphers are designed by appropriate composition of nonlinear Boolean functions → in block ciphers the security depends on S-boxes

  9. Symmetric ciphers are designed by appropriate composition of nonlinear Boolean functions → in block ciphers the security depends on S-boxes Most cryptographic attacks ⇓ mathematical properties that measure the resistance of the S-box

  10. Symmetric ciphers are designed by appropriate composition of nonlinear Boolean functions → in block ciphers the security depends on S-boxes Most cryptographic attacks ⇓ mathematical properties that measure the resistance of the S-box ◮ differential attack ◮ linear cryptanalysis

  11. ◮ DIFFERENTIAL ATTACK

  12. ◮ DIFFERENTIAL ATTACK how differences in an input can affect the resulting difference at the output.   x → → y  F    x + a → → y + b a , b ∈ F n a � = 0 |{ x ∈ F n : F ( a + x ) − F ( x ) = b }| δ = max a a

  13. ◮ DIFFERENTIAL ATTACK ⇒ differential δ -uniformity how differences in an input can affect the resulting difference at the output.   x → → y  F    x + a → → y + b 2 a � = 0 |{ x ∈ F n δ = max 2 : F ( a + x ) − F ( x ) = b }| a , b ∈ F n

  14. ◮ DIFFERENTIAL ATTACK ⇒ differential δ -uniformity how differences in an input can affect the resulting difference at the output.   x → → y  F    x + a → → y + b 2 a � = 0 |{ x ∈ F n δ = max 2 : F ( a + x ) − F ( x ) = b }| a , b ∈ F n ◮ best resistance when δ = 2 n − m : PERFECT NONLINEAR (PN) n even and m ≤ n 2 ◮ if n = m smallest δ = 2: ALMOST PERFECT NONLINEAR (APN)

  15. ◮ LINEAR CRYPTANALYSIS

  16. ◮ LINEAR CRYPTANALYSIS finding affine approximations to the action of a cipher g : F n 2 → F 2 is affine if degree is at most 1 ( g ∈ A ) a d H ( f , g ) = |{ x ∈ F n 2 : f ( x ) � = g ( x ) }| (Hamming distance) a d H ( λ · F , g ) ≤ 2 n − 1 − 2 n 2 − 1 NL ( F ) = min g ∈A ,λ ∈ F m ∗ 2 a m ≤ n 2

  17. ◮ LINEAR CRYPTANALYSIS ⇒ nonlinearity NL finding affine approximations to the action of a cipher g : F n 2 → F 2 is affine if degree is at most 1 ( g ∈ A ) a d H ( f , g ) = |{ x ∈ F n 2 : f ( x ) � = g ( x ) }| (Hamming distance) a d H ( λ · F , g ) ≤ 2 n − 1 − 2 n 2 − 1 NL ( F ) = min g ∈A ,λ ∈ F m ∗ 2

  18. ◮ LINEAR CRYPTANALYSIS ⇒ nonlinearity NL finding affine approximations to the action of a cipher g : F n 2 → F 2 is affine if degree is at most 1 ( g ∈ A ) a d H ( f , g ) = |{ x ∈ F n 2 : f ( x ) � = g ( x ) }| (Hamming distance) a d H ( λ · F , g ) ≤ 2 n − 1 − 2 n 2 − 1 NL ( F ) = min g ∈A ,λ ∈ F m ∗ 2 ◮ best resistance when NL is maximum: BENT n even and m ≤ n 2 ◮ if n = m : NL ( F ) ≤ 2 n − 1 − 2 n − 1 ALMOST BENT (AB) 2

  19. CCZ-equivalence relation Most general equivalence relation known that preserves δ and NL Graph of a function F : Γ F = { ( x , F ( x )) : x ∈ F n 2 } a F 1 and F 2 are CCZ-equivalent if L (Γ F 1 ) = Γ F 2 , for an affine permutation L .

  20. OPTIMAL BOOLEAN FUNCTIONS F : F n 2 → F n 2 or equivalently F : F 2 n → F 2 n F ( x ) = � 2 n − 1 i =0 c i x i . we are interested in APN and AB functions

  21. OPTIMAL BOOLEAN FUNCTIONS F : F n 2 → F n 2 or equivalently F : F 2 n → F 2 n F ( x ) = � 2 n − 1 i =0 c i x i . we are interested in APN and AB functions Other applications of APN and AB functions: • coding theory • sequence design • combinatorial analysis

  22. On APN and AB functions F : F 2 n → F 2 n ◮ classification of APN, AB f. is an hard open problem ◮ complete classification known only for n ≤ 5 ◮ few infinite classes of APN and AB functions known • 6 infinite families of power APN f. (4 are also AB) (for example x 2 i +1 with gcd( i , n )=1) • 11 infinite families of quadratic APN f. (4 are also AB) ◮ even for small n there are too many vectorial Boolean functions to just use a purely computer search ◮ just one APN permutation is known in even dimension

  23. We have to come up with new methods to construct new optimal functions and to analyse them ◮ combination of theoretic results and computational insights to find new families ◮ studying equivalence relations between already known functions ◮ finding new invariant of the CCZ-equivalence to easily prove CCZ-inequivalent functions ◮ finding more general equivalence relations that preserve optimal properties

  24. Example ◮ many known APN functions in small dimensions are of the form F ( x ) = L 1 ( x 3 ) + L 2 ( x 9 ), with L 1 , L 2 linear functions: • x 3 and x 3 + Tr ( x 9 ) are infinite families of APN functions • for n = 8 out of 23 APN functions (2008) 17 are of this form

  25. Example ◮ many known APN functions in small dimensions are of the form F ( x ) = L 1 ( x 3 ) + L 2 ( x 9 ), with L 1 , L 2 linear functions: • x 3 and x 3 + Tr ( x 9 ) are infinite families of APN functions • for n = 8 out of 23 APN functions (2008) 17 are of this form ◮ theoretical properties and restrictions on L 1 and L 2 for such function to be APN in F 2 n : • if F ( x ) is APN for an even n then F ( a ) � = 0 for any a � = 0; • if F ( x ) is APN for n = 6 m then L 1 ( a 3 β ) � = 0 for any a � = 0 2 3 with Tr 3 ( β ) = β 2 2 + β 2 + β = 0; and β ∈ F ∗

  26. Example ◮ many known APN functions in small dimensions are of the form F ( x ) = L 1 ( x 3 ) + L 2 ( x 9 ), with L 1 , L 2 linear functions: • x 3 and x 3 + Tr ( x 9 ) are infinite families of APN functions • for n = 8 out of 23 APN functions (2008) 17 are of this form ◮ theoretical properties and restrictions on L 1 and L 2 for such function to be APN in F 2 n : • if F ( x ) is APN for an even n then F ( a ) � = 0 for any a � = 0; • if F ( x ) is APN for n = 6 m then L 1 ( a 3 β ) � = 0 for any a � = 0 2 3 with Tr 3 ( β ) = β 2 2 + β 2 + β = 0; and β ∈ F ∗ ◮ with some restrictions it is possible to perform a lighter computational search in bigger dimensions

  27. Example ◮ many known APN functions in small dimensions are of the form F ( x ) = L 1 ( x 3 ) + L 2 ( x 9 ), with L 1 , L 2 linear functions: • x 3 and x 3 + Tr ( x 9 ) are infinite families of APN functions • for n = 8 out of 23 APN functions (2008) 17 are of this form ◮ theoretical properties and restrictions on L 1 and L 2 for such function to be APN in F 2 n : • if F ( x ) is APN for an even n then F ( a ) � = 0 for any a � = 0; • if F ( x ) is APN for n = 6 m then L 1 ( a 3 β ) � = 0 for any a � = 0 2 3 with Tr 3 ( β ) = β 2 2 + β 2 + β = 0; and β ∈ F ∗ ◮ with some restrictions it is possible to perform a lighter computational search in bigger dimensions • n = 8 x 9 + L ( x 3 ) w. L ( x ) = α x 4 + α − 1 x 2 + α − 2 x is APN • n = 10 x 9 + L ( x 3 ) w. L ( x ) = α x 4 + α − 1 x 2 + α − 2 x is APN

  28. Example ◮ many known APN functions in small dimensions are of the form F ( x ) = L 1 ( x 3 ) + L 2 ( x 9 ), with L 1 , L 2 linear functions: • x 3 and x 3 + Tr ( x 9 ) are infinite families of APN functions • for n = 8 out of 23 APN functions (2008) 17 are of this form ◮ theoretical properties and restrictions on L 1 and L 2 for such function to be APN in F 2 n : • if F ( x ) is APN for an even n then F ( a ) � = 0 for any a � = 0; • if F ( x ) is APN for n = 6 m then L 1 ( a 3 β ) � = 0 for any a � = 0 2 3 with Tr 3 ( β ) = β 2 2 + β 2 + β = 0; and β ∈ F ∗ ◮ with some restrictions it is possible to perform a lighter computational search in bigger dimensions • n = 8 x 9 + L ( x 3 ) w. L ( x ) = α x 4 + α − 1 x 2 + α − 2 x is APN • n = 10 x 9 + L ( x 3 ) w. L ( x ) = α x 4 + α − 1 x 2 + α − 2 x is APN ◮ when n is even the function x 9 + L ( x 3 ) is APN in F 2 n with L ( x ) = γ x 4 + γ − 1 x 2 + γ − 2 x for any γ that is not a cube

Recommend


More recommend