Skip to main content
Top
Published in: Designs, Codes and Cryptography 2/2022

15-01-2022

A note on “Cryptographically strong permutations from the butterfly structure”

Authors: Nian Li, Zhao Hu, Maosheng Xiong, Xiangyong Zeng

Published in: Designs, Codes and Cryptography | Issue 2/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Very recently, a class of cryptographically strong permutations with boomerang uniformity 4 and the best known nonlinearity is constructed from the closed butterfly structure in Li et al. (Des Codes Cryptogr 89(4):737–761, 2021). In this note, we provide two additional results concerning these permutations. We first represent the conditions of these permutation obtained in Li et al. (Des Codes Cryptogr 89(4):737–761, 2021) in a much simpler form, and then show that they are linear equivalent to Gold functions. We also prove a criterion for solving a new type of equations over finite fields, which is useful and may be of independent interest.
Literature
2.
go back to reference Boura C., Canteaut A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290–310 (2018).CrossRef Boura C., Canteaut A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290–310 (2018).CrossRef
3.
go back to reference Canteaut A., Duval S., Perrin L.: A generalisation of Dillon’s APN permutation with the best known differential and nonlinear properties for all fields of size \(2^{4k+2}\). IEEE Trans. Inf. Theory 63(11), 7575–7591 (2017).CrossRef Canteaut A., Duval S., Perrin L.: A generalisation of Dillon’s APN permutation with the best known differential and nonlinear properties for all fields of size \(2^{4k+2}\). IEEE Trans. Inf. Theory 63(11), 7575–7591 (2017).CrossRef
4.
go back to reference Cid C., Huang T., Peyrin T., Sasaki Y., Song L.: Boomerang Connectivity Table: A New Cryptanalysis Tool, Advances in Cryptology-EUROCRYPT 2018, Part II, pp. 683–714, Lecture Notes in Comput. Sci., vol. 10821. Springer, Cham (2018). Cid C., Huang T., Peyrin T., Sasaki Y., Song L.: Boomerang Connectivity Table: A New Cryptanalysis Tool, Advances in Cryptology-EUROCRYPT 2018, Part II, pp. 683–714, Lecture Notes in Comput. Sci., vol. 10821. Springer, Cham (2018).
5.
go back to reference Fu S., Feng X., Wu B.: Differentially \(4\)-uniform permutations with the best known nonlinearity from butterflies. IACR Trans. Symmetric Cryptol. 2, 228–249 (2017).CrossRef Fu S., Feng X., Wu B.: Differentially \(4\)-uniform permutations with the best known nonlinearity from butterflies. IACR Trans. Symmetric Cryptol. 2, 228–249 (2017).CrossRef
6.
go back to reference Helleseth T., Kholosha A.: On the equation \(x^{2^l+1}+x+a\) over \({\rm GF}(2^k)\). Finite Fields Appl. 14(1), 159–176 (2008).MathSciNetCrossRef Helleseth T., Kholosha A.: On the equation \(x^{2^l+1}+x+a\) over \({\rm GF}(2^k)\). Finite Fields Appl. 14(1), 159–176 (2008).MathSciNetCrossRef
7.
go back to reference Li K., Qu L., Li C., Chen H.: On a conjecture about a class of permutation quadrinomials. Finite Fields Appl. 66, 101690 (2020).MathSciNetCrossRef Li K., Qu L., Li C., Chen H.: On a conjecture about a class of permutation quadrinomials. Finite Fields Appl. 66, 101690 (2020).MathSciNetCrossRef
8.
go back to reference Li K., Li C., Helleseth T., Qu L.: Cryptographically strong permutations from the butterfly structure. Des. Codes Cryptogr. 89(4), 737–761 (2021).MathSciNetCrossRef Li K., Li C., Helleseth T., Qu L.: Cryptographically strong permutations from the butterfly structure. Des. Codes Cryptogr. 89(4), 737–761 (2021).MathSciNetCrossRef
10.
go back to reference Li N., Xiong M., Zeng X.: On permutation quadrinomials and \(4\)-uniform BCT. IEEE Trans. Inf. Theory 67(7), 4845–4855 (2021).MathSciNetCrossRef Li N., Xiong M., Zeng X.: On permutation quadrinomials and \(4\)-uniform BCT. IEEE Trans. Inf. Theory 67(7), 4845–4855 (2021).MathSciNetCrossRef
11.
go back to reference Li Y., Tian S., Yu Y., Wang M.: On the generalization of butterfly structure. IACR Trans. Symmetric Cryptol. 2, 160–179 (2018).CrossRef Li Y., Tian S., Yu Y., Wang M.: On the generalization of butterfly structure. IACR Trans. Symmetric Cryptol. 2, 160–179 (2018).CrossRef
12.
go back to reference Lidl R., Niederreiter H.: Finite Fields, Encyclopedia of Mathematics, vol. 20. Cambridge University Press, Cambridge (1997). Lidl R., Niederreiter H.: Finite Fields, Encyclopedia of Mathematics, vol. 20. Cambridge University Press, Cambridge (1997).
13.
go back to reference Mesnager S., Kim K., Choe J., Lee D., Go D.: Solving \(x+x^{2^l}+\cdots +x^{2^{ml}}=a\) over \(\mathbb{F}_{2^n}\). Cryptogr. Commun. 12(4), 809–817 (2020).MathSciNetCrossRef Mesnager S., Kim K., Choe J., Lee D., Go D.: Solving \(x+x^{2^l}+\cdots +x^{2^{ml}}=a\) over \(\mathbb{F}_{2^n}\). Cryptogr. Commun. 12(4), 809–817 (2020).MathSciNetCrossRef
14.
go back to reference Perrin L., Udovenko A., Biryukov A.: Cryptanalysis of a Theorem: Decomposing the only known solution to the big APN problem. In: Robshaw M., Katz J. (eds.) LNCS, vol. 9816, pp. 93–122. Springer (2016). Perrin L., Udovenko A., Biryukov A.: Cryptanalysis of a Theorem: Decomposing the only known solution to the big APN problem. In: Robshaw M., Katz J. (eds.) LNCS, vol. 9816, pp. 93–122. Springer (2016).
15.
go back to reference Tu Z., Li N., Zeng X., Zhou J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753–3765 (2020).MathSciNetCrossRef Tu Z., Li N., Zeng X., Zhou J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753–3765 (2020).MathSciNetCrossRef
16.
17.
go back to reference Wagner D.: The boomerang attack. In: Knudsen L.R. (ed.) FSE’1999, LNCS, vol. 1636, pp. 156–170. Springer, Heidelberg (1999). Wagner D.: The boomerang attack. In: Knudsen L.R. (ed.) FSE’1999, LNCS, vol. 1636, pp. 156–170. Springer, Heidelberg (1999).
Metadata
Title
A note on “Cryptographically strong permutations from the butterfly structure”
Authors
Nian Li
Zhao Hu
Maosheng Xiong
Xiangyong Zeng
Publication date
15-01-2022
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 2/2022
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-021-00974-5

Other articles of this Issue 2/2022

Designs, Codes and Cryptography 2/2022 Go to the issue

Premium Partner