Skip to main content
Top
Published in: Applicable Algebra in Engineering, Communication and Computing 4/2023

06-08-2021 | Original Paper

Using double Weil sums in finding the c-boomerang connectivity table for monomial functions on finite fields

Author: Pantelimon Stănică

Published in: Applicable Algebra in Engineering, Communication and Computing | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper we characterize the c-Boomerang Connectivity Table (BCT), \(c\ne 0\) (thus, including the classical \(c=1\) case), for all monomial function \(x^d\) in terms of characters and Weil sums on the finite field \({\mathbb F}_{p^n}\), for an odd prime p. We further simplify these expressions for the Gold functions \(x^{p^k+1}\) for all \(1\le k<n\), and p odd. It is the first such attempt for a complete description for the classical BCT and its relative c-BCT, for all parameters involved, albeit in terms of characters.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference E. Biham, O. Dunkelman, N. Keller, New results on boomerang and rectangle attacks, In: Daemen J., Rijmen V. (eds.), Fast Software Encryption, FSE 2002, LNCS 2365, 2002, pp. 1–16, Springer, Berlin, Heidelberg E. Biham, O. Dunkelman, N. Keller, New results on boomerang and rectangle attacks, In: Daemen J., Rijmen V. (eds.), Fast Software Encryption, FSE 2002, LNCS 2365, 2002, pp. 1–16, Springer, Berlin, Heidelberg
2.
go back to reference A. Biryukov, D. Khovratovich, Related-key cryptanalysis of the full AES-\(192\) and AES-\(256\), In: Matsui M. (ed.), Adv. in Crypt. – ASIACRYPT 2009, LNCS 5912, 2009, pp. 1–18, Springer, Berlin, Heidelberg A. Biryukov, D. Khovratovich, Related-key cryptanalysis of the full AES-\(192\) and AES-\(256\), In: Matsui M. (ed.), Adv. in Crypt. – ASIACRYPT 2009, LNCS 5912, 2009, pp. 1–18, Springer, Berlin, Heidelberg
3.
go back to reference Boura, C., Canteaut,IE A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290–310 (2018)CrossRef Boura, C., Canteaut,IE A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290–310 (2018)CrossRef
4.
go back to reference C. Boura, L. Perrin, S. Tian, Boomerang Uniformity of Popular S-box Constructions, Workshop on Cryptography and Coding 2019, Paper 15, https://www.lebesgue.fr/sites/default/files/proceedings/_20WCC/WCC/_2019/_20paper/_15.pdf C. Boura, L. Perrin, S. Tian, Boomerang Uniformity of Popular S-box Constructions, Workshop on Cryptography and Coding 2019, Paper 15, https://​www.​lebesgue.​fr/​sites/​default/​files/​proceedings/​_​20WCC/​WCC/​_​2019/​_​20paper/​_​15.​pdf
5.
go back to reference Budaghyan, L.: Construction and analysis of cryptographic functions. Springer-Verlag (2014)CrossRefMATH Budaghyan, L.: Construction and analysis of cryptographic functions. Springer-Verlag (2014)CrossRefMATH
6.
7.
go back to reference Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 257–397. Press, Cambridge (2010)MATH Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 257–397. Press, Cambridge (2010)MATH
8.
go back to reference Carlet, C.: Vectorial Boolean Functions for Cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 398–472. Press, Cambridge (2010)MATH Carlet, C.: Vectorial Boolean Functions for Cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 398–472. Press, Cambridge (2010)MATH
9.
go back to reference Carlet, C.: Characterizations of the differential uniformity of vectorial functions by the walsh transform. IEEE Trans. Inf. Theory 64(9), 6443–6453 (2018)MathSciNetCrossRefMATH Carlet, C.: Characterizations of the differential uniformity of vectorial functions by the walsh transform. IEEE Trans. Inf. Theory 64(9), 6443–6453 (2018)MathSciNetCrossRefMATH
11.
go back to reference C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, Boomerang Connectivity Table: a new cryptanalysis tool, In: J. B. Nielsen and V. Rijmen (eds.), Adv. in Crypt. – EUROCRYPT ’18, pp. 683–714, Cham, 2018. Springer C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, Boomerang Connectivity Table: a new cryptanalysis tool, In: J. B. Nielsen and V. Rijmen (eds.), Adv. in Crypt. – EUROCRYPT ’18, pp. 683–714, Cham, 2018. Springer
14.
go back to reference T. W. Cusick, P. Stănică, Cryptographic Boolean Functions and Applications (Ed. 2), Academic Press, San Diego, CA, 2017 T. W. Cusick, P. Stănică, Cryptographic Boolean Functions and Applications (Ed. 2), Academic Press, San Diego, CA, 2017
15.
go back to reference P. Ellingsen, P. Felke, C. Riera P. Stănică, A. Tkachenko, \(C\)-differentials, multiplicative uniformity and (almost) perfect \(c\)-nonlinearity, IEEE Trans. Inf. Theory, 2020, 66:9 (2020), 5781–5789 P. Ellingsen, P. Felke, C. Riera P. Stănică, A. Tkachenko, \(C\)-differentials, multiplicative uniformity and (almost) perfect \(c\)-nonlinearity, IEEE Trans. Inf. Theory, 2020, 66:9 (2020), 5781–5789
16.
go back to reference Hasan, S.U., Pal, M., Riera, C., Stănică, P.: On the \(c\)-differential uniformity of certain maps over finite fields, Des. Codes Cryptogr. 89, 221–239 (2021)MathSciNetCrossRefMATH Hasan, S.U., Pal, M., Riera, C., Stănică, P.: On the \(c\)-differential uniformity of certain maps over finite fields, Des. Codes Cryptogr. 89, 221–239 (2021)MathSciNetCrossRefMATH
17.
go back to reference Kelsey, J., Kohno, T., Schneier, B., Amplified boomerang attacks against reduced-round MARS and Serpent, In: Goos G., Hartmanis J., van Leeuwen J., Schneier B. (eds,), Fast Software Encryption, FSE, : LNCS 1978. Springer, Berlin, Heidelberg (2000) Kelsey, J., Kohno, T., Schneier, B., Amplified boomerang attacks against reduced-round MARS and Serpent, In: Goos G., Hartmanis J., van Leeuwen J., Schneier B. (eds,), Fast Software Encryption, FSE, : LNCS 1978. Springer, Berlin, Heidelberg (2000)
18.
go back to reference Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O.: Related-key boomerang and rectangle attacks: theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948–4966 (2012)MathSciNetCrossRefMATH Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O.: Related-key boomerang and rectangle attacks: theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948–4966 (2012)MathSciNetCrossRefMATH
19.
go back to reference Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542–7553 (2019)MathSciNetCrossRefMATH Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542–7553 (2019)MathSciNetCrossRefMATH
21.
go back to reference R. Lidl, H. Niederreiter, Finite Fields (Ed. 2), Encycl. Math. Appl., vol.20, Cambridge Univ. Press, Cambridge, 1997 R. Lidl, H. Niederreiter, Finite Fields (Ed. 2), Encycl. Math. Appl., vol.20, Cambridge Univ. Press, Cambridge, 1997
24.
go back to reference Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations, Des. Codes Cryptogr. 88, 2233–2246 (2020)MathSciNetCrossRefMATH Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations, Des. Codes Cryptogr. 88, 2233–2246 (2020)MathSciNetCrossRefMATH
25.
go back to reference C. Riera, P. Stănică, Investigations on \(c\)-(almost) perfect nonlinear functions, https://arxiv.org/abs/2004.02245 C. Riera, P. Stănică, Investigations on \(c\)-(almost) perfect nonlinear functions, https://​arxiv.​org/​abs/​2004.​02245
27.
go back to reference Stănică, P.: Low \(c\)-differential and c-boomerang uniformity of the swapped inverse function. Discrete Mathematics 344(10), 112543 (2021)MathSciNetCrossRefMATH Stănică, P.: Low \(c\)-differential and c-boomerang uniformity of the swapped inverse function. Discrete Mathematics 344(10), 112543 (2021)MathSciNetCrossRefMATH
28.
go back to reference Stănică, P., Geary, A.: The \(c\)-differential behavior of the inverse function under the \(EA\)-equivalence. Cryptogr. Commun. 13, 295–306 (2021)MathSciNetCrossRefMATH Stănică, P., Geary, A.: The \(c\)-differential behavior of the inverse function under the \(EA\)-equivalence. Cryptogr. Commun. 13, 295–306 (2021)MathSciNetCrossRefMATH
29.
go back to reference Tokareva, N.: Bent Functions. Academic Press, San Diego, CA, Results and Applications to Cryptography (2015)CrossRefMATH Tokareva, N.: Bent Functions. Academic Press, San Diego, CA, Results and Applications to Cryptography (2015)CrossRefMATH
30.
go back to reference Tu, Z., Li, N., Zeng, X., Zhou, J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753–3765 (2020)MathSciNetCrossRefMATH Tu, Z., Li, N., Zeng, X., Zhou, J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753–3765 (2020)MathSciNetCrossRefMATH
32.
go back to reference D. Wagner, The boomerang attack, In: L. R. Knudsen (ed.), Fast Software Encryption, FSE ’99, LNCS 1636, pages 156–170, 1999, Springer, Heidelberg D. Wagner, The boomerang attack, In: L. R. Knudsen (ed.), Fast Software Encryption, FSE ’99, LNCS 1636, pages 156–170, 1999, Springer, Heidelberg
34.
go back to reference Zheng, Y., Wang, Q., Wei, W.: On inverses of permutation polynomials of small degree over finite fields. IEEE Trans. Inf. Theory 66(2), 914–922 (2020)MathSciNetCrossRefMATH Zheng, Y., Wang, Q., Wei, W.: On inverses of permutation polynomials of small degree over finite fields. IEEE Trans. Inf. Theory 66(2), 914–922 (2020)MathSciNetCrossRefMATH
Metadata
Title
Using double Weil sums in finding the c-boomerang connectivity table for monomial functions on finite fields
Author
Pantelimon Stănică
Publication date
06-08-2021
Publisher
Springer Berlin Heidelberg
Published in
Applicable Algebra in Engineering, Communication and Computing / Issue 4/2023
Print ISSN: 0938-1279
Electronic ISSN: 1432-0622
DOI
https://doi.org/10.1007/s00200-021-00520-9

Other articles of this Issue 4/2023

Applicable Algebra in Engineering, Communication and Computing 4/2023 Go to the issue

Premium Partner