Skip to main content
Erschienen in: Applicable Algebra in Engineering, Communication and Computing 4/2023

06.08.2021 | Original Paper

Using double Weil sums in finding the c-boomerang connectivity table for monomial functions on finite fields

verfasst von: Pantelimon Stănică

Erschienen in: Applicable Algebra in Engineering, Communication and Computing | Ausgabe 4/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we characterize the c-Boomerang Connectivity Table (BCT), \(c\ne 0\) (thus, including the classical \(c=1\) case), for all monomial function \(x^d\) in terms of characters and Weil sums on the finite field \({\mathbb F}_{p^n}\), for an odd prime p. We further simplify these expressions for the Gold functions \(x^{p^k+1}\) for all \(1\le k<n\), and p odd. It is the first such attempt for a complete description for the classical BCT and its relative c-BCT, for all parameters involved, albeit in terms of characters.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat E. Biham, O. Dunkelman, N. Keller, New results on boomerang and rectangle attacks, In: Daemen J., Rijmen V. (eds.), Fast Software Encryption, FSE 2002, LNCS 2365, 2002, pp. 1–16, Springer, Berlin, Heidelberg E. Biham, O. Dunkelman, N. Keller, New results on boomerang and rectangle attacks, In: Daemen J., Rijmen V. (eds.), Fast Software Encryption, FSE 2002, LNCS 2365, 2002, pp. 1–16, Springer, Berlin, Heidelberg
2.
Zurück zum Zitat A. Biryukov, D. Khovratovich, Related-key cryptanalysis of the full AES-\(192\) and AES-\(256\), In: Matsui M. (ed.), Adv. in Crypt. – ASIACRYPT 2009, LNCS 5912, 2009, pp. 1–18, Springer, Berlin, Heidelberg A. Biryukov, D. Khovratovich, Related-key cryptanalysis of the full AES-\(192\) and AES-\(256\), In: Matsui M. (ed.), Adv. in Crypt. – ASIACRYPT 2009, LNCS 5912, 2009, pp. 1–18, Springer, Berlin, Heidelberg
3.
Zurück zum Zitat Boura, C., Canteaut,IE A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290–310 (2018)CrossRef Boura, C., Canteaut,IE A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290–310 (2018)CrossRef
4.
Zurück zum Zitat C. Boura, L. Perrin, S. Tian, Boomerang Uniformity of Popular S-box Constructions, Workshop on Cryptography and Coding 2019, Paper 15, https://www.lebesgue.fr/sites/default/files/proceedings/_20WCC/WCC/_2019/_20paper/_15.pdf C. Boura, L. Perrin, S. Tian, Boomerang Uniformity of Popular S-box Constructions, Workshop on Cryptography and Coding 2019, Paper 15, https://​www.​lebesgue.​fr/​sites/​default/​files/​proceedings/​_​20WCC/​WCC/​_​2019/​_​20paper/​_​15.​pdf
5.
Zurück zum Zitat Budaghyan, L.: Construction and analysis of cryptographic functions. Springer-Verlag (2014)CrossRefMATH Budaghyan, L.: Construction and analysis of cryptographic functions. Springer-Verlag (2014)CrossRefMATH
6.
Zurück zum Zitat Calderini, M., Villa, I.: On the boomerang uniformity of some permutation polynomials. Cryptogr. Commun. 12, 1161–1178 (2020)MathSciNetCrossRefMATH Calderini, M., Villa, I.: On the boomerang uniformity of some permutation polynomials. Cryptogr. Commun. 12, 1161–1178 (2020)MathSciNetCrossRefMATH
7.
Zurück zum Zitat Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 257–397. Press, Cambridge (2010)MATH Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 257–397. Press, Cambridge (2010)MATH
8.
Zurück zum Zitat Carlet, C.: Vectorial Boolean Functions for Cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 398–472. Press, Cambridge (2010)MATH Carlet, C.: Vectorial Boolean Functions for Cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 398–472. Press, Cambridge (2010)MATH
9.
Zurück zum Zitat Carlet, C.: Characterizations of the differential uniformity of vectorial functions by the walsh transform. IEEE Trans. Inf. Theory 64(9), 6443–6453 (2018)MathSciNetCrossRefMATH Carlet, C.: Characterizations of the differential uniformity of vectorial functions by the walsh transform. IEEE Trans. Inf. Theory 64(9), 6443–6453 (2018)MathSciNetCrossRefMATH
11.
Zurück zum Zitat C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, Boomerang Connectivity Table: a new cryptanalysis tool, In: J. B. Nielsen and V. Rijmen (eds.), Adv. in Crypt. – EUROCRYPT ’18, pp. 683–714, Cham, 2018. Springer C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, Boomerang Connectivity Table: a new cryptanalysis tool, In: J. B. Nielsen and V. Rijmen (eds.), Adv. in Crypt. – EUROCRYPT ’18, pp. 683–714, Cham, 2018. Springer
14.
Zurück zum Zitat T. W. Cusick, P. Stănică, Cryptographic Boolean Functions and Applications (Ed. 2), Academic Press, San Diego, CA, 2017 T. W. Cusick, P. Stănică, Cryptographic Boolean Functions and Applications (Ed. 2), Academic Press, San Diego, CA, 2017
15.
Zurück zum Zitat P. Ellingsen, P. Felke, C. Riera P. Stănică, A. Tkachenko, \(C\)-differentials, multiplicative uniformity and (almost) perfect \(c\)-nonlinearity, IEEE Trans. Inf. Theory, 2020, 66:9 (2020), 5781–5789 P. Ellingsen, P. Felke, C. Riera P. Stănică, A. Tkachenko, \(C\)-differentials, multiplicative uniformity and (almost) perfect \(c\)-nonlinearity, IEEE Trans. Inf. Theory, 2020, 66:9 (2020), 5781–5789
16.
Zurück zum Zitat Hasan, S.U., Pal, M., Riera, C., Stănică, P.: On the \(c\)-differential uniformity of certain maps over finite fields, Des. Codes Cryptogr. 89, 221–239 (2021)MathSciNetCrossRefMATH Hasan, S.U., Pal, M., Riera, C., Stănică, P.: On the \(c\)-differential uniformity of certain maps over finite fields, Des. Codes Cryptogr. 89, 221–239 (2021)MathSciNetCrossRefMATH
17.
Zurück zum Zitat Kelsey, J., Kohno, T., Schneier, B., Amplified boomerang attacks against reduced-round MARS and Serpent, In: Goos G., Hartmanis J., van Leeuwen J., Schneier B. (eds,), Fast Software Encryption, FSE, : LNCS 1978. Springer, Berlin, Heidelberg (2000) Kelsey, J., Kohno, T., Schneier, B., Amplified boomerang attacks against reduced-round MARS and Serpent, In: Goos G., Hartmanis J., van Leeuwen J., Schneier B. (eds,), Fast Software Encryption, FSE, : LNCS 1978. Springer, Berlin, Heidelberg (2000)
18.
Zurück zum Zitat Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O.: Related-key boomerang and rectangle attacks: theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948–4966 (2012)MathSciNetCrossRefMATH Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O.: Related-key boomerang and rectangle attacks: theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948–4966 (2012)MathSciNetCrossRefMATH
19.
Zurück zum Zitat Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542–7553 (2019)MathSciNetCrossRefMATH Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542–7553 (2019)MathSciNetCrossRefMATH
21.
Zurück zum Zitat R. Lidl, H. Niederreiter, Finite Fields (Ed. 2), Encycl. Math. Appl., vol.20, Cambridge Univ. Press, Cambridge, 1997 R. Lidl, H. Niederreiter, Finite Fields (Ed. 2), Encycl. Math. Appl., vol.20, Cambridge Univ. Press, Cambridge, 1997
22.
24.
Zurück zum Zitat Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations, Des. Codes Cryptogr. 88, 2233–2246 (2020)MathSciNetCrossRefMATH Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations, Des. Codes Cryptogr. 88, 2233–2246 (2020)MathSciNetCrossRefMATH
25.
Zurück zum Zitat C. Riera, P. Stănică, Investigations on \(c\)-(almost) perfect nonlinear functions, https://arxiv.org/abs/2004.02245 C. Riera, P. Stănică, Investigations on \(c\)-(almost) perfect nonlinear functions, https://​arxiv.​org/​abs/​2004.​02245
27.
Zurück zum Zitat Stănică, P.: Low \(c\)-differential and c-boomerang uniformity of the swapped inverse function. Discrete Mathematics 344(10), 112543 (2021)MathSciNetCrossRefMATH Stănică, P.: Low \(c\)-differential and c-boomerang uniformity of the swapped inverse function. Discrete Mathematics 344(10), 112543 (2021)MathSciNetCrossRefMATH
28.
Zurück zum Zitat Stănică, P., Geary, A.: The \(c\)-differential behavior of the inverse function under the \(EA\)-equivalence. Cryptogr. Commun. 13, 295–306 (2021)MathSciNetCrossRefMATH Stănică, P., Geary, A.: The \(c\)-differential behavior of the inverse function under the \(EA\)-equivalence. Cryptogr. Commun. 13, 295–306 (2021)MathSciNetCrossRefMATH
29.
Zurück zum Zitat Tokareva, N.: Bent Functions. Academic Press, San Diego, CA, Results and Applications to Cryptography (2015)CrossRefMATH Tokareva, N.: Bent Functions. Academic Press, San Diego, CA, Results and Applications to Cryptography (2015)CrossRefMATH
30.
Zurück zum Zitat Tu, Z., Li, N., Zeng, X., Zhou, J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753–3765 (2020)MathSciNetCrossRefMATH Tu, Z., Li, N., Zeng, X., Zhou, J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753–3765 (2020)MathSciNetCrossRefMATH
32.
Zurück zum Zitat D. Wagner, The boomerang attack, In: L. R. Knudsen (ed.), Fast Software Encryption, FSE ’99, LNCS 1636, pages 156–170, 1999, Springer, Heidelberg D. Wagner, The boomerang attack, In: L. R. Knudsen (ed.), Fast Software Encryption, FSE ’99, LNCS 1636, pages 156–170, 1999, Springer, Heidelberg
34.
Zurück zum Zitat Zheng, Y., Wang, Q., Wei, W.: On inverses of permutation polynomials of small degree over finite fields. IEEE Trans. Inf. Theory 66(2), 914–922 (2020)MathSciNetCrossRefMATH Zheng, Y., Wang, Q., Wei, W.: On inverses of permutation polynomials of small degree over finite fields. IEEE Trans. Inf. Theory 66(2), 914–922 (2020)MathSciNetCrossRefMATH
Metadaten
Titel
Using double Weil sums in finding the c-boomerang connectivity table for monomial functions on finite fields
verfasst von
Pantelimon Stănică
Publikationsdatum
06.08.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Applicable Algebra in Engineering, Communication and Computing / Ausgabe 4/2023
Print ISSN: 0938-1279
Elektronische ISSN: 1432-0622
DOI
https://doi.org/10.1007/s00200-021-00520-9

Weitere Artikel der Ausgabe 4/2023

Applicable Algebra in Engineering, Communication and Computing 4/2023 Zur Ausgabe

Premium Partner