Cryptographic Boolean functions with biased inputs

被引:7
|
作者
Gangopadhyay, Sugata [1 ]
Gangopadhyay, Aditi Kar [2 ]
Pollatos, Spyridon [3 ]
Stanica, Pantelimon [3 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee, Uttar Pradesh, India
[2] Indian Inst Technol Roorkee, Dept Math, Roorkee, Uttar Pradesh, India
[3] Naval Postgrad Sch, Dept Appl Math, Monterey, CA 93943 USA
关键词
Boolean functions; Quantum Boolean functions; Bias; Walsh-Hadamard transform; Nega-Hadamard transform; BENT;
D O I
10.1007/s12095-015-0174-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While performing cryptanalysis, it is of interest to approximate a Boolean function in n variables f : F-2(n) -> F-2 by affine functions. Usually, it is assumed that all the input vectors to a Boolean function are equiprobable while mounting affine approximation attack or fast correlation attacks. In this paper we consider a more general case when each component of the input vector to f is independent and identically distributed Bernoulli variates with the parameter p. Since our scope is within the area of cryptography, we initiate an analysis of cryptographic Boolean functions under the previous considerations and derive expression of the analogue of Walsh-Hadamard transform and nonlinearity in the case under consideration. We observe that if we allow p to take up complex values then a framework involving quantum Boolean functions can be introduced, which provides a connection between Walsh-Hadamard transform, nega-Hadamard transform and Boolean functions with biased inputs.
引用
收藏
页码:301 / 314
页数:14
相关论文
共 50 条
  • [1] Cryptographic Boolean functions with biased inputs
    Sugata Gangopadhyay
    Aditi Kar Gangopadhyay
    Spyridon Pollatos
    Pantelimon Stănică
    [J]. Cryptography and Communications, 2017, 9 : 301 - 314
  • [2] Stability of the Walsh–Hadamard spectrum of cryptographic Boolean functions with biased inputs
    Aditi Kar Gangopadhyay
    Vikas Kumar
    Pantelimon Stănică
    Sugata Gangopadhyay
    [J]. Journal of Applied Mathematics and Computing, 2023, 69 : 3337 - 3357
  • [3] Stability of the Walsh-Hadamard spectrum of cryptographic Boolean functions with biased inputs
    Gangopadhyay, Aditi Kar
    Kumar, Vikas
    Stanica, Pantelimon
    Gangopadhyay, Sugata
    [J]. JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2023, 69 (04) : 3337 - 3357
  • [4] Boolean Functions with Biased Inputs: Approximation and Noise Sensitivity
    Heidari, Mohsen
    Pradhan, S. Sandeep
    Venkataramanan, Ramji
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1192 - 1196
  • [5] On cryptographic complexity of Boolean functions
    Carlet, C
    [J]. FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2002, : 53 - 69
  • [6] On the annihilators of cryptographic Boolean functions
    State Key Lab. of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    [J]. Tien Tzu Hsueh Pao, 2006, 1 (51-54):
  • [7] Cryptographic Boolean Functions with R
    Lafitte, Frederic
    Van Heule, Dirk
    Van Hamme, Julien
    [J]. R JOURNAL, 2011, 3 (01): : 44 - 47
  • [8] Cryptographic Boolean Functions and Applications
    Joyner, David
    [J]. CRYPTOLOGIA, 2013, 37 (02) : 189 - 192
  • [9] Metaheuristics in the Optimization of Cryptographic Boolean Functions
    Lopez-Lopez, Isaac
    Sosa-Gomez, Guillermo
    Segura, Carlos
    Oliva, Diego
    Rojas, Omar
    [J]. ENTROPY, 2020, 22 (09)
  • [10] On cryptographic propagation criteria for Boolean functions
    Carlet, C
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 148 - 149