Cryptographic Boolean functions with biased inputs

被引:0
|
作者
Sugata Gangopadhyay
Aditi Kar Gangopadhyay
Spyridon Pollatos
Pantelimon Stănică
机构
[1] Indian Institute of Technology Roorkee,Department of Computer Science and Engineering
[2] Indian Institute of Technology Roorkee,Department of Mathematics
[3] Naval Postgraduate School,Department of Applied Mathematics
来源
关键词
Boolean functions; Quantum Boolean functions; Bias; Walsh–Hadamard transform; Nega-Hadamard transform; 94A60; 94C10; 81P94; 06E30;
D O I
暂无
中图分类号
学科分类号
摘要
While performing cryptanalysis, it is of interest to approximate a Boolean function in n variables f:𝔽2n→𝔽2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$f: {\mathbb {F}_{2}^{n}} \rightarrow \mathbb {F}_{2}$\end{document} by affine functions. Usually, it is assumed that all the input vectors to a Boolean function are equiprobable while mounting affine approximation attack or fast correlation attacks. In this paper we consider a more general case when each component of the input vector to f is independent and identically distributed Bernoulli variates with the parameter p. Since our scope is within the area of cryptography, we initiate an analysis of cryptographic Boolean functions under the previous considerations and derive expression of the analogue of Walsh–Hadamard transform and nonlinearity in the case under consideration. We observe that if we allow p to take up complex values then a framework involving quantum Boolean functions can be introduced, which provides a connection between Walsh-Hadamard transform, nega-Hadamard transform and Boolean functions with biased inputs.
引用
收藏
页码:301 / 314
页数:13
相关论文
共 50 条
  • [1] Cryptographic Boolean functions with biased inputs
    Gangopadhyay, Sugata
    Gangopadhyay, Aditi Kar
    Pollatos, Spyridon
    Stanica, Pantelimon
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (02): : 301 - 314
  • [2] Stability of the Walsh–Hadamard spectrum of cryptographic Boolean functions with biased inputs
    Aditi Kar Gangopadhyay
    Vikas Kumar
    Pantelimon Stănică
    Sugata Gangopadhyay
    [J]. Journal of Applied Mathematics and Computing, 2023, 69 : 3337 - 3357
  • [3] Stability of the Walsh-Hadamard spectrum of cryptographic Boolean functions with biased inputs
    Gangopadhyay, Aditi Kar
    Kumar, Vikas
    Stanica, Pantelimon
    Gangopadhyay, Sugata
    [J]. JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2023, 69 (04) : 3337 - 3357
  • [4] Boolean Functions with Biased Inputs: Approximation and Noise Sensitivity
    Heidari, Mohsen
    Pradhan, S. Sandeep
    Venkataramanan, Ramji
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1192 - 1196
  • [5] On cryptographic complexity of Boolean functions
    Carlet, C
    [J]. FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2002, : 53 - 69
  • [6] On the annihilators of cryptographic Boolean functions
    State Key Lab. of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    [J]. Tien Tzu Hsueh Pao, 2006, 1 (51-54):
  • [7] Cryptographic Boolean Functions with R
    Lafitte, Frederic
    Van Heule, Dirk
    Van Hamme, Julien
    [J]. R JOURNAL, 2011, 3 (01): : 44 - 47
  • [8] Cryptographic Boolean Functions and Applications
    Joyner, David
    [J]. CRYPTOLOGIA, 2013, 37 (02) : 189 - 192
  • [9] Metaheuristics in the Optimization of Cryptographic Boolean Functions
    Lopez-Lopez, Isaac
    Sosa-Gomez, Guillermo
    Segura, Carlos
    Oliva, Diego
    Rojas, Omar
    [J]. ENTROPY, 2020, 22 (09)
  • [10] On cryptographic propagation criteria for Boolean functions
    Carlet, C
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 148 - 149