Home On a method of synthesis of correlation-immune Boolean functions
Article
Licensed
Unlicensed Requires Authentication

On a method of synthesis of correlation-immune Boolean functions

  • Ekaterina K. Karelina EMAIL logo
Published/Copyright: April 29, 2020

Abstract

An efficient recursive method for synthesis of correlation-immune Boolean functions is proposed. At the first stage, this method uses minimal correlation-immune functions. A classification of 6-variable minimal correlation-immune functions under the Jevons group is put forward. New results on minimal correlation-immune functions are given.


Note: Originally published in Diskretnaya Matematika (2018) 30, №4, 12–28 (in Russian).


  1. Funding: This research was carried out with the financial support of the Russian Foundation for Basic Research (grant no. 16-01-00470-A).

Acknowledgement

The author is deeply indebted to her scientific supervisors O. A. Logachev and E. K. Alekseev for posing the problem, for permanent attention to the work, and their assistance in preparation of the text of this paper.

References

[1] Alekseev E. K., “On some algebraic and combinatorial properties of correlation-immune Boolean functions”, DiscreteMath. Appl., 20:4 (2010), 421–439.10.1515/dma.2010.026Search in Google Scholar

[2] Alekseev E. K., Karelina E. K., “Classification of correlation-immune and minimal correlation-immune Boolean functions of 4 and 5 variables”, Discrete Math. Appl., 25:4 (2015), 193–202.10.1515/dma-2015-0019Search in Google Scholar

[3] Logachev O.A., Saľnikov A.A., Smyshlyaev S.V., Yashchenko V.V., Boolean functions in the coding theory and cryptology, M.: Lenand, 2015 (in Russian), 576 pp.Search in Google Scholar

[4] Tarannikov Yu. V., “On the correlation-immune and stable Boolean functions”, Matematicheskie voprosy kibernetiki, 11 (2002), 91-148 (in Russian).Search in Google Scholar

[5] Tarannikov Yu. V., Combinatorial properties of discrete structures and applications to cryptology, M.: MCCME, 2011 (in Russian), 152 pp.Search in Google Scholar

[6] Alekseev E.K., Karelina E.K., Logachev O.A., “On construction of correlation-immune functions via minimal functions”, Matematicheskie voprosy kriptografii, 9:2 (2018), 7-21.10.4213/mvk251Search in Google Scholar

[7] Braeken A., Borissov Y., Nikova S., Preneel B., “Classification of Boolean functions of 6 variables or less with respect to cryptographic properties”, ICALP 2005, 2005, 324–334.10.1007/11523468_27Search in Google Scholar

[8] Brier E., Langevin P., “Classification of Boolean cubic forms of nine variables”, IEEE Inf. TheoryWorkshop (ITW2003), 2003, 179-182.10.1109/ITW.2003.1216724Search in Google Scholar

[9] Harrison M.A., “On the classification of Boolean functions by the general linear and affine group”, J. SIAM, 12 (1964), 284-299.10.1137/0112026Search in Google Scholar

[10] Maiorana J., “A classification of the cosets of the Reed-Muller code R(1,6)”, Math. Comput., 57:195 (1991), 403-414.10.1090/S0025-5718-1991-1079027-8Search in Google Scholar

[11] Siegenthaler T., “Decrypting a class of stream cipher using ciphertext only”, IEEE Trans. on Computers, 34:1 (1985), 81-85.10.1109/TC.1985.1676518Search in Google Scholar

9 Appendix

Applying the above method of adding new variables to known minimal CI-functions of a small number of variables, we have succeeded in constructing a 4-stable function f0 of 8 variables. This function expands in a sum of 11 minimal CI-functions of 8 variables of weight 10, one minimal CI-function of 8 variables of weight 8, 1 minimal CI-function of 8 variables of weight 6, and 2 minimal CI-functions of 8 variables of weight 2. Any pair of functions from the expansion of f0 satisfies the condition: gh = 0. The minimal CI-functions of 8 variables under consideration were constructed from the known minimal CI-functions of weights 2, 6, 8 and 10 of a small number of variables. The vector of values of the function f0 and its parameters are given below (all vectors of values are shown in hexadecimal notation).

f0=c93696c33c69639c639c3c6996c3c936639c3c6996c3c936c93696c33c69639c

wt(f0) = 128cor(f0) = 4deg(f0) = 3nl(f0) = 64

One can also obtain the function f0 by considering the sum of 15 minimal CI-functions of 8 variables of weight 8, of one minimal CI-function of 8 variables of weight 6, and of one minimal CI-function of 8 variables of weight 2.

Below we show the 7-stable function f1 of 10 variables. This function is expanded in a sum of 83 minimal CI-functions of 10 variables of weight 6, 2 minimal CI-functions of 10 variables of weight 4, and 3 minimal CI-functions of 10 variables of weight 2. Any pair of functions from the expansion of f1 satisfies the condition gh = 0. The minimal CI-functions of 10 variables under consideration were constructed from the known minimal CI-functions of weights 2, 4 and 6 of a small number of variables.

f1=9669699669969669966969966996966969969669966969966996966996696996966969966996966969969669966969969669699669969669699696699669699669969669966969969669699669969669699696699669699696696996699696696996966996696996699696699669699696696996699696699669699669969669

wt(f1) = 512cor(f1) = 7deg(f1) = 2nl(f1) = 256

This function attains its upper nonlinearity bound for 7-stable functions (see, for example, [4]). Note that functions with such parameters may also be constructed by means of the method of [4].

A similar approach was invoked to construct 4- and 6-stable functions which may be expanded in a sum of minimal CI-functions of 11 variables of weight 4, among which any pair of functions satisfies the condition gh = 0. Below we give the vectors of values and parameters of the two stable functions functions f2 and f3 of 11 variables.

f2=c93696c33c69639c639c3c6996c3c93636c9693cc3969c639c63c396693c36c9639c3c6996c3c9369c63c396693c36c9c93696c33c69639c36c9693cc3969c63c93696c33c69639c639c3c6996c3c93636c9693cc3969c639c63c396693c36c9639c3c6996c3c9369c63c396693c36c9c53a5ac33ca5a35c3ac5a53cc35a5ca33ac5a53cc35a5ca3c53a5ac33ca5a35c9c63c396693c36c9639c3c6996c3c9369c63c396693c36c936c9693cc3969c63639c3c6996c3c936c93696c33c69639c36c9693cc3969c63c93696c33c69639c9c63c396693c36c9639c3c6996c3c9369c63c396693c36c936c9693cc3969c63639c3c6996c3c936c93696c33c69639c

wt(f2) = 1024cor(f2) = 4deg(f2) = 6nl(f2) = 768

f3=c93696c33c69639c639c3c6996c3c93636c9693cc3969c639c63c396693c36c9639c3c6996c3c9369c63c396693c36c9c93696c33c69639c36c9693cc3969c63c53a5ac33ca5a35ca35c3ca55ac3c53a3ac5a53cc35a5ca35ca3c35aa53c3ac5a35c3ca55ac3c53a5ca3c35aa53c3ac5c53a5ac33ca5a35c3ac5a53cc35a5ca33ac5a53cc35a5ca3c53a5ac33ca5a35c5ca3c35aa53c3ac5a35c3ca55ac3c53a5ca3c35aa53c3ac53ac5a53cc35a5ca3a35c3ca55ac3c53ac53a5ac33ca5a35c36c9693cc3969c63c93696c33c69639c9c63c396693c36c9639c3c6996c3c9369c63c396693c36c936c9693cc3969c63639c3c6996c3c936c93696c33c69639c

wt(f3) = 1024cor(f3) = 6deg(f3) = 4nl(f3) = 768

Received: 2018-06-02
Revised: 2018-07-26
Published Online: 2020-04-29
Published in Print: 2020-04-28

© 2020 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 30.11.2025 from https://www.degruyterbrill.com/document/doi/10.1515/dma-2020-0008/html
Scroll to top button