计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 349-351.doi: 10.11896/JsJkx.190800124

• 信息安全 • 上一篇    下一篇

基于布尔导数的布尔置换构造

吴万青1, 周国龙1, 马晓雪2   

  1. 1 河北大学网络空间安全与计算机学院 河北 保定 071002;
    2 河北大学计算机教学部 河北 保定 071002
  • 发布日期:2020-07-07
  • 通讯作者: 周国龙(glong_zhou@126.com)
  • 作者简介:wuwanqing8888@126.com
  • 基金资助:
    河北省自然科学基金重点项目(F2019201290)

Construction of Boolean Permutation Based on Derivative of Boolean Function

WU Wan-qing1, ZHOU Guo-long1 and MA Xiao-xue2   

  1. 1 School of Cyber Security and Computer,Hebei University,Baoding,Hebei 071002,China
    2 Department of Computer Teaching,Hebei University,Baoding,Hebei 071002,China
  • Published:2020-07-07
  • About author:WU Wan-qing, born in 1981, Ph.D, lecturer.His main research interests include information security and quantum-resistant cryptography.
  • Supported by:
    This work was supported by the Key ProJects of Hebei Natural Science Foundation (F2019201290).

摘要: 布尔函数导数的性质在密码构造中起着重要的作用。文中利用布尔函数导数的性质,构造了一个新的平衡布尔函数。然后基于平衡布尔函数与布尔置换的关系,构造出一种新的布尔置换。

关键词: 布尔导数, 布尔置换, 平衡布尔函数

Abstract: The properties of Boolean functions derivative play a maJor role in the Cryptosystem structure.This paper proposes a new balanced Boolean function by using the properties of Boolean functions derivative.Then according to the relationship of ba-lanced Boolean functions and Boolean permutation,this paper constructs a new Boolean permutation.

Key words: Balanced Boolean Function, Boolean Permutation, Derivative of Boolean Function

中图分类号: 

  • TP309
[1] 温巧燕.现代密码学中的布尔函数.北京:科学出版社,2000.
[2] 刘师师.基于Rothaus构造的Bent函数构造方法研究.徐州:中国矿业大学,2019.
[3] CADET C.Vectorial Boolean functions for cryptography,Chapter of the monography Boolean Models and Methods in Mathematics,Computer Science,and Engineering.Cambridge:Cambridge University Press.2010:98-469.
[4] PIEPRZYK J,FINKELSTEIN G.Towards effective nonlinearcryptosystem design.IEEE Proceedings of Computers & Digital Techniques,1988,135(6):325-335.
[5] 武传坤.非线性置换的构造.科学通报,1992,37(12):1147-1147.
[6] 武传坤.密码学中的布尔函数.西安:西安电子科技大学,1993.
[7] 邢育森,杨义先.密码体制中的布尔置换的构造与计数.通信学报,1998(3):74-76.
[8] 陈鲁生,符方伟,沈世镒.关于密码体制中布尔置换的构造.工程数学学报,2016,19(2):23-30.
[9] 金君娥,朱华安,谢端强.密码体制中布尔置换的构造.国防科技大学学报,2003,25(5):90-93.
[10] ZHANG W,WU C K,LI S.Construction of Cryptographically Important Boolean Permutations.Applicable Algebra in Engineering Communication & Computing,2004,15(3/4):173-177.
[11] 何良生.布尔函数的统计独立性.计算机科学,2008,35(1):83-86.
[12] CARLET C,FENG K.An infinite class of balanced vectorial Boolean functions with optimum algebraic immunity and good nonlinearity//IWCC 2009.2009:1-11.
[13] FENG K,LIAO Q,YANG J.Maximal values of generalized algebraic immunity.Designs,Codes and Cryptography,2009,50(2):243-252.
[14] 郑浩然,张海模,樊东.对一个正形置换构造方法的修正及其计数结果的改进.通信学报,2009(12):51-55,63.
[15] 张凤荣.密码学中布尔函数及多输出布尔函数的构造.西安:西安电子科技大学,2012.
[16] COULTER R S,MESNAGER S.Bent functions from involutions over F2n.IEEE Transactions on Information Theory,2017,PP(99):1-1.
张志杰,王卓,李卫卫.E-导数在Bent函数研究中的应用//中国通信学会第五届学术年会论文集.2008.
[1] 宁晗阳, 马苗, 杨波, 刘士昌.
密码学智能化研究进展与分析
Research Progress and Analysis on Intelligent Cryptology
计算机科学, 2022, 49(9): 288-296. https://doi.org/10.11896/jsjkx.220300053
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠.
基于战术关联的网络安全风险评估框架
Network Security Risk Assessment Framework Based on Tactical Correlation
计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171
[4] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[5] 窦家维.
保护隐私的汉明距离与编辑距离计算及应用
Privacy-preserving Hamming and Edit Distance Computation and Applications
计算机科学, 2022, 49(9): 355-360. https://doi.org/10.11896/jsjkx.220100241
[6] 高春刚, 王永杰, 熊鑫立.
MTDCD:一种对抗网络入侵的混合防御机制
MTDCD:A Hybrid Defense Mechanism Against Network Intrusion
计算机科学, 2022, 49(7): 324-331. https://doi.org/10.11896/jsjkx.210600193
[7] 梁珍珍, 徐明.
基于海洋水声信道的密钥协商方案
Key Agreement Scheme Based on Ocean Acoustic Channel
计算机科学, 2022, 49(6): 356-362. https://doi.org/10.11896/jsjkx.210400097
[8] 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏.
基于网络媒体的非线性动力学信息传播模型
Nonlinear Dynamics Information Dissemination Model Based on Network Media
计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043
[9] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[10] 卫宏儒, 李思月, 郭涌浩.
基于智能合约的秘密重建协议
Secret Reconstruction Protocol Based on Smart Contract
计算机科学, 2022, 49(6A): 469-473. https://doi.org/10.11896/jsjkx.210700033
[11] 梁懿雯, 杜育松.
抵御计时攻击的基于Knuth-Yao的二元离散高斯采样算法
Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao
计算机科学, 2022, 49(6A): 485-489. https://doi.org/10.11896/jsjkx.210600017
[12] 闫萌, 林英, 聂志深, 曹一凡, 皮欢, 张兰.
一种提高联邦学习模型鲁棒性的训练方法
Training Method to Improve Robustness of Federated Learning
计算机科学, 2022, 49(6A): 496-501. https://doi.org/10.11896/jsjkx.210400298
[13] 陈彦冰, 钟超然, 周超然, 薛凌妍, 黄海平.
基于医疗联盟链的跨域认证方案设计
Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain
计算机科学, 2022, 49(6A): 537-543. https://doi.org/10.11896/jsjkx.220200139
[14] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[15] 刘林云, 陈开颜, 李雄伟, 张阳, 谢方方.
基于卷积神经网络的旁路密码分析综述
Overview of Side Channel Analysis Based on Convolutional Neural Network
计算机科学, 2022, 49(5): 296-302. https://doi.org/10.11896/jsjkx.210300286
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!