Computer Science ›› 2013, Vol. 40 ›› Issue (4): 147-151.

Previous Articles     Next Articles

Algebraic Immune Order of Correlation Immune Functions Satisfying Strict Avalanche Criterion

HUANG Jing-lian,WANG Zhuo and ZHANG Zhi-jie   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Using the derivative of Boolean functions and custom e-derivative as a research tool,we discussed the issue of algebraic immunity of H Boolean function with correlation immunity and weight of 2n-1+2n-2 which meets the strict avalanche criterion. We got the optimal algebraic immunity function and its construction method of these functions with odd(n≥17)variables and even(n≥16)variables and gave the construction method of algebraic immunity function with n variables that the algebraic immunity order is AI(f)≥8,also gave the method of solving the annihilator and the minimum algebraic degree annihilators and the derivative relations of annihilator and the Boolean function.The derivative of the Boolean function and the e-derivative defined with derivative can directly and explicitly depict the weight of the Boolean functions as research tools,in-depth to the internal structure of the value of the Boolean function.

Key words: H Boolean function,Correlation immune,Subfunction,Optimal algebraic immunity,Algebraic immunity order

[1] 杜蛟,温巧燕,张劼,等.5元1阶弹性函数的代数免疫阶[J].通信学报,2011,2(4):17-24
[2] Liu W M,Youssef .On the existence of (10,2,7488) resilient functions[J].IEEE Trans Information Theory,2009,5(1):411-412
[3] Xiao Guo-zhen,Massey J L.A Spectral Characterization of Correlation-Immune Combining Functions[J].IEEE Trans.on Inform,1988,4(3):215-220
[4] 温巧燕,钮心忻,杨义先.现代密码学中的布尔函数[M].北京:科学出版社,2000
[5] 李世取,曾本胜,廉玉忠,等.密码学中的逻辑函数[M].北京:北京中软电子出版社,2003
[6] 温巧燕,张劼,钮心忻,等.现代密码学中的布尔函数研究综述[J].电信科学,2004,0(12):43-46
[7] 黄景廉,王卓.H布尔函数的相关免疫性与重量的关系[J].通信学报,2012,33(2):110-118
[8] Li W W,Wang Z,Huang J L.The e-derivative of boolean functions and its application in the fault detection and cryptographic system[J].Kybernetes,2011,40(5/6):905-911
[9] 何亮,王卓,李卫卫.减小平衡H布尔函数相关度的算法和相关问题研究[J].通信学报,2010,1(2):93-99
[10] Ding Y J,Wang Z,Ye J H.Initial-value problem of the Boolean function’s primary function and its application in cryptographic system[J].Kybernetes,2010,39(6):900-906
[11] Delfs H,Knebl H.Introduction to Cryptography[M].Springer-Verlag,2002

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!