The Structure of the Boolean–Zhegalkin Transform

Total Page:16

File Type:pdf, Size:1020Kb

The Structure of the Boolean–Zhegalkin Transform Annales Univ. Sci. Budapest., Sect. Comp. 23 (2004) 25-40 THE STRUCTURE OF THE BOOLEAN{ZHEGALKIN TRANSFORM J. Gonda (Budapest, Hungary) Dedicated to Professor I. K¶ataion his 65th birthday Abstract. In [6] a linear algebraic aspect is given for the transformation of a Boolean function to its Zhegalkin-representation. In this article, we investigate the linear-algebraic structure of that transform. In this article the elements of the ¯eld with two elements are denoted by 0 and 1; N0 denotes the non-negative integers, and N the positive ones. In [6] we pointed out that if we consider the coe±cients of a Boolean function of n variables and the coe±cients of the Zhegalkin polynomial of n variables, respectively, as the components of an element of a 2n-dimensional linear space over F2, then the relation between the vectors belonging to the two representations of the same Boolean function of n variables could be given by k = A(n)®. Here k is the vector containing the components of the Zhegalkin polynomial, ® is the vector, composed by the coe±cients of the Boolean representation of the given function, and A(n) is the matrix of the transform in the natural basis. In the article mentioned above is proved that 8 (1); if n = 0; <> (n) µ ¶ A = A(n¡1) 0(n¡1) :> ; if n 2 N; A(n¡1) A(n¡1) and as a consequence that 2 A(n) = I(n); where I(n) and 0(n) denote the 2n-dimensional identity and zero matrix, respectively. From this follows that if k = A(n)®, then ® = A(n)k. 26 J. Gonda In the following part of our article, we consider the transform given above by A(n). Theorem 1. 8 (1 + ¸)I(n); if n = 0; <> (n) (n) µ ¶ A + ¸I ´ I(n¡1) 0(n¡1) :> ; if n 2 N; 0(n¡1) (1 + ¸2)I(n¡1) where U(¸) ´ V(¸) means that the two ¸-matrices are equivalent, that is there are invertible ¸-matrices R(¸) and L(¸) so, that V(¸) = L(¸)U(¸)R(¸). Proof. If n = 0, then A(n) +¸I(n) = A(0) +¸I(0) = (1)+¸(1) = (1+¸)(1) = (1+¸)I(0) = (1+¸)I(n): Now let n 2 N0; µ ¶ µ ¶ 0(n) A(n) I(n) A(n) + ¸I(n) = L(n+1)(¸); = R(n+1)(¸) I(n) I(n) + ¸A(n) 0(n) A(n) µ ¶ I(n) 0(n) and let C(n+1)(¸) denote , then 0(n) (1 + ¸2)I(n) µ ¶ 0(n) A(n) L(n+1)(¸)A(n+1)R(n+1)(¸) = £ I(n) I(n) + ¸A(n) µ ¶ µ ¶ A(n) + ¸I(n) 0(n) I(n) A(n) + ¸I(n) £ = A(n) A(n) + ¸I(n) 0(n) A(n) µ ¶ I(n) 0(n) = = C(n+1)(¸); 0(n) (1 + ¸2)I(n) ³ ´ ¡ ¢2 ¡ ¢ ¡ ¢2 ¡ ¡ ¢¢2 A(n) = I(n), so 1 = det I(n) = det A(n) = det A(n) , ¡ ¢ ¡ ¢ ¡ ¢ and then det A(n) = 1. As det L(n+1)(¸) = det A(n) , we get that ¡ ¢ det L(n+1)(®) = 1. With a similar calculation we can get that ³ ´ det R(n+1)(®) = 1; so L(¸) and R(¸) are invertible matrices, and ³ ´ C(n+1) = L(n+1)(¸) A(n+1) + ¸I(n+1) R(n+1)(¸); The structure of the Boolean-Zhegalkin transform 27 i.e. the two matrices are equivalent. From the previous theorem, we can get many results. First, we can read out the minimal polynomial and characteristic polynomial of A(n). Corollary 2. If ¹(n) denotes the minimal polynomial of A(n), and c(n) denotes its characteristic polynomial, then ( ¸ + 1; if n = 0; ¹(n) = ¸2 + 1; if n 2 N; n c(n) = ¸2 + 1: Proof. The minimal polynomial of a quadratic matrix is its last invari- ant factor, in our case the abovementioned polynomials. The characteristic polynomial is the product of the invariant factors. If n = 0, then the 0 only invariant factor is ¸ + 1, and ¸2 + 1 = ¸ + 1. In the case, when n 2 N, that is when n ¸ 1, then there are 2n¡1 invariant factors equal to 1, and each of the further 2n¡1 invariant factors is equal to ¸2 + 1, so n¡1 n¡1 n c(n) = (¸2 + 1)2 = (¸2)2 + 1 = ¸2 + 1. The results mentioned above are not surprising. A(0) + ¸I(0) = (1 + ¸) and det((1 + ¸)) = ¸ + 1, so ¸ + 1 2 F2[¸] is the characteristic polynomial of A(0). The degree of that polynomial is equal to 1, which is the order of the matrix A(0). As there is no nonzero polynomial of degree less than 1, of which A(0) is the root, ¸ + 1 is the minimal polynomial of A(0), as well. Now let n > 0, then A(n) 6= I(n) and A(n) 6= 0(n), so neither ¸ nor ¸ + 1 2 can be the minimal polynomial of the matrix. On the other hand, A(n) = = I(n) shows, that A(n) is the root of the monic polynomial ¸2 + 1, and the minimal polynomial of a matrix is uniquely determined. Now let us consider the characteristic polynomial of A(n). The degree of that polynomial is equal to 2n, and the set of the roots of the characteristic polynomial is equal to the 2 2 set of the roots of the minimal polynomial. As ¸ + 1 = (¸ + 1) over F2, the only root of the minimal polynomial is 1. From this follows the characteristic polynomial of A(n) is a polynomial of degree 2n with exactly one root, namely n n 1. The only (monic) polynomial with these properties is (¸ + 1)2 = ¸2 + 1, n and then the characteristic polynomial of A(n) is ¸2 + 1. n Another simple way to prove ¸2 + 1 is the minimal polynomial of A(n) is 0 n¡1 as follows. We saw above, that c(0) = ¸ + 1 = ¸2 + 1. If c(n¡1) = ¸2 + 1, then c(n) = 28 J. Gonda ³ ´ µµ ¶¶ A(n¡1) + ¸I(n¡1) 0(n¡1) = det A(n) + ¸I(n) = det = A(n¡1) A(n¡1) + ¸I(n¡1) ³ ³ ´´ ³ ´ ³ ´ 2 2 n¡1 2 n¡1 2 = det A(n¡1) + ¸I(n¡1) = c(n¡1) = ¸2 + 1 = ¸2 + 1 = n = ¸2 + 1; n so for any nonnegative integer n c(n) = ¸2 + 1. n+1 Corollary 3. For any n 2 N0 the 2 dimensional linear space over F2 is a direct sum of 2n two-dimensional cyclic subspaces invariant with respect to A(n+1). Proof. The only invariant factor of A(n+1) is equal to ¸2 + 1 and the multiplicity of that invariant factor is equal to 2n. From this two facts immediately follows the statement above. Let A » B denote that the matrices A and B are similar, that is there is an invertible matrix T so, that B = T¡1AT. Corollary 4. 8 > B(0) = (1) = A(0); > > µ ¶ <> (1) 0 1 A(n) » B = ; > 1 0 > µ ¶ > B(n¡1) 0(n¡1) :> B(n) = ; 1 < n 2 N; 0(n¡1) B(n¡1) where for any nonnegative integer n B(n) is the Jordan matrix of A(n). Proof. c(0)(¸) = ¸ + 1 = ¹(0)(¸) and c(1)(¸) = ¸2 + 1 = ¹(1)(¸), that is 0 1 the 2 - and the 2 -dimensional linear spaces over F2 are cyclic and invariant with respect to A(0) and A(1), respectively. In such a case the Jordan matrix of (0) (1) A and A is equal to the companionµ ¶ matrix of their minimal polynomial, 0 1 and then B(0) = (1) and B(1) = . 1 0 Now if n > 1, then by Corollary 3 the 2n-dimensional linear space over n¡1 F2 is the direct sum of 2 two-dimensional cyclic spaces invariant to the transform represented by A(n) in the canonical basis of the space. The Jordan matrix of such a transform is the hypermatrix containing 2n¡1 blocks equal to B(1) in the main diagonal, and the zero matrix of order two in the other positions of that matrix. But the structure of B(1) corresponds to that form, and if the structure of B(n), where n 2 N, satis¯es this rule, then B(n+1) satis¯es, too. The structure of the Boolean-Zhegalkin transform 29 Corollary 5. 8 > C(0) = (1) = A(0); > > µ ¶ <> (1) 1 1 A(n) » C = ; > 0 1 > µ ¶ > C(n¡1) 0(n¡1) :> ; 1 < n 2 N; 0(n¡1) C(n¡1) where C(n) is the classical canonical matrix of A(n). Proof. c(0)(¸) = ¸ + 1 = ¹(0)(¸), and then the classical canonical matrix of A(0) is the identity matrix of order 1, that is C(0) = (1). (2) 2 2 Over F2 ¹µ (¸) =¶ ¸ + 1 = (¸ + 1) , so the classical canonical matrix of 1 1 A(1) is C(1) = , and for n > 1 we can argue similarly as we do it in the 0 1 proof of Corollary 4, substituting the Jordan matrix by the classical canonical matrix, and B(1); B(n) and B(n+1) by C(1); C(n) and C(n+1), respectively. n Now we can give a basis of the 2 -dimensional linear space over F2, in which the matrix of the transform represented by A(n) in the canonical basis (n) n (n;i) of the space is equal to B . For n 2 N and 2 > i 2 N0 let e be the i-th n vector of the canonical basis of the 2 -dimensional linear space over F2, that (n;i) n is the j-th component of e , where 2 > j 2 N0, is equal to ½ 1; if i = j, e(n;i) = ± = j i;j 0; if i 6= j.
Recommended publications
  • Conjunctively Polynomial–Like Boolean Functions and the Maximal Closed Classes
    Annales Univ. Sci. Budapest., Sect. Comp. 32 (2010) 49-61 CONJUNCTIVELY POLYNOMIAL{LIKE BOOLEAN FUNCTIONS AND THE MAXIMAL CLOSED CLASSES J. Gonda (Budapest, Hungary) Abstract. In [7] it was introduced the notion of the conjunctively polynomial like Boolean functions. In this article it is investigated how these functions are related to the maximal closed classes of the Boolean functions and it is pointed out that there are bases of the Boolean functions containing only conjunctively polynomial-like Boolean functions. In this article disjunction and logical sum, conjunction and logical product, exclusive or and modulo two sum, as well as complementation and negation are used in the same sense and they are denoted respectively by +; ¢ (or simply without any operation sign), © and ¹. The elements of the ¯eld with two elements and the elements of the Boolean algebra with two elements are denoted by the same signs, namely by 0 and 1; N denotes the non-negative integers, and N+ the positive ones. 1. Introduction Logical functions and especially the two-valued ones have important roles in our everyday life, so it is easy to understand why they are widely investigated. A scope of investigations is the representations of these functions and the transforms from one representation to another ([3], [4], [5], [8]). Another area of the examinations is the search of special classes of the set of the functions. Post determined the closed classes of the switching functions [9], but there are a lot of another classes of the Boolean functions invariant with respect to some Mathematics Subject Classi¯cation: 06E30, 94C10, 15A18 50 J.
    [Show full text]
  • Composition of Post Classes and Normal Forms of Boolean Functions Miguel Couceiroa,1, Stephan Foldesb, Erkko Lehtonenb,∗
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Discrete Mathematics 306 (2006) 3223–3243 www.elsevier.com/locate/disc Composition of Post classes and normal forms of Boolean functions Miguel Couceiroa,1, Stephan Foldesb, Erkko Lehtonenb,∗ aDepartment of Mathematics, Statistics and Philosophy, University of Tampere, FI-33014 Tampereen yliopisto, Finland bInstitute of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland Received 23 March 2005; received in revised form 12 May 2006; accepted 25 June 2006 Available online 6 September 2006 Abstract The class composition C◦K of Boolean clones, being the set of composite functions f(g1,...,gn) with f ∈ C, g1,...,gn ∈ K, is investigated. This composition C ◦ K is either the join C ∨ K in the Post Lattice or it is not a clone, and all pairs of clones C, K are classified accordingly. Factorizations of the clone of all Boolean functions as a composition of minimal clones are described and seen to correspond to normal form representations of Boolean functions. The median normal form, arising from the factorization of with the clone SM of self-dual monotone functions as the leftmost composition factor, is compared in terms of complexity with the well-known DNF, CNF, and Zhegalkin (Reed–Muller) polynomial representations, and it is shown to provide a more efficient normal form representation. © 2006 Elsevier B.V. All rights reserved. MSC: 06E30; 08A70 Keywords: Function class composition; Clones; Boolean functions; Post classes; Class factorization; Normal forms; DNF; CNF; Zhegalkin polynomial; Reed–Muller polynomial; Formulas; Efficient representations; Complexity; Median; Ternary majority 1.
    [Show full text]
  • Symmetric Polynomial-Like Boolean Functions
    Annales Univ. Sci. Budapest., Sect. Comp. 49 (2019) 209{218 SYMMETRIC POLYNOMIAL-LIKE BOOLEAN FUNCTIONS J´anosGonda (Budapest, Hungary) Communicated by Imre K´atai (Received February 25, 2019; accepted April 14, 2019) Abstract. Polynomial-like Boolean functions form a class of the Boolean functions invariant with respect to a special transform of the linear space of the two-valued logical functions. Another special set of the Boolean- functions are the set of the symmetric functions. In this article we in- troduce the class of the symmetric polynomial-like Boolean functions and investigate some elementary properties of such functions. In this article disjunction and logical sum, conjunction and logical product, exclusive or and modulo two sum, as well as complementation and negation are used in the same sense and they are denoted respectively by _, ^, ⊕ and . The elements of the field with two elements and the elements of the Boolean algebra with two elements are denoted by the same signs, namely by 0 and 1; N denotes the non-negative integers, and N+ the positive ones. 1. Introduction Logical functions and especially the two-valued ones have important role in our everyday life, so it is easy to understand why they are widely investigated. A scope of the investigations is the representations of these functions and the transforms from one representation to another ([3], [4], [5]). Another area of the examinations is the search of special classes of the set of these functions. Key words and phrases: Boolean function, normal form, Zhegalkin polynomial, polynomial- like Boolean function, symmetric polynomial, symmetric function.
    [Show full text]
  • Cryptanalysis of Dedicated Cryptographic Hash Functions
    Cryptanalysis of Dedicated Cryptographic Hash Functions Markku-Juhani Olavi Saarinen Technical Report RHUL–MA–2009–22 10 November 2009 Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports Cryptanalysis of Dedicated Cryptographic Hash Functions by Markku-Juhani Olavi Saarinen Thesis submitted to The University of London for the degree of Doctor of Philosophy. Department of Mathematics Royal Holloway, University of London 2009 Declaration These doctoral studies were conducted under the supervision of Professor Keith Mar- tin. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Math- ematics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Markku-Juhani O. Saarinen Abstract In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions. FSB hashes are a class of hash functions derived from a coding theory problem. We attack FSB by modeling the compression function of the hash by a matrix in GF(2). We show that collisions and preimages can easily be found in FSB with the proposed security parameters. We describe a meet-in-the-middle attack against the FORK-256 hash function.
    [Show full text]
  • Representation of Boolean Functions in Terms of Quantum Computation Yu.I
    Representation of Boolean functions in terms of quantum computation Yu.I. Bogdanov*abc, N.A. Bogdanovaab, D.V. Fastovets**ab, V.F. Lukicheva aValiev Institute of Physics and Techonology of Russian Academy of Sciences, Russia, Moscow; bNational Research University of Electronic Technology (MIET), Russia, Moscow; cNational Research Nuclear University (MEPhI), Russia, Moscow ABSTRACT The relationship between quantum physics and discrete mathematics is reviewed in this article. The Boolean functions unitary representation is considered. The relationship between Zhegalkin polynomial, which defines the algebraic normal form of Boolean function, and quantum logic circuits is described. It is shown that quantum information approach provides simple algorithm to construct Zhegalkin polynomial using truth table. Developed methods and algorithms have arbitrary Boolean function generalization with multibit input and multibit output. Such generalization allows us to use many-valued logic (k-valued logic, where k is a prime number). Developed methods and algorithms can significantly improve quantum technology realization. The presented approach is the baseline for transition from classical machine logic to quantum hardware. Keywords: quantum computing, qubits, quantum algorithms, Boolean functions, discrete mathematics 1. INTRODUCTION Discrete mathematics is an important area of mathematic science, which explores the properties of different discrete objects: graphs [1], Boolean functions [2-4], finite-state machines and etc. The methods of discrete mathematics have important application in various scientific fields, such as logic elements realization of electronic devices, information security [5], transport links optimization, business models construction and etc. The discrete systems have been explored in quantum mechanics and quantum information theory. The discretization and quantization have a similar significance.
    [Show full text]
  • Neighborhood Principle Driven Icf Algorithm and Graph Distance Calculations
    Annales Univ. Sci. Budapest., Sect. Comp. 36 (2012) 159{177 NEIGHBORHOOD PRINCIPLE DRIVEN ICF ALGORITHM AND GRAPH DISTANCE CALCULATIONS Norbert K´ezdi,Katalin P´asztorVarga and Eena´ Jak´o (Budapest, Hungary) Communicated by L´aszl´oKozma (Received December 19, 2011; revised January 25, 2012; accepted February 1, 2012) Abstract. In the field of Boolean algebra there are many well known methods to optimize/analyze formulas of Boolean functions. This paper presents a non-conventional graph-based approach by describing the main idea of the Iterative Canonical Form (or ICF) [5,9] of a Boolean function, and introducing an algorithm that is capable of calculating the ICF. The algorithm is iteratively processing the neighboring nodes inside the n-cube. The iteration step count is a linear function of n. Some novel efficient meth- ods for computing distances by matching non-complete bipartite graphs, derived from the ICF and named as ICF-graphs [4,9,10] are proposed. Dif- ferent metrics between the ICF-graphs are introduced, such as weighted and normalized node count distances, and graph edit distance. Some re- cent results and application possibilities of the ICF-graph based distance calculations from the field of molecular systematics, ecology and medical diagnostics are discussed. 1. Introduction The efficiency of Boolean function manipulation in various applications depends on the form of representation of Boolean functions. In principle, a Key words and phrases: Iterative Canonical Form, ICF, ICF-graph, Boolean function, Boolean algebra, mathematical logic, graph distance, graph metrics, biological applications. 2010 Mathematics Subject Classification: 03B70, 03G05, 03G10, 05C85. 1998 CR Categories and Descriptors: E.1, E.2, F.4.1, G.2.2, J.3.
    [Show full text]
  • Algebras for Logic
    Chapter 3 Algebras for Logic 3.1 Boolean and Heyting Algebras 3.1.1 Boolean Operations A Boolean operation is a finitary operation on the set 2 = {0, 1}. In particular, for each natural number n, an n-ary Boolean operation is a function f : 2n → 2, of which n there are 22 such. The two zeroary operations or constants are the truth values 0 and 1. The four unary operations are identity x, negation ¬x, and the two constant operations λa.0 and λa.1. There are 16 binary Boolean operations, 256 ternary operations, and so on. n Each element (a0, . , an−1) of the domain 2 of f may be understood as an n-tuple of bits, or a subset G ⊆ n where n is taken to denote the set {0, 1, . , n − 1}, or a function g : n → 2. This last can be understood as the characteristic function of G, but in logic it is more often regarded as an assignment of truth values to the elements of n construed as variables x0, . , xn−1. When f(a0, . , an−1) = 1 we call (a0, . , an−1) a satisfying assignment. However there is nothing in the definition of Boolean operation to restrict its applicability exclusively to logic. The notion of basis will help us sharpen this idea. A basis for a set of operations is a subset of those operations generating the whole set by composition. We start with an example that is clearly motivated by logic. Proposition 1 The set of Boolean operations consisting of the constant 0 and the binary operation a → b defined as 0 when a = 1 and b = 0 and 1 otherwise forms a basis for the set of all Boolean operations.
    [Show full text]
  • A Formula for Systems of Boolean Polynomial Equations and Applications to Computational Complexity
    A formula for systems of Boolean polynomial equations and applications to computational complexity Tomoya Machide∗ Abstract It is known a method for converting a system of Boolean polynomial equations to a single Boolean polynomial equation with less variables. In this paper, we show a formula for systems of Boolean polynomial equations which is based on the method. The formula has a structure of binary tree, and conforms to De Morgan's duality. Using the formula, we prove a computational complexity result with a parameter for solving systems. The parameter is the bandwidth in matrix and graph theories: to be precise, the definition follows convention in matrix and the value depends on the order of variables. We also apply the result to the NP-complete problems, SAT and graph list-coloring, to show that these problems are fixed parameter tractable by bandwidth. 1 Introduction The finite field F2 = f0; 1g with two elements, which is also called the Galois field GF(2) in his honor, plays fundamental roles in mathematics and computer science. It is the smallest finite field and its algebraic rules are determined by a few equations involving the addition \+" and multiplication \ · ". One of the outstanding facts of F2 is a structural relation to the two-element Boolean algebra B = fFalse; Trueg under the identifications of False = 0 and True = 1. That is, for any pair (α; β) of elements, α ^ β = α · β; α _ β = (α + 1) · (β + 1) + 1; α ⊕ β = α + β; (1.1) where ^, _, and ⊕ stand for the binary operations of conjunction, disjunction, and exclusive disjunction in B, respectively.
    [Show full text]
  • Zhegalkin Polynomials (May. 05, 2020.) (A) the Equivalence of Boolean Rings and Boolean Algebras
    Zhegalkin polynomials (May. 05, 2020.) (A) The equivalence of Boolean rings and Boolean algebras The theorems below show us that Boolean rings and Boolean algebras can be trasformed each into other. Theorem 1. Let (B; ; ; ; 0; 1) be a Boolean algebra, and let us de…ne the operations _ ^ a + b := (a b) (a b) and a b := a b^ _ ^ ^ for all a; b B. Then (B; +; ) is a Boolean ring. 2 Proof. + and are binary interior operations by their de…nitions. Clearly, they are commutative also. " " is assoiative, since a b is associative. It is not hard to check that ^ (a + b) + c = a + (b + c), for any a; b; c B, hence + is also associative. 2 We have a + 0 = (a 1) (a 0) = a 0 = a, and a + a = (a a) ^(a _a) =^0 0 =_0. The latter equality^ _ means^ that for_ any element a B, its additive inverse a there exists and a = a. 2 It can be also easily checked that a (b + c) = a b + a c, and because is commutative it follows also: (b + c) a = b a + c a. Therefore,(B; +;) satis…es the axioms of a commutative ring. We are going to prove that (B; +; ) is Boolean ring. Indeed, we have a 1 = a 1 = a, for all a B, i.e. 1 is the unit of . Moreover, ^ 2a2 = a a = a a = a, and all these together^ mean that (B; +; ) is a Boolean ring. Theorem 2. Let (B; +; ) be a Boolean ring and de…ne: a b := a + b + a b; a _ b := a b; a ^= 1 + a for all a; b B.
    [Show full text]
  • Fast Implementation of the ANF Transform
    Fast Implementation of the ANF Transform Valentin Bakoev Faculty of Mathematics and Informatics, Veliko Turnovo University, Bulgaria MDS – OCRT, 10–14 July, 2017 Sofia, Bulgaria V. Bakoev (FMI, VTU) Fast Implementation of the ANFT OCRT, 10–14.07.2017 1 / 29 Outline 1 Introduction 2 Basic notions and preliminary results 3 Fast implementation of the ANFT 4 Experimental results and conclusions V. Bakoev (FMI, VTU) Fast Implementation of the ANFT OCRT, 10–14.07.2017 2 / 29 Computing: its computing includes obtaining of the algebraic normal forms of the coordinate Boolean functions, which form the S-box. During the generation of S-boxes it should be done as fast as possible (as well as computing the other cryptographic criteria), in order to obtain more S-boxes and to select the best of them. The algebraic degree of a Boolean function is defined by one special representation – in the area of algebra and cryptology it is known as Algebraic Normal Form (ANF). 1. Introduction Importance: the algebraic degree of an S-box (or a vectorial Boolean function) is one of its most important cryptographic parameters. V. Bakoev (FMI, VTU) Fast Implementation of the ANFT OCRT, 10–14.07.2017 3 / 29 During the generation of S-boxes it should be done as fast as possible (as well as computing the other cryptographic criteria), in order to obtain more S-boxes and to select the best of them. The algebraic degree of a Boolean function is defined by one special representation – in the area of algebra and cryptology it is known as Algebraic Normal Form (ANF).
    [Show full text]
  • Modelling Techniques for Biomolecular Networks
    Modelling techniques for biomolecular networks Authors: Gerhard Mayer1 1 Ruhr University Bochum, Faculty of Medicine, Medizinisches Proteom-Center, D-44801 Bochum, Germany Abbreviations: ASP Answer Set Programming (Open)BEL Biological Expression Language BioPAX BIOlogical Pathways eXchange CoD Coefficient of Determination CoLoMoTo Consortium for Logical Models and Tools COMBINE COmputational Modelling in BIology Network EBN Extended Boolean Network GRN Genetic Regulatory Network ODE Ordinary Differential Equation PBN Probabilistic Boolean Network PDE Partial Differential Equation PDS Polynomial Dynamical System / Power Dominating Set RBN Random Boolean Network / Restricted Boolean Networks SBML Systems Biology Markup Language STP Semi-Tensor product Keywords: Boolean models, Systems medicine, semi-tensor product (STP), logical modelling, biomolecular networks, polynomial dynamical systems (PDS), standard formats, ontologies Summary: First we shortly review the different kinds of network modelling methods for systems biology with an emphasis on the different subtypes of logical models, which we review in more detail. Then we show the advantages of Boolean networks models over more mechanistic modelling types like differential equation techniques. Then follows an overlook about connections between different kinds of models and how they can be converted to each other. We also give a short overview about the mathematical frameworks for modelling of logical networks and list available software packages for logical modelling. Then we give an overview about the available standards and ontologies for storing such logical systems biology models and their results. In the end we give a short review about the difference between quantitative and qualitative models and describe the mathematics that specifically deals with qualitative modelling. Keywords: Boolean networks, logical models, semi-tensor product, polynomial dynamical systems, systems biology modelling standards, biomolecular networks 1.
    [Show full text]
  • Homogeneous Symmetric Polynomial-Like Boolean Functions
    Annales Univ. Sci. Budapest., Sect. Comp. 51 (2020) 97{110 HOMOGENEOUS SYMMETRIC POLYNOMIAL-LIKE BOOLEAN FUNCTIONS J´anosGonda (Budapest, Hungary) Dedicated to the 70th birthday of Professor Antal J´arai Communicated by Imre K´atai (Received January 29, 2020; accepted April 15, 2020) Abstract. Polynomial-like Boolean functions form a class of the Boolean functions invariant with respect to a special transform of the linear space of the two-valued logical functions. Another special set of the Boolean- functions are the set of the symmetric functions. In an earlier article we introduced the class of the symmetric polynomial-like Boolean functions and investigated some elementary properties of such functions. In the present article we deal with the special case of the homogeneous symmetric polynomial-like Boolean functions. In this article disjunction and logical sum, conjunction and logical product, exclusive or and modulo two sum, as well as complementation and negation are used in the same sense and they are denoted respectively by _, ^, ⊕ and . The elements of the field with two elements and the elements of the Boolean algebra with two elements are denoted by the same signs, namely by 0 and 1; N denotes the non-negative integers, and N+ the positive ones. 1. Introduction Logical functions and especially the two-valued ones have important role in our everyday life, so it is easy to understand why they are widely investigated. A scope of the investigations is the representations of these functions and the transforms from one representation to another ([3], [4], [5]). Another area of Key words and phrases: Boolean function, normal form, Zhegalkin polynomial, polynomial- like Boolean function, symmetric polynomial, symmetric function, homogeneous polynomial.
    [Show full text]