Talk overview Introduction - Definitions Properties of cryptographic functions Conclusions
Cryptographic Properties of Boolean Functions: Recent Developments and Open Problems
Konstantinos Limniotis
Hellenic Data Protection Authority, Dept. of Informatics & Telecommunications, Kifissias 1-3, National and Kapodistrian University of Athens, 11523 Athens, Greece 15784 Athens, Greece Email: [email protected] Email: [email protected]
Athens Cryptography Day 2014 - National Technical University of Athens January 7th, 2014, Athens, Greece
K. Limniotis Cryptograpchic properties of Boolean functions 1/39 Talk overview Introduction - Definitions Properties of cryptographic functions Conclusions Talk Outline
1 Introduction - Definitions Stream ciphers Block ciphers
2 Properties of cryptographic functions
Correlation immunity Nonlinearity Higher-order nonlinearity Algebraic immunity Fast algebraic immunity
3 Conclusions - Open problems
K. Limniotis Cryptograpchic properties of Boolean functions 2/39 Talk overview Symmetric ciphers Introduction - Definitions Stream ciphers Properties of cryptographic functions Block ciphers Conclusions Symmetric ciphers
A typical cryptosystem
Encryption Key Decryption Key
? ? Plaintext Ciphertext Plaintext - Encryption - Decryption - 6 Sender Receiver Eavesdropper
Symmetric cryptography Encryption Key = Decryption Key The key is only shared between the two parties The security rests with the secrecy of the key (Kerchoffs principle) Two types of symmetric ciphers Stream ciphers Block ciphers
K. Limniotis Cryptograpchic properties of Boolean functions 3/39 Talk overview Symmetric ciphers Introduction - Definitions Stream ciphers Properties of cryptographic functions Block ciphers Conclusions Stream ciphers
Simplest Case: Binary additive stream cipher
ÌÖÒ×ÑØØ Ö Ê Ú Ö
ÃÝ×ØÖÑ ÃÝ×ØÖÑ
ÒÖØÓÖ ÒÖØÓÖ