Enumeration of Bent Boolean Functions by Reconfigurable

Enumeration of Bent Boolean Functions by Reconfigurable

Enumeration of Bent Boolean Functions by Reconfigurable Computer J. L. Shafer S. W. Schneider J. T. Butler P. Stanic˘ a˘ ECE Department Department of ECE Department of Applied Math. US Naval Academy Naval Postgraduate School Naval Postgraduate School Annapolis, MD 21402 U.S.A. Monterey, CA 93943 U.S.A. Monterey, CA 93943 U.S.A. [email protected] [email protected]/[email protected] [email protected] Abstract codes [11], which have applications in spread spectrum communication [5]. We show that there is significant benefit to using a recon- While we can mathematically define bent functions pre- figurable computer to enumerate bent Boolean functions for cisely, to generate them it is a different matter. One needs cryptographic applications. Bent functions are rare, and sophisticated mathematical (like invariant theory) and com- the only known way to generate all bent functions is by putational tools to list all n-variable bent functions (this has sieve techniques in which many prospective functions are been achieved for n · 8). Some of these methods cannot be tested. The speed-up achieved depends on the number of easily parallelized, and do not offer a significant improve- variables n; for n = 8, we show that the reconfigurable ment in a reconfigurable environment. computer achieves better than a 60,000£ speed-up over a Using the SRC-6 reconfigurable computer, we have conventional computer. Further, we introduce the transeunt tested millions of Boolean functions. Specific sets of triangle as a means to reduce the number of functions that Boolean functions were chosen based on their specific prop- must be considered. For n = 6, this reduction is better than erties, including degree, homogeneity, and symmetry. These 1,000,000 to 1. groups were evaluated for relationships between nonlinear- Previously, the transeunt triangle had been used only in ity and specific properties. The objective is to find groups of the design exclusive OR logic circuits; it converts a truth Boolean functions that are rich in bent functions [1]. These table to the algebraic normal form. However, this fact has groups, if small enough, can be tested exhaustively. Testing never been proven rigorously, and that shortcoming is re- across the entire set of functions, even for small numbers moved in this paper. Our proof provides a practical benefit; of variables, e.g., n = 6 or more, is infeasible because of it yields a new realization of the transeunt triangle that has the large number of functions. The use of the transeunt tri- less complexity and delay. Finally, we show computational angle enables functions to be generated easily in one form, results from a reconfigurable computer. converted to another form and then tested for certain char- acteristics. Without the transeunt triangle [2, 3], important groups of functions could not be tested efficiently. 1 Introduction 2 Background and Definitions Shannon [17] introduced the concepts of confusion and diffusion as a fundamental technique to achieve security in Definition 2.1. A Boolean function f in n variables is n cryptographic systems. The confusion principle is reflected a map from the n-dimensional vector space Vn = F2 in the nonlinearity of Boolean functions, since most linear to F2, the two-element field. For a function f, let f0 = systems are easily breakable. There are various criteria that f(0; 0;:::; 0), f1 = f(0; 0;:::; 1), :::, and f2n¡1 = imply nonlinearity, one of them being bentness. Bent func- f(1; 1;:::; 1). TT = (f0 f1 : : : f2n¡1) is the truth table tions were first introduced by Rothaus in 1976 [14], as func- representation of f. tions having maximum distance away from the set of affine Example 2.1. f = x x x x has the truth table rep- functions. 1 2 3 4 resentation TT = (0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1). g = Bent Boolean functions have the highest nonlinearity x x © x x has the truth table representation TT = possible, which makes them useful in the design of block 1 2 3 4 (0 0 0 1 0 0 0 1 0 0 0 1 1 1 1 0). (End of Example) and stream ciphers. Maximum length sequences based on bent functions have cross-correlation and autocorrelation Definition 2.2. A linear function is the constant 0 function properties that are close to the ones of Gold and Kasami or the exclusive-OR of one or more variables. An affine 1 function is a linear function or the complement of a linear Example 2.6. f = x1x2x3x4 has degree 4 and g = x1x2 © function. x3x4 has degree 2. (End of Example) Example 2.2. There are 16 linear functions on 4 variables, Definition 2.8. Functions f and h belong to the same affine 0, x1, x2, x3, x4, x1 © x2, x1 © x3, x1 © x4, x2 © x3, class if and only if f = h © a, where a is an affine function. x2 © x4, x3 © x4, x1 © x2 © x3, x1 © x2 © x4, x1 © x3 © x4, Example 2.7. f = x1x2x3x4, a non-bent function, belongs x2 © x3 © x4, and x1 © x2 © x3 © x4. These functions and their complements comprise the 32 4-variable affine func- to an affine class of 32 functions. g = x1x2 © x3x4, a tions. (End of Example) bent function, belongs to an affine class of 32 functions. (End of Example) Affine functions, when used in encrypting a plaintext message, are susceptible to a linear attack. We seek func- Certainly, each affine class contains the same number of n+1 tions that are as “far” away as possible from affine functions. functions, namely 2 . Also, all functions in the same affine class as a non-affine function f have the same degree. Definition 2.3. The Hamming distance d(f; g) between two functions f and g is the number of places where their Definition 2.9. A function f is homogeneous of degree d if truth table representations differ. and only if all terms in the ANF of f have degree d. Definition 2.4. The nonlinearity NLf of a function f is Example 2.8. f = x1x2x3x4 is homogeneous of degree the minimum Hamming distance between f and an affine 4, and g = x1x2 © x3x4 is homogeneous of degree 2. function. (End of Example) Example 2.3. f = x1x2x3x4 has nonlinearity 1, since con- Xia, Seberry, Pieprzyk, and Charnes [18] considered ho- verting the single 1 to a 0 in its truth table representation mogeneity in the context of bent functions and showed the creates the truth table representation of the constant 0 func- next result. tion, which is affine. g = x x © x x has a distance 6 1 2 3 4 Theorem 2.1. When n > 6, no n-variable homogeneous or 10 from any affine function. Thus, its nonlinearity is 6. bent function has degree n . (End of Example) 2 Because of f = x x © x x , Theorem 2.1 does not Definition 2.5. Let f be a Boolean function on n-variables, 1 2 3 4 hold for n = 4. Qu, Seberry, and Pieprzyk [13] found 30 where n is even. f is a bent function if its nonlinearity is homogeneous 6-variable bent functions of degree 3, and so, maximum among n-variable functions. Theorem 2.1 does not hold for n = 6. Therefore, from [13, n Example 2.4. Rothaus [14] showed that bent functions 18], for n > 6, degree- 2 n-variable bent functions exist, n¡1 n ¡1 have nonlinearity 2 ¡2 2 . Thus, f = x1x2x3x4 is not but none are homogeneous. More recently, Meng et al. [10] bent (NLf = 1), and g = x1x2 © x3x4 is bent (NLg = 6). showed (purely combinatorially) that, for any nonnegative (End of Example) integer k, there exists a positive integer N, such that for n ¸ N, there do not exist 2n variable homogeneous bent Along with the truth table representation, the algebraic functions having degree n ¡¡ k or¢ more,¡ where¢ N is the¡ least¢ normal form is an important tool in the study of bent func- integer satisfying 2N¡1 > N+1 + N+1 + ¢ ¢ ¢ + N+1 . tions. 0 1 k+1 Definition 2.6. ThePalgebraic normal form (ANF)P of a 3 Architecture of Bent Function Enumerator function f is f = c xa1 xa2 : : : xan ; where is a2F2 a 1 2 n the exclusive OR sum, a = (a1; a2; : : : ; an), ca; ai 2 F2, A reconfigurable computer allows one to adapt the archi- 0 1 xi = 1, and xi = xi. ANF = (c0 c1 : : : c2n¡1) is the tecture to the problem. Fig. 1 shows the architecture to enu- ANF representation of f. merate bent functions based on the ANF of the tested func- Example 2.5. f = x x x x has the ANF tions. This and other variations yield the data we present 1 2 3 4 later. In all cases, a counter was used to enumerate prospec- f = x1x2x3x4 and the ANF representation ANF = (0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1). g = x x © x x tive functions. This is shown on the left. This is applied to a 1 2 3 4 block labeled Transeunt Triangle. In this case, the counter has the ANF g = x1x2 © x3x4 and the ANF representation ANF = (0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0). (End of Example) enumerates ANFs; each bit of the counter determines the presence or absence of a term in the ANF. The transeunt tri- Definition 2.7. The degree of a product term is the num- angle produces the corresponding truth table.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us