Perfect Nonlinear Functions and Cryptography

Perfect Nonlinear Functions and Cryptography

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Blondeau, Celine; Nyberg, Kaisa Perfect nonlinear functions and cryptography Published in: Finite Fields and Their Applications DOI: 10.1016/j.ffa.2014.10.007 Published: 01/01/2015 Document Version Publisher's PDF, also known as Version of record Published under the following license: CC BY-NC-ND Please cite the original version: Blondeau, C., & Nyberg, K. (2015). Perfect nonlinear functions and cryptography. Finite Fields and Their Applications, 32(March), 120-147. https://doi.org/10.1016/j.ffa.2014.10.007 This material is protected by copyright and other intellectual property rights, and duplication or sale of all or part of any of the repository collections is not permitted, except that material may be duplicated by you for your research use or educational purposes in electronic or print form. You must obtain permission for any other use. Electronic or print copies may not be offered, whether for sale or otherwise to anyone who is not an authorised user. Powered by TCPDF (www.tcpdf.org) Finite Fields and Their Applications 32 (2015) 120–147 Contents lists available at ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa Perfect nonlinear functions and cryptography Céline Blondeau, Kaisa Nyberg Aalto University, School of Science, Department of Information and Computer Science, Finland a r t i c l e i n f o a b s t r a c t Article history: In the late 1980s the importance of highly nonlinear functions Received 20 March 2014 in cryptography was first discovered by Meier and Staffelbach Received in revised form 6 October from the point of view of correlation attacks on stream ciphers, 2014 and later by Nyberg in the early 1990s after the introduction Accepted 10 October 2014 of the differential cryptanalysis method. Perfect nonlinear Available online 7 November 2014 Communicated by Gary McGuire (PN) and almost perfect nonlinear (APN) functions, which have the optimal properties for offering resistance against MSC: differential cryptanalysis, have since then been an object 11T71 of intensive study by many mathematicians. In this paper, 94A60 we survey some of the theoretical results obtained on these functions in the last 25 years. We recall how the links with Keywords: other mathematical concepts have accelerated the search on Perfect nonlinear functions PN and APN functions. To illustrate the use of PN and APN PN functions functions in practice, we discuss examples of ciphers and their Almost perfect nonlinear functions resistance to differential attacks. In particular, we recall that APN functions Differential uniformity in cryptographic applications suboptimal functions are often Nonlinearity used. Differential cryptanalysis © 2014 The Authors. Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/). 1. Introduction The derivative of a real or complex valued function is a useful tool when study- ing various mathematical and physical phenomena. By definition, the derivative of E-mail addresses: celine.blondeau@aalto.fi (C. Blondeau), kaisa.nyberg@aalto.fi (K. Nyberg). http://dx.doi.org/10.1016/j.ffa.2014.10.007 1071-5797/© 2014 The Authors. Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/). C. Blondeau, K. Nyberg / Finite Fields and Their Applications 32 (2015) 120–147 121 a differentiable function at a given point provides the best affine approximation of the function. For functions defined over finite groups the notion of derivative takes a different appearance and is closely related to designs and combinatorial structures such as, for example, difference sets [1]. If the domain of definition of the function is a linear space over a finite field, then also in this case a close connection between derivatives of the function and its linear approximations can be established as we will see later in this paper. In the late 1980s, new approaches to the cryptanalysis of block ciphers were intro- duced. In his study of FEAL-4, Sean Murphy [2] exploited solutions of equations of the form G(x + a) + G(x + b) = d. About at the same time, Eli Biham and Adi Shamir [3] studied the block cipher DES and showed that for some fixed plaintext differences, cer- tain differences in the encrypted values appear much more often than one would expect on average. Furthermore, they showed how one can exploit this phenomenon to re- cover information on the secret key. These attacks have launched a lot of interest in the derivatives of functions defined over finite spaces with the goal to mitigate the threat of differential cryptanalysis. While in the design of practical ciphers it is not necessary (and is sometimes even harmful) that the values of the derivatives are optimally distributed, also the functions with optimal derivatives, known as perfect nonlinear or almost perfect nonlinear, have drawn a lot of attention. The discovery in 2009 of an APN permutation in a field of characteristic 2 and even dimension [4] has brought new motivation and new ideas to this field of research. The selection of results on PN and APN functions presented in this paper is not exhaustive. In particular, we would like to apologize if some important results are missing. Other surveys on APN functions can be found in for instance [5,6]. The rest of the paper is organized as follows. We start in Section 2 by introducing the basic definitions. In Section 3, we introduce some further notions such as bentness that are closely linked with the notions of perfect nonlinear (PN) and almost perfect nonlin- ear (APN) functions. The link with linear codes is also briefly summarized. Section 3.3 is dedicated to the classes of equivalence which preserve the differential properties. In Section 4, some classical results on PN and APN monomial and polynomial functions are summarized. In particular, the relation between the only known APN permutation Z6 over 2 and quadratic APN polynomials is recalled. Section 5 is dedicated to the expo- nential and logarithmic functions and on the recent results on the linearity of related functions. In Section 6 we discuss several ciphers, and the use of PN or APN functions in practice. Different approaches to the design and cryptanalysis are considered in this section. Section 7 concludes this paper. 2. Preliminaries Zn In this paper, we denote by A or B an Abelian group and by q a Cartesian product Z of n copies of the ring q, where q is a positive integer greater than 1. The results in 122 C. Blondeau, K. Nyberg / Finite Fields and Their Applications 32 (2015) 120–147 the case of q =2may take essentially different form than the ones in the case of other values of q and hence a separate treatment is often required. Z When working with functions of several variables in q, we will denote by f a q-ary Z Zn → Z function with range in q. Then f : q q, and if q =2the function f is a Boolean Zm function. When the range of the function is q , where m > 1, we will use a capital letter Zn → Zm F to denote F : q q . In the case of q =2, such a function is called a vectorial Boolean function. Capital letters will also be used to denote functions defined in general Abelian groups. In a finite domain, there is no question about differentiability of a function as the derivative always exists and is defined as follows. Definition 1. Let A and B be finite Abelian groups and F : A → B be a function. Given a ∈ A the function defined by DaF : A → B x → F (x + a) − F (x) is called a derivative of F . Given a ∈ A and b ∈ B the relation F (x + a) − F (x)=b (1) is called a differential of F with input difference a and output difference b. Already since the end of the 1960s, derivatives of functions F : A → B such that |A| = |B| were studied in [7]. In particular, functions with bijective derivatives, called as planar functions, received attention. The introduction of differential cryptanalysis served as a motivation to study differentials of nonlinear functions and upperbounds to the number of solutions to Eq. (1). Definition 2. (See [8].) Let F : A → B be a function and set δ(a, b)= x F (x + a) − F (x)=b . We denote by ΔF the positive integer defined as ΔF =maxδ(a, b). a∈A,a=0 b∈B Then F is said to be differentially ΔF -uniform. Clearly, we always have ΔF ≥|B|/|A|. We say that F is perfect nonlinear (PN), if ΔF = |B|/|A|. This notion was studied for Boolean functions by Willi Meier and Othmar Staffelbach [9], who coined the term perfect nonlinearity for Boolean functions C. Blondeau, K. Nyberg / Finite Fields and Their Applications 32 (2015) 120–147 123 n−1 of n variables satisfying Δf =2 . It was soon discovered that the perfect nonlinearity is equivalent to the bentness introduced already in the 1970s by Oscar Rothaus [10], an NSA mathematician and Cornell mathematics professor, who is more widely known for his contributions to the development of the Hidden Markov Model. The studies of nonlinearity of Boolean functions by Meier and Staffelbach were motivated by the cryptanalysis of stream ciphers. The introduction of differential crypt- analysis of the block cipher DES by Biham and Shamir [3] raised the need to study this concept for S-boxes and nonlinear round functions which are nothing else than vectorial Boolean functions [11].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    29 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us