Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci    2013, Vol. 7 Issue (2) : 272-278    https://doi.org/10.1007/s11704-013-2013-x
RESEARCH ARTICLE
The autocorrelation distribution of balanced Boolean function
Yu ZHOU1(), Weiguo ZHANG2,4, Juan LI3, Xinfeng DONG1, Guozhen XIAO2
1. Science and Technology on Communication Security Laboratory, Chengdu 610041, China; 2. State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China; 3. Foreign Language Department, Emei Campus, Southwest Jiaotong University, Emei 614202, China; 4. State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing 100093, China
 Download: PDF(317 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

The global avalanche characteristics (the sumof- squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower bound on the sumof- squares indicator for a balanced Boolean function satisfying the propagation criterion with respect to some vectors. In this paper, if balanced Boolean functions satisfy the propagation criterion with respect to some vectors, we give three necessary and sufficient conditions on the auto-correlation distribution of these functions reaching the minimum the bound on the sum-of-squares indicator. And we also find all Boolean functions with 3-variable, 4-variable, and 5-variable reaching the minimum the bound on the sum-of-squares indicator.

Keywords Boolean functions      auto-correlation distribution      global avalanche characteristics      balanced      propagation criterion     
Corresponding Author(s): ZHOU Yu,Email:zhouyu.zhy@tom.com   
Issue Date: 01 April 2013
 Cite this article:   
Yu ZHOU,Weiguo ZHANG,Juan LI, et al. The autocorrelation distribution of balanced Boolean function[J]. Front Comput Sci, 2013, 7(2): 272-278.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-013-2013-x
https://academic.hep.com.cn/fcs/EN/Y2013/V7/I2/272
1 Adams C, Tavares S. Generating and counting binary bent sequences. IEEE Transactions on Information Theory , 1990, 36(5): 1170-1173
doi: 10.1109/18.57222
2 Webster A F. Plaintext/ciphertext bit dependencies in cryptographic system. Master thesis, Department of Electrical Engineering , Queen’s University, Ontario, Cannada, 1985
3 Preneel B, Van Leekwijck W, Van Linden L, Govaerts R, Vandewalle J. Propagation characteristics of boolean functions. In: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology . 1991, 161-173
4 Zhang K, Zheng Y. GAC-the criterion for global avalance characteristics of cryptographic functions. Journal of Universal Computer Science , 1995, 1(5): 320-337
5 Son J, Lim J, Chee S, Sung S. Global avalanche characteristics and nonlinearity of balanced boolean functions. Information Processing Letters , 1998, 65(3): 139-144
doi: 10.1016/S0020-0190(98)00009-X
6 Sung S, Chee S, Park C. Global avalanche characteristics and propagation criterion of balanced boolean functions. Information Processing Letters , 1999, 69(1): 21-24
doi: 10.1016/S0020-0190(98)00184-7
7 Charpin P, Pasalic E. On propagation characteristics of resilient functions. In: Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography . 2002, 175-195
8 Zhou Y, Xie M, Xiao G. On the global avalanche characteristics between two boolean functions and the higher order nonlinearity. Information Sciences , 2010, 180(2): 256-265
doi: 10.1016/j.ins.2009.09.012
9 Zhang X, Zheng Y. Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors. Designs, Codes and Cryptography , 1996, 7(1): 111-134
doi: 10.1007/BF00125079
10 Carlet C. Partially-bent functions. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology . 1992, 280-291
11 Meier W, Pasalic E, Carlet C. Algebraic attacks and decomposition of boolean functions. In: Proceedings of Advances in Cryptology- EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques . 2004, 474-491
12 Zhou Y, Xiao G. On the equal-weight symmetric boolean functions. Frontiers of Computer Science in China , 2009, 3(4): 485-493
doi: 10.1007/s11704-009-0002-x
[1] Ruochen HUANG, Xin WEI, Liang ZHOU, Chaoping LV, Hao MENG, Jiefeng JIN. A survey of data-driven approach on multimedia QoE evaluation[J]. Front. Comput. Sci., 2018, 12(6): 1060-1075.
[2] Bo SUN, Haiyan CHEN, Jiandong WANG, Hua XIE. Evolutionary under-sampling based bagging ensemble method for imbalanced data classification[J]. Front. Comput. Sci., 2018, 12(2): 331-350.
[3] Qian LI, Gang LI, Wenjia NIU, Yanan CAO, Liang CHANG, Jianlong TAN, Li GUO. Boosting imbalanced data learning with Wiener process oversampling[J]. Front. Comput. Sci., 2017, 11(5): 836-851.
[4] Xiangxiang ZENG,Sisi YUAN,Xianxian HUANG,Quan ZOU. Identification of cytokine via an improved genetic algorithm[J]. Front. Comput. Sci., 2015, 9(4): 643-651.
[5] Mingqiang GUO,Ying HUANG,Zhong XIE. A balanced decomposition approach to real-time visualization of large vector maps in CyberGIS[J]. Front. Comput. Sci., 2015, 9(3): 442-455.
[6] Peng ZHANG. Unbalanced graph cuts with minimum capacity[J]. Front. Comput. Sci., 2014, 8(4): 676-683.
[7] Bo YUAN, Wenhuang LIU. Measure oriented training: a targeted approach to imbalanced classification problems[J]. Front Comput Sci, 2012, 6(5): 489-497.
[8] Sheng GAO, Wenping MA, Zepeng ZHUO, Fenghe WANG. On cross-correlation indicators of an S-box[J]. Front Comput Sci Chin, 2011, 5(4): 448-453.
[9] Mingfa ZHU, Limin XIAO, Li RUAN, Qinfen HAO, . DeepComp: towards a balanced system design for high performance computer systems[J]. Front. Comput. Sci., 2010, 4(4): 475-479.
[10] Yu ZHOU, Guozhen XIAO, . On the equal-weight symmetric Boolean functions[J]. Front. Comput. Sci., 2009, 3(4): 485-493.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed