首页> 外文OA文献 >Analysis of affine equivalent boolean functions for cryptography
【2h】

Analysis of affine equivalent boolean functions for cryptography

机译:仿射仿射布尔函数的密码分析

摘要

Boolean functions are an important area of study for cryptography. These functions, consisting merely of one's and zero's, are the heart of numerous cryptographic systems and their ability to provide secure communication. Boolean functions have application in a variety of such systems, including block ciphers, stream ciphers and hash functions. The continued study of Boolean functions for cryptography is therefore fundamental to the provision of secure communication in the future. This thesis presents an investigation into the analysis of Boolean functions and in particular, analysis of affine transformations with respect to both the design and application of Boolean functions for cryptography. Past research has often been limited by the difficulties arising from the magnitude of the search space. The research presented in this thesis will be shown to provide an important step towards overcoming such restrictions and hence forms the basis for a new analysis methodology. The new perspective allows a reduced view of the Boolean space in which all Boolean functions are grouped into connected equivalence classes so that only one function from each class need be established. This approach is a significant development in Boolean function research with many applications, including class distinguishing, class structures, self mapping analysis and finite field based s-box analysis. The thesis will begin with a brief overview of Boolean function theory; including an introduction to the main theme of the research, namely the affine transformation. This will be followed by the presentation of a fundamental new theorem describing the connectivity that exists between equivalence classes. The theorem of connectivity will form the foundation for the remainder of the research presented in this thesis. A discussion of efficient algorithms for the manipulation of Boolean functions will then be presented. The ability of Boolean function research to achieve new levels of analysis and understanding is centered on the availability of computer based programs that can perform various manipulations. The development and optimisation of efficient algorithms specifically for execution on a computer will be shown to have a considerable advantage compared to those constructed using a more traditional approach to algorithm optimisation. The theorem of connectivety will be shown to be fundamental in the provision many avenues of new analysis and application. These applications include the first non-exhaustive test for determining equivalent Boolean functions, a visual representation of the connected equivalence class structure to aid in the understanding of the Boolean space and a self mapping constant that enables enumeration of the functions in each equivalence class. A detailed survey of the classes with six inputs is also presented, providing valuable insight into their range and structure. This theme is then continued in the application Boolean function construction. Two important new methodologies are presented; the first to yield bent functions and the second to yield the best currently known balanced functions of eight inputs with respect to nonlinearity. The implementation of these constructions is extremely efficient. The first construction yields bent functions of a variety of algebraic order and inputs sizes. The second construction provides better results than previously proposed heuristic techniques. Each construction is then analysed with respect to its ability to produce functions from a variety of equivalence classes. Finally, in a further application of affine equivalence analysis, the impact to both s-box design and construction will be considered. The effect of linear redundancy in finite field based s-boxes will be examined and in particular it will be shown that the AES s-box possesses complete linear redundancy. The effect of such analysis will be discussed and an alternative construction to s-box design that ensures removal of all linear redundancy will be presented in addition to the best known example of such an s-box.
机译:布尔函数是密码学研究的重要领域。这些功能仅由一个和一个零组成,是众多密码系统的核心及其提供安全通信的能力。布尔函数已在各种此类系统中应用,包括块密码,流密码和哈希函数。因此,继续研究用于加密的布尔函数是将来提供安全通信的基础。本文针对布尔函数的分析,特别是仿射变换的分析,对密码学布尔函数的设计和应用进行了研究。过去的研究通常受到搜索空间规模带来的困难的限制。本文提出的研究将显示出为克服此类限制提供了重要的步骤,从而为新的分析方法奠定了基础。新的视角可以简化布尔空间的视图,在该空间中,所有布尔函数都被分组为相连的对等类,因此每个类中只需建立一个函数。这种方法是布尔函数研究的重大发展,具有许多应用程序,包括类区分,类结构,自映射分析和基于有限域的s-box分析。本文将从布尔函数理论的简要概述开始。包括对研究主题的介绍,即仿射变换。接下来将介绍一个基本的新定理,该新定理描述了等价类之间存在的连通性。连通性定理将构成本论文其余研究的基础。然后将介绍对布尔函数进行操作的有效算法的讨论。布尔函数研究达到新的分析和理解水平的能力集中在可以执行各种操作的基于计算机的程序的可用性上。与使用更传统的算法优化方法构建的算法相比,专为在计算机上执行的高效算法的开发和优化将显示出相当大的优势。在提供许多新的分析和应用途径的过程中,连接性定理将被证明是基础。这些应用程序包括用于确定等效布尔函数的第一个非穷举测试,用于帮助理解布尔空间的连接的等效类结构的可视表示形式以及使每个等效类中的函数都能枚举的自映射常数。还提供了对具有六个输入项的类的详细调查,从而提供了有关其范围和结构的宝贵见解。然后,该主题在应用程序布尔函数构造中继续。提出了两种重要的新方法:第一个产生弯曲函数,第二个产生八个非线性输入方面目前最好的平衡函数。这些构造的实施极为有效。第一种构造产生各种代数阶次和输入大小的弯曲函数。与先前提出的启发式技术相比,第二种构造提供了更好的结果。然后针对每种构造从各种等效类产生功能的能力进行分析。最后,在仿射等效分析的进一步应用中,将考虑对S盒设计和构造的影响。将研究基于有限域的s盒中线性冗余的影响,特别是将显示AES s盒具有完全的线性冗余。将讨论这种分析的效果,除了最著名的此类s-box实例之外,还将介绍s-box设计的替代结构,该结构可确保消除所有线性冗余。

著录项

  • 作者

    Fuller Joanne Elizabeth;

  • 作者单位
  • 年度 2003
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号