Boolean Functions and Their Applications in Cryptography

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cr

  • PDF / 2,490,342 Bytes
  • 267 Pages / 439.42 x 683.15 pts Page_size
  • 4 Downloads / 251 Views

DOWNLOAD

REPORT


Chuan-Kun Wu Dengguo Feng

Boolean Functions and Their Applications in Cryptography

Advances in Computer Science and Technology Series Editors Dengguo Feng, Chinese Academy of Science Ge Yu, Northeastern University Hujun Bao, Zhejiang University Hongbin Zha, Peking University Jian Zhang, Chinese Academy of Science Minyi Guo, Shanghai Jiaotong University Nong Xiao, National University of Defense Technology Shi-Min Hu, Tsinghua University Xiaotie Deng, Shanghai Jiaotong University Xinbing Wang, Shanghai Jiaotong University Zhi-Hua Zhou, Nanjing University Founding Editor: Shi-Min Hu On behalf of the China Computer Federation (CCF)

More information about this series at http://www.springer.com/series/13197

Chuan-Kun Wu • Dengguo Feng

Boolean Functions and Their Applications in Cryptography

123

Chuan-Kun Wu State Key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing, China

Dengguo Feng Institute of Software Chinese Academy of Sciences Beijing, China

ISSN 2198-2686 ISSN 2198-2694 (electronic) Advances in Computer Science and Technology ISBN 978-3-662-48863-8 ISBN 978-3-662-48865-2 (eBook) DOI 10.1007/978-3-662-48865-2 Library of Congress Control Number: 2015957583 Springer Heidelberg New York Dordrecht London © Springer-Verlag Berlin Heidelberg 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper Springer-Verlag GmbH Berlin Heidelberg is part of Springer Science+Business Media (www.springer. com)

Preface

Nonlinear Boolean functions are necessary building blocks in cryptography; they often play a key role in the design of many stream ciphers and block ciphers. In the design of stream ciphers, nonlinear combining functions are an important type to study, where the cryptographic properties of the combining Boolean function directly reflect the security vulnerability of the cipher, hence the study of cryptographic properties of Boolean functions directly relating to the security of the nonline