Skip to main content
Log in

De Bruijn sequences and complexity of symmetric functions

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

A multivalued function is a function from a set \(E_{q}^{n}\) to a set E m , where E k is a set which contains k elements. These functions are used in cryptography: cipher design, hash function design and in theoretical computer science. In this paper, we study the representation of these functions with Multivalued Decision Diagrams (MDD). This representation can be used both to measure complexity and to implement efficiently the functions in hardware. We are especially interested in symmetric functions. We show that symmetric functions MDDs have much lower size than classical functions MDDs. One major result is to determine exactly their MDD’s maximum size. Notably, we highlight the links between De Bruijn sequences and the most complex symmetric functions and new functions are exhibited in the case q = 2 and any m. Enumeration of these functions are supplied, they are shown to be sufficiently numerous to allow many applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Andrews, G.E.: The theory of partitions. In: Encyclopedia of Mathematics and Its Applications, vol. 2. Addison-Wesley, Reading (1976)

    Google Scholar 

  2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak Sponge Function Family Main Document. Submission to NIST (Round 2) (2009)

  3. Braeken, A., Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: SFINKS: a synchronous stream cipher for restricted hardware environments. In: Proceedings of SKEW—Symmetric Key Encryption Workshop, Network of Excellence in Cryptology ECRYPT. Aarhus, Denmark (2005)

  4. Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. C35 8, 677–691 (1986)

    Article  Google Scholar 

  5. Bollig, B., Range, N., Wegener, I.: Exact OBDD Bounds for some Fundamental Functions. Electronic Colloquium on Computational Complexity, Report N° 49 (2007)

  6. Butler, J.T., Herscovici, D.S., Sasao, T., Barton, R.J.: Average and worst case number of nodes in decision diagrams of symmetric multiple-valued functions. IEEE Trans. Comput. 46(4), 491–494 (1997)

    Article  MathSciNet  Google Scholar 

  7. Canteaut, A., Videau, M.: Symmetric Boolean functions. IEEE Trans. Inf. Theory 51(8), 2791–2811 (2005)

    Article  MathSciNet  Google Scholar 

  8. Heinrich-Litan, L., Molitor, P.: Least upper bounds for the size of OBDDs using symmetry properties. IEEE Trans. Comput. 49(4), 271–281 (2000)

    Article  MathSciNet  Google Scholar 

  9. Krause, M.: BDD-based cryptanalysis of keystream generators. In: Advances in Cryptology—EUROCRYPT 2002, LNCS 2332, pp. 222–237 (2002)

  10. Michon, J.F., Valarcher, P., Yunes, J.B.: On Maximal QROBDD’s of Boolean functions. Theor. Inf. Appl. 9, 677–686 (2005)

    Article  MathSciNet  Google Scholar 

  11. Mouffron, M.: Transitive q-ary functions over finite fields or finite sets: counts, properties and applications. In: International Workshop on the Arithmetic of Finite Fields 2008, WAIFI 08, Siena, Italy, LNCS 5130, pp. 19–35 (2008)

  12. Mouffron, M.: Balanced alternating and symmetric functions over finite sets. In: Workshop on Boolean Functions Cryptography and Applications (BFCA08), Copenhagen, Denmark, pp. 27–44 (2008)

  13. Rosenfeld, V.R.: Enumerating De Bruijn sequences. MATCH Commun. Math. Comput. Chem. 45, 71–83 (2002)

    MathSciNet  MATH  Google Scholar 

  14. Stegemann, D.: Extended BDD-based cryptanalysis of keystream generators. In: Proceedings of the 14th International Conference on Selected Areas in Cryptography (SAC’07), LNCS 4876, pp. 17–35 (2007)

  15. Wegener, I.: Branching programs and binary decision diagrams—theory and applications. In: SIAM Monograph on Discrete Mathematics and Applications. ISBN 0-89871- 458-3 (2000)

Download references

Acknowledgements

We thank Boris Batteux for his computations on functions enumeration. We also thank the anonymous referees for excellent suggestions which greatly improved the clarity of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marc Mouffron.

Appendices

Appendix A: Algebraic degree distribution

These tables give the distribution of the algebraic degree of super hard symmetric functions and hard symmetric functions.

Table 1 Algebraic degree of super hard symmetric functions for n = 3, ..., 23
Table 2 Algebraic degree of hard symmetric functions for n = 2,...,20

Appendix B: Maximum complexities of symmetric functions from \(E_2^n\) to E 2

This table gives the cardinal of the sets HSM n (q, m), SHSM n (q, m) and HSM n (q, m) ∩ SHSM n (q, m) for any n up to 35. The special cases n = a + 2a − 2 are in bold.

Table 3 Complexity of symmetric functions from \(E_2^n\) to E 2

Appendix C: Number of balanced symmetric Boolean functions hard and super hard

This table gives the number of balanced hard and super hard symmetric Boolean functions for any odd n up to 53. There is no balanced hard nor super hard symmetric Boolean functions when n is even except 2 for n = 2.

Table 4 Number of balanced symmetric Boolean functions of maximum complexity

Appendix D: Boolean symmetric functions’ complexity c R (f) distribution n = 1 to 33

Table 5 Boolean symmetric functions’ complexity c R (f) n = 1–33

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rovetta, C., Mouffron, M. De Bruijn sequences and complexity of symmetric functions. Cryptogr. Commun. 3, 207–225 (2011). https://doi.org/10.1007/s12095-011-0054-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-011-0054-2

Keywords

Navigation