Skip to main content
Log in

Efficient implementation of generalized Maiorana–McFarland class of cryptographic functions

  • Regular Paper
  • Published:
Journal of Cryptographic Engineering Aims and scope Submit manuscript

Abstract

Recently, a class of cryptographic Boolean functions called generalized Maiorana–McFarland (GMM) functions was proposed in Zhang and Pasalic (IEEE Trans Inf Theory 60(10):6681–6695, 2014). In particular, it was demonstrated that certain subclasses within the GMM class satisfy all the relevant cryptographic criteria including a good resistance to (fast) algebraic cryptanalysis. However, the issue of efficient hardware implementation, which is essentially of crucial importance when such a function is used as a filtering function in certain stream cipher encryption schemes, has not been addressed in Zhang and Pasalic (2014). In this article, we analyze the complexity of hardware implementation of these subclasses and provide some exact estimates in terms of the number of elementary circuits needed. It turns out that these classes of cryptographically strong functions are also characterized with a very low hardware implementation cost, making these functions attractive candidates for the use in certain stream cipher schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. Note that it is not clear how a low degree for \(f_i\) affects the vulnerability of the cipher, though the implementation cost is clearly reduced by that.

References

  1. Armknecht, F.: Improving Fast Algebraic Attacks. Volume LNCS 3017, pp. 65–82. Springer, Berlin (2004)

  2. Bollig, B., Löbbing, M., Sauerhoff, M., Wegener, I.: On the complexity of the hidden weighted bit function for various BDD models. RAIRO Theor. Inf. Appl. 33(2), 103–115 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bryant, R.E.: On the complexity of VLSI implementations and graph representations of Boolean functions with application to integer multiplication. IEEE Trans. Comput. 40(2), 205–213 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  4. Carlet, C.:. A larger class of cryptographic Boolean functions via a study of the Maiorana–McFarland constructions. In: Advances in Cryptology—CRYPTO’02, Volume LNCS 2442, pp. 549–564. Springer, Berlin (2002)

  5. Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inf. Theory IT 52(7), 3105–3121 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  6. Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Coding and Cryptography, Volume LNCS 5557, pp. 1–11. Springer, Berlin (2009)

  7. Carlet, C.: On a Weakness of the Tu–Deng Function and Its Repair. Cryptology ePrint Archive, Report 2009/606

  8. Carlet, C.: Comments on “Constructions of cryptographically significant Boolean functions using primitive polynomials”. IEEE Trans. Inf. Theory 57(7), 4852–4853 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  9. Coppersmith, D.: Fast evaluation of logarithms in fields of characteristic two. IEEE Trans. Inf. Theory 30(4), 587–594 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  10. Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—CRYPTO 2003, Volume LNCS 2729, pp. 176–194. Springer, Berlin (2003)

  11. Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—EUROCRYPT 2003, Volume LNCS 2656, pp. 346–359. Springer, Berlin (2003)

  12. Dalai, D.K., Gupta, K.C., Maitra, S.: Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. In: Fast Software Encryption 2005, Volume LNCS 3557, pp. 98–111. Springer, Berlin (2005)

  13. Güneysu, T., Kasper, T., Novotný, M., Paar, C., Rupp, A.: Cryptanalysis with COPACOBANA. IEEE Trans. Comput. 57(11), 1498–1513 (2008). doi:10.1109/TC.2008.80

    Article  MathSciNet  MATH  Google Scholar 

  14. Khan, M.A., Özbudak, F.: Hybrid classes of balanced Boolean functions with good cryptographic properties. Inf. Sci. 273, 319–328. doi:10.1016/j.ins.2014.02.157, ISSN 0020-0255

  15. Li, N., Qi, W.F.: Construction and analysis of Boolean functions of \(2t+1\) variables with maximum algebraic immunity. In: Advances in Cryptology—ASIACRYPT 2006, Volume LNCS 4284, pp. 84–98. Springer, Berlin (2006)

  16. Maitra, S., Pasalic, E.: Further constructions of resilient Boolean functions with very high nonlinearity. IEEE Trans. Inf. Theory IT 48(7), 1825–1834 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  17. Stanica, P., Maitra, S.: Rotation symmetric Boolean functions—count and cryptographic properties. Discrete Appl. Math. 156(10), 1567–1580 (2008)

  18. Kavut, S., Maitra, S., Yücel, M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory IT 53(5), 1743–1751 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  19. Maitra, S., Pasalic, E.: A Maiorana–McFarland type construction for resilient functions on variables (\(n\) even) with nonlinearity \(>2^{n-1}-2^{n/2}+2^{n/2-2}\). Discrete Appl. Math. 154, 357–369 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  20. Mitra, S., Avya, L.J., McCluskey, E.J.: Efficient multiplexer synthesis techniques. IEEE Des. Test Comput. 17(4), 90–97 (2000). doi:10.1109/54.895009

    Article  Google Scholar 

  21. Sarkar, P., Maitra, S.: Construction of nonlinear Boolean functions with important cryptographic properties. In: Advances in Cryptology—EUROCRYPT’00, Volume LNCS 1807, pp. 485–506. Springer, Berlin (2000)

  22. Sarkar, P., Maitra, S.: Efficient implementation of cryptographically useful large Boolean functions. IEEE Trans. Comput. IT 52(4), 410–417 (2003)

    Article  Google Scholar 

  23. Tang, X., Tang, D., Zeng, X., Hu, L.: Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity. Cryptology ePrint Archive, Report 2010/443, (2010). http://eprint.iacr.org/

  24. Tu, Z., Deng, Y.: A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity. Cryptology ePrint Archive, Report 2010/179

  25. Tu, Z., Deng, Y.: A conjecture on binary strings and its application on constructing Boolean functions of optimal algebraic immunity. Des. Codes Cryptogr. (2010). doi:10.1007/s10623-010-9413-9

    MATH  Google Scholar 

  26. Xiao, G., Massey, J.L.: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory IT 34(3), 569–571 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  27. Wang, Q., Peng, J., Kan, H., Xue, X.: Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans. Inf. Theory IT 56, 3048–3053 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  28. Wang, Q., Carlet, C., Stanica, P., Tan, C.H.: Cryptographic properties of the hidden weighted bit function. Discrete Appl. Math. 174, 1–10 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  29. Wang, Q., Tan, C.H.: Cryptographic Boolean functions with a large number of variables. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), pp. 1534–1538 (2014). doi:10.1109/ISIT.2014.6875090

  30. Zeng, X., Carlet, C., Shan, J., Hu, L.: More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inf. Theory IT 57(9), 6310–6320 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  31. Zhang, W., Pasalic, E.: Generalized Maiorana–McFarland construction of resilient Boolean functions with high nonlinearity and good algebraic properties. IEEE Trans. Inf. Theory 60(10), 6681–6695 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  32. Zhang, W., Xiao, G.: Constructions of almost optimal resilient Boolean functions on large even number of variables. IEEE Trans. Inf. Theory IT 55(12), 5822–5831 (2009)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anupam Chattopadhyay.

Additional information

This work was supported by a fellowship of the German Academic Exchange Service. This work was supported in part by the National Natural Science Foundation of China under Grants 61373008 and 61672414.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pasalic, E., Chattopadhyay, A. & Zhang, W. Efficient implementation of generalized Maiorana–McFarland class of cryptographic functions. J Cryptogr Eng 7, 287–295 (2017). https://doi.org/10.1007/s13389-016-0139-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13389-016-0139-0

Keywords

Navigation