Next Article in Journal
The 3D Navier–Stokes Equations: Invariants, Local and Global Solutions
Previous Article in Journal
Pricing Compound and Extendible Options under Mixed Fractional Brownian Motion with Jumps
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Graph Theoretic Approach to Construct Desired Cryptographic Boolean Functions

by
Modjtaba Ghorbani
1,*,
Matthias Dehmer
2,3,4,
Vahid Taghvayi-Yazdelli
1 and
Frank Emmert-Streib
5,6
1
Department of Mathematics, Faculty of Science, Shahid Rajaee, Teacher Training University, Tehran 16785-136, Iran
2
Steyr School of Management, University of Applied Sciences Upper Austria, 4400 Steyr, Austria
3
Department of Biomedical Computer Science and Mechatronics, UMIT, 6060 Hall in Tyrol, Austria
4
College of Artificial Intelligence, Nankai University, Tianjin 300071, China
5
Predictive Medicine and Data Analytics Lab, Department of Signal Processing, Tampere University of Technology, 33100 Tampere, Finland
6
Predictive Society and Data Analytics Lab, Faculty of Information Technology and Communication Sciences, Tampere University, 33720 Tampere, Finland
*
Author to whom correspondence should be addressed.
Axioms 2019, 8(2), 40; https://doi.org/10.3390/axioms8020040
Submission received: 7 January 2019 / Revised: 15 March 2019 / Accepted: 26 March 2019 / Published: 3 April 2019

Abstract

:
In this paper, we present four product operations to construct cryptographic boolean functions from smaller ones with predictable Walsh spectrum. A lot of cryptographic properties of boolean functions can be presented by their Walsh spectrum. In our method, we use the product of Cayley graphs to present new boolean functions with desired Walsh spectrum and investigate their non-linearity, algebraic and correlation immunity.

1. Introduction

Boolean functions are fundamental components of a cryptographic algorithm. Designing boolean functions with desired cryptographic properties is an important problem. Boolean functions should have some properties like balancedness, high non-linearity, algebraic immunity, correlation immunity and propagation criterion to be used in a symmetric algorithm. These properties make the cipher resistant against attacks like differential and linear cryptanalysis, correlation and algebraic attacks and statistical tests. Correlation immune functions were introduced by Siegenthaler [1] to resist against a class of divide and conquer attacks on certain models of stream ciphers. Algebraic attacks [2,3] have become a powerful tool that can be used for almost all types of cryptographic systems. Algebraic attacks will be more efficient if boolean functions have low degrees. All cryptographic properties can be measured by the Walsh spectrum of a boolean function. Hence, constructing boolean functions with desired Walsh spectrum can help designers to use practical boolean functions. In this paper, we aim to propose four new methods to construct larger boolean functions from smaller ones with predictable cryptographic properties.
In 1999 Bernasconi et al. made a new characterization for boolean functions exploiting the graph theoretic approach. They proved that any boolean function can be represented by a Cayley graph and eigenvalues of this Cayley graph correspond to its Walsh spectrum. The authors defined a Cayley graph on the boolean function as f : Z 2 n Z 2 , where Γ = C a y ( Z 2 n , Ω f ) where Ω f is the support of f and two vertices x , y Z 2 n are incident if x y Ω f . Since for all elements x Z 2 n we have x 1 = x , any subset of Z 2 n is symmetric. The adjacency matrix of a boolean function A f is the adjacency matrix of its associated Cayley graph and ( A f ) i j = f ( i j ) . The following theorem is the main result of [4] where the function W ( f ) is the Walsh transform of the boolean function f.
Theorem 1.
Let f : Z 2 n Z 2 , and let λ i , 0 i 2 n 1 be the eigenvalues of its associated Cayley graph.
(i) For any 0 i 2 n 1 , λ i = W ( f ) ( i ) .
(ii) The multiplicity of the largest spectral coefficient of f, W ( f ) ( 0 ) is equal to 2 n d i m Ω f .
In [5] Stanica investigated some cryptographic properties of boolean functions in terms of their eigenvalues and adapted some graph theory concepts with cryptographic properties of these functions. In the following we state some of these results.
Corollary 1.
Let f be a boolean function and the eigenvalues of Γ f be ordered as λ 1 λ 2 λ v .
  • Let g be the multiplicity of the lowest eigenvalue of Γ f and λ 2 0 , in this case m i n { g + 1 , 1 λ v λ 2 } χ ( Γ f ) | Ω f | where χ ( Γ f ) is the chromatic number of Γ f .
  • A boolean function f depends linearly on a variable x i if and only if the eigenvalues for Cayley graph Γ f satisfy λ 0 = 2 n 1 and if i-th component of binary representation of a 0 equals to 0, then λ a = 0 .
  • For an unbalanced correlation immune function f on Z 2 n of order l, there are s = 1 l 2 n s zero eigenvalues of Γ f .
In Section 2, we first start with some definitions and basic properties of boolean functions and their cryptographic properties. Next we state some algebraic graph theory that will be used throughout the paper. In Section 3, we first present some related works to our subject and next we propose our methods to construct new boolean functions. Finally, we present some theorems to investigate their cryptographic properties.

2. Definitions and Preliminaries

2.1. Boolean Functions

Consider the field Z 2 with elements { 0 , 1 } . Let n be a positive integer and Z 2 n = { ( x n , , x 1 ) | x i Z 2 , 1 i n } be the binary representation of the positive integer set { 0 , 1 , , 2 n 1 } . Here, we show addition in integer sets by +, and addition by module 2 by . For x , y Z 2 n , define x y = ( x 1 y 1 , , x n y n ) and x . y = x 1 y 1 x n y n . We also define the Hamming weight of a vector x Z 2 n as h w t ( x ) = | { i | x i = 1 } | . Now an n-variable boolean function f ( x n , , x 2 , x 1 ) is a map from Z 2 n to Z 2 . The set of all boolean functions over Z 2 n is denoted by F n . An n-variable boolean function f ( x n , , x 2 , x 1 ) can be represented as a multivariate polynomial over Z 2 called algebraic normal form (ANF) as
f ( x n , , x 1 ) = a 0 i = 0 n a i x i 1 i , j n a i j x i x j a 1 n x 1 x 2 x n .
The algebraic degree of a boolean function f is the number of variables in the most existing variables of its multiplicative terms with nonzero coefficient in its ANF and denoted by d e g ( f ) . A boolean function of the form f ( x ) = a 0 a 1 x 1 a n x n is called affine and if a 0 = 0 , is called linear.
The binary vector of length 2 n as ( f ( 0 ) , f ( 1 ) , , f ( 2 n 1 ) ) Z 2 n , is said to be the truth table of f. We also denote the support of f by Ω f as { x Z 2 n | f ( x ) = 1 } . Clearly 0 | Ω f | 2 n and also the hamming weight of f is h w t ( f ) = | Ω f | .
One can see that the ANF of a boolean function f : Z 2 n Z 2 with support Ω f is
f ( x n , , x 1 ) = α = ( α n , , α 1 ) Ω f x α
where x α = x n ( α n ) x 1 ( α 1 ) = ( x n α n 1 ) ( x 1 α 1 1 ) . So we have
f ( x n , , x 1 ) = α Ω f i = 1 n ( x i α i 1 ) .
The distance between two boolean functions f , g F n is defined as d ( f , g ) = h w t ( f g ) . For each boolean function f : Z 2 n Z 2 , the sign function is f ^ : Z 2 n { 1 , 1 } where f ^ ( x ) = ( 1 ) f ( x ) .
The Walsh transform of a boolean function is a function W ( f ) from Z 2 n to Z where
W ( f ) ( w ) = x = 0 2 n 1 f ( x ) ( 1 ) w . x .
It is clear that W ( f ) ( 0 ) = | Ω f | and the Walsh spectrum of a boolean function can be defined as ( W ( f ) ( 0 ) , , W ( f ) ( 2 n 1 ) ) . Also the relation between W ( f ) ( w ) and W ( f ^ ) ( w ) = x = 0 2 n 1 ( 1 ) f ( x ) + w . x is as follows
W ( f ) ( w ) = 2 n 1 δ ( w ) 1 2 W ( f ^ ) ( w ) ,
W ( f ^ ) ( w ) = 2 n δ ( w ) 2 W ( f ) ( w ) ,
where δ ( w ) = 1 if w = 0 and δ ( w ) = 0 , otherwise.
Any cryptographical property comes from a concrete attack or a potential security threat to cryptosystems. A lot of cryptographic properties of boolean functions can be described by their Walsh spectrum. The Walsh spectrum has been mostly employed for analysis and generalization of desired cryptographic boolean functions [6,7,8].
A boolean function f is called balanced if the number of outputs 0 is equal to the number of outputs 1 or | Ω f | = 2 n 1 .
The nonlinearity of a boolean function f denoted by n l ( f ) is an important criterion to measure the distance of the boolean function with the set of all affine functions. This criterion is a security property to measure how resistant a boolean function is against linear cryptanalysis which is a common and strong attack. If a boolean function has low nonlinearity, an attacker can approximate it by an affine function. A boolean function with high nonlinearity cannot be approximated by linear or affine functions. The nonlinearity of a boolean function can be measured by the following lemma.
Lemma 1.
[9] For an n-variable boolean function f ,
n l ( f ) = 2 n 1 1 2 m a x w Z 2 n | W ( f ^ ) ( w ) | .
By Lemma 1 and Equation (3), one can deduce the following lemma.
Lemma 2.
n l ( f ) = m i n { h w t ( f ) , 2 n h w t ( f ) , 2 n 1 m a x w Z 2 n | W ( f ) ( w ) | } .
If a boolean function f is a statistically independent of any k of its input variables, then we call f is the correlation immune of order k or k-CI which is a security measure about how resistant a boolean function is against a correlation attack. If a boolean function is balanced and correlation immunity is of order k, then it is said to be k-resilient. Correlation immune (CI) boolean functions were introduced by Siegenthaler [1] to introduce a criterion to resist against certain types of divide and conquer cryptanalysis on some kind of stream ciphers. In 1985, Chor et al. [10] conjectured that the only one-resilient symmetric functions are the exclusive- or of all n-variable and its negation. This conjecture was disproved by Gopalakrishnan, Hoffman and Stinson in [11] in 1993 by presenting a class of infinite counter examples, and they noted that it does not seem to extend any further in an obvious way. Maitra et al. [12] in 1999 proved that the number of n-variable CI boolean functions with Hamming weight 2 t + 2 is strictly greater than the number of these functions with Hamming weight 2 t for which 2 t < 2 n 1 .
The relation of correlation immunity of a boolean function with its Walsh spectrum can be interpreted as follows.
Lemma 3.
A boolean function is correlation immune of order k if and only if for any w Z 2 n with 1 h w t ( w ) k , W ( f ) ( w ) = 0 .
The algebraic immunity is a cryptographic property that measures the resistance of a boolean function against the algebraic attack proposed by Courtois in 2003 in [2] for stream ciphers and also for block ciphers in [3]. Constructing boolean functions with the best algebraic immunity is a very hard task. The algebraic immunity is an important property of boolean functions that causes resistance against algebraic attack. An algebraic attack is a powerful attack which might threaten the security of both blocks and stream ciphers. The idea is to set up an algebraic system of equations verified by the key bits and trying to solve it. This raises the fundamental issue of determining whether or not a given function has non-trivial low degree multiples. Further, the algebraic immunity of the boolean function f F n is defined as follows:
A I ( f ) = m i n { d e g ( g ) | g F n , ( f g = 0 o r ( f 1 ) g = 0 ) } .
The problem of finding boolean functions with high algebraic immunity is equivalent to the problem of resisting against algebraic attack. There is a theorem from [13] that characterizes the relation between the support of a boolean function and its algebraic immunity as the following:
Theorem 2.
If the support of a boolean function f on n variables is a k-dimensional subspace of Z 2 n , then the algebraic degree of f is n k .

2.2. Graph Theory

Since we use some results in graph theory and algebraic graph theory, we now recall some concepts and results in these field in the following.
The set of vertices and edges of a graph G are denoted by V ( G ) and E ( G ) , respectively. A graph with n vertices and m edges is called ( n , m ) -graph. Two vertices are adjacent if there is an edge between them. A graph is called r-regular if every vertex is adjacent to exactly r vertices.
The adjacency matrix of G is a (0,1)-matrix A = ( a i j ) n × n the rows and columns of which are labeled by vertices and if v i v j E ( G ) , ( 1 i , j n ) then a i j = 1 and a i j = 0 , otherwise. The determinant d e t ( A λ I ) is a polynomial of degree n which is called characteristic polynomial of G. The roots of this polynomial are called the eigenvalues of G. If λ 1 > λ 2 > > λ k are distinct eigenvalues of G with multiplicities s 1 , s 2 , , s k respectively, we denote the spectrum of G by s p e c ( G ) = { λ 1 s 1 , , λ k s k } .
Now we define the Cayley graph from [14]. Let A be a group and S A be a subset of A such that 1 A S A and if x S A then x 1 S A (symmetric subset of the group), the Cayley graph Γ = C a y ( A , S A ) is a simple graph where
V ( Γ ) = A   and   E ( Γ ) = { { g , h } | g h 1 S A } .
The Cayley graph Γ = C a y ( A , S A ) is a | S A | -regular graph. Here, we use [15] to introduce four graph products namely, the Cartesian product, tensor product, strong product and lexicographic product and then we investigate some algebraic approachs for the Walsh spectrum of regarded boolean functions. The main question is under which conditions, the product of two Cayley graphs, is again a Cayley graph.
The Cartesian product of two graphs G 1 and G 2 denoted by G 1 G 2 is the graph with vertex set V ( G 1 ) × V ( G 2 ) and edge set
{ ( v 1 , u 1 ) ( v 2 , u 2 ) | v 1 = v 2 , u 1 u 2 E ( G 2 ) o r v 1 v 2 E ( G 1 ) , u 1 = u 2 } .
If { α i | 1 i n 1 } and { β j | 1 j n 2 } are the eigenvalue multisets of G 1 and G 2 (respectively), then { α i + β j , | 1 i n 1 , 1 j n 2 } is the eigenvalue multiset of G 1 G 2 . In the following theorem, the conditions which shows when a Cartesian product of two Cayley graphs is again a Cayley graph, is investigated.
Theorem 3.
[16] Let A and B be two groups. If Γ 1 = C a y ( A , S A ) and Γ 2 = C a y ( B , S B ) are two Cayley graphs, then the Cartesian product of two graphs Γ = Γ 1 Γ 2 is also a Cayley graph and Γ = C a y ( A × B , S ) where S = ( S A , 1 B ) ( 1 A , S B ) .
Let G 1 be an ( n 1 , m 1 ) -graph and G 2 an ( n 2 , m 2 ) -graph. The tensor product G 1 G 2 is a graph with vertex set V ( G 1 ) × V ( G 2 ) and E ( G 1 G 2 ) = { ( v 1 , u 1 ) ( v 2 , u 2 ) | v 1 v 2 E ( G 1 ) , u 1 u 2 E ( G 2 ) } . Suppose { α i | 1 i n 1 } and { β j | 1 j n 2 } are respectively the eigenvalue multisets of G 1 , G 2 , then { α i β j | 1 i n 1 , 1 j n 2 } is the eigenvalue multiset of G 1 G 2 . More generally, we have the following theorem.
Theorem 4.
[16] Let A and B be two groups whose related Cayley graphs are Γ 1 = C a y ( A , S A ) and Γ 2 = C a y ( B , S B ) . Then the tensor product Γ = Γ 1 Γ 2 is also a Cayley graph where Γ = C a y ( A × B , S ) and S = S A × S B .
The strong product of two graphs G 1 and G 2 denoted by G 1 G 2 is a graph with vertex set V ( G 1 ) × V ( G 2 ) and edge set E ( G 1 G 2 ) = E ( G 1 G 2 ) E ( G 1 G 2 ) . If { α i | 1 i n 1 } and { β j | 1 j n 2 } are respectively the eigenvalue multisets of G 1 and G 2 , then { ( α i + 1 ) ( β j + 1 ) 1 , | 1 i n 1 , 1 j n 2 } is the eigenvalue multiset of G 1 G 2 .
Theorem 5.
[16] Let A and B be two groups. If Γ 1 = C a y ( A , S A ) and Γ 2 = C a y ( B , S B ) are two Cayley graphs, then the strong product Γ = Γ 1 Γ 2 is also a Cayley graph and Γ = C a y ( A × B , S ) , where S = ( S A × S B ) ( S A , 1 B ) ( 1 A , S B ) .
The lexicographic product G 1 G 2 of two graphs G 1 and G 2 is one with vertex set V ( G 1 ) × V ( G 2 ) and
E ( G 1 G 2 ) = { ( v 1 , u 1 ) ( v 2 , u 2 ) | v 1 v 2 E ( G 1 ) o r v 1 = v 2 , u 1 u 2 E ( G 2 ) } .
Theorem 6.
[17] Let G 1 be a graph of order n 1 with spectrum s p e c ( G 1 ) = { λ 1 m 1 , λ 2 m 2 , , λ s m s } and let G 2 be a p-regular graph of order n 2 with spectrum s p e c ( G 2 ) = { μ 1 r 1 , μ 2 r 2 , , μ t r t } . Then
s p e c ( G 1 G 2 ) = { p n 1 ( r 1 1 ) , μ 2 n 1 r 2 , , μ t n 1 r t } { ( n 2 λ 1 + μ 1 ) m 1 , , ( n 2 λ s + μ 1 ) m s } .
Theorem 7.
[16] Let A and B be two groups. If Γ 1 = C a y ( A , S A ) and Γ 2 = C a y ( B , S B ) are two Cayley graphs, then the lexicographic product Γ = Γ 1 Γ 2 is also a Cayley graph in which Γ = C a y ( A × B , S ) and S = ( S A × B ) ( 1 A , S B ) .

3. Main Results

Constructing cryptographic boolean functions with different methods is a prevalent research field.
Here, we construct four new families of boolean functions by means of graph products with predictable Walsh spectrum and then we verify their correlation immunity, algebraic immunity and nonlinearity. For a given boolean function f, we suppose f ( 0 ) = 0 or the associated Cayley graph is simple. Let f 1 : Z 2 n 1 Z 2 and f 2 : Z 2 n 2 Z 2 be two boolean functions with associated Cayley graphs Γ 1 = C a y ( Z 2 n 1 , Ω f 1 ) and Γ 2 = C a y ( Z 2 n 2 , Ω f 2 ) , respectively. In the following, suppose [ n ] = { 1 , 2 , , n } .
First construction. The Cartesian product of two boolean functions can be defined as f 1 f 2 : Z 2 n 1 + n 2 Z 2 with
Ω f 1 f 2 = { x Z 2 n 1 + n 2 | ( x n 1 + n 2 , , x n 1 + 1 ) Ω f 2 , x i = 0 , i [ n 1 ] } { x Z 2 n 1 + n 2 | ( x n 1 , , x 1 ) Ω f 1 , x i + n 1 = 0 , i [ n 2 ] } .
Clearly, | Ω f 1 f 2 | = | Ω f 1 | + | Ω f 2 | and by Equation (1), one can conclude that the ANF of f = f 1 f 2 is
f ( x n 1 + n 2 , , x 2 , x 1 ) = f 2 ( x n 1 + n 2 , , x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) = ( 1 x n 1 + n 2 ) ( 1 x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) ( 1 x n 1 ) ( 1 x 1 ) f 2 ( x n 1 + n 2 , , x n 1 + 1 ) .
The spectrum of the related Cayley graph on f 1 f 2 is
{ W ( f 1 ) ( x ) + W ( f 2 ) ( y ) | x Z 2 n 1 , y Z 2 n 2 } .
Second construction. The tensor product of two boolean functions can be defined as f 1 f 2 : Z 2 n 1 + n 2 Z 2 with
Ω f 1 f 2 = { x Z 2 n 1 + n 2 | ( x n 1 + n 2 , , x n 1 + 1 ) Ω f 2 , ( x n 1 , , x 1 ) Ω f 1 } .
One can conclude that the ANF of f = f 1 f 2 is
f ( x n 1 + n 2 , , x 1 ) = f 2 ( x n 1 + n 2 , , x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) = f 2 ( x n 1 + n 2 , , x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) ,
where, on the other hand, the spectrum of the related Cayley graph on f 1 f 2 is
{ W ( f 1 ) ( x ) W ( f 2 ) ( y ) | x Z 2 n 1 , y Z 2 n 2 } .
Third construction. In this construction we define the strong product of two boolean functions as f = f 1 f 2 : Z 2 n 1 + n 2 Z 2 with
Ω f = { x Z 2 n 1 + n 2 | ( x n 1 + n 2 , , x n 1 + 1 ) Ω f 2 , ( x n 1 , , x 1 ) Ω f 1 } { x Z 2 n 1 + n 2 | ( x n 1 + n 2 , , x n 1 + 1 ) Ω f 2 , x i = 0 , i [ n 1 ] } { x Z 2 n 1 + n 2 | ( x n 1 , , x 1 ) Ω f 1 , x i + n 1 = 0 , i [ n 2 ] } .
By Equation (1), it is easy to verify that the ANF of f = f 1 f 2 is
f ( x n 1 + n 2 , , x 1 ) = f 2 ( x n 1 + n 2 , , x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) = f 2 ( x n 1 + n 2 , , x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) ( 1 x n 1 + n 2 ) ( 1 x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) ( 1 x n 1 ) ( 1 x 1 ) f 2 ( x n 1 + n 2 , , x n 1 + 1 ) ,
where | Ω f 1 f 2 | = | Ω f 1 | | Ω f 2 | + | Ω f 1 | + | Ω f 2 | . The spectrum of the related Cayley graph on f 1 f 2 is
{ W ( f 1 ) ( x ) W ( f 2 ) ( y ) + W ( f 1 ) ( x ) + W ( f 2 ) ( y ) | x Z 2 n 1 , y Z 2 n 2 } .
Fourth construction. Here we define the lexicographic product of two boolean functions as f = f 1 f 2 : Z 2 n 1 + n 2 Z 2 with
Ω f = { x Z 2 n 1 + n 2 | ( x n 1 + n 2 , , x n 1 + 1 ) Z 2 n 2 and ( x n 1 , , x 1 ) Ω f 1 } { x Z 2 n 1 + n 2 | ( x n 1 + n 2 , , x n 1 + 1 ) Ω f 2 and x i = 0 , 1 i n 1 } .
where | Ω f 1 f 2 | = 2 n 2 | Ω f 1 | + | Ω f 2 | . By Equation (1), one can see that the ANF of f = f 1 f 2 is
f ( x n 1 + n 2 , , x 1 ) = f 2 ( x n 1 + n 2 , , x n 1 + 1 ) f 1 ( x n 1 , , x 1 ) = [ f 1 ( x n 1 , , x 1 ) ( 1 x n 1 ) ] [ ( 1 x 1 ) f 2 ( x n 1 + n 2 , , x n 1 + 1 ) ] .
The spectrum of the related Cayley graph on f 1 f 2 is
s p e c ( f 2 ) { 2 n 2 W ( f 1 ) ( x ) + W ( f 2 ) ( 0 ) | x Z 2 n 1 } .
Now we verify the cryptographic properties of these constructions. In the following theorems, let f 1 and f 2 be as above.
Theorem 8.
In construction one, if f 1 and f 2 are correlation immune of order l, then f 1 f 2 is correlation immune of order l. Also if f 1 and f 2 are correlation immune of order l such that | Ω f 1 | + | Ω f 2 | = 2 n 1 + n 2 1 , then f 1 f 2 is l - resilient.
Proof. 
Let f = f 1 f 2 and w = ( w n 1 + n 2 , , w 1 ) Z 2 n 1 + n 2 in which h w t ( w ) = l . Let w = ( a , b ) , a Z 2 n 2 , b Z 2 n 1 , then
W ( f ) ( w ) = x Z 2 n 1 + n 2 , x = ( r , s ) f ( x ) ( 1 ) w . x = x Ω f 1 f 2 ( 1 ) w . x = r Ω f 2 , s = 0 ( 1 ) w . x + r = 0 , s Ω f 1 ( 1 ) w . x = r Ω f 2 ( 1 ) a . r + s Ω f 1 ( 1 ) b . s = W ( f 2 ) ( a ) + W ( f 1 ) ( b ) .
Since h w t ( a ) , h w t ( b ) l and f 1 and f 2 are l - CI, we can verify that W ( f 2 ) ( a ) = 0 , W ( f 1 ) ( b ) = 0 and hence W ( f ) ( w ) = 0 .  □
Theorem 9.
In the second construction, if f 1 and f 2 are l-CI, then f 1 f 2 is l-CI, and if | Ω f 1 | | Ω f 2 | = 2 n 1 + n 2 1 , then f 1 f 2 is l-resilient.
Proof. 
For any w Z 2 n 1 + n 2 with h w t ( w ) = l and w = ( a , b ) , where a Z 2 n 2 , b Z 2 n 1 , we prove W ( f ) ( w ) = W ( f 2 ) ( a ) W ( f 1 ) ( b ) . This yields that
W ( f ) ( w ) = x Z 2 n 1 + n 2 , x = ( r , s ) f ( x ) ( 1 ) w . x = x Ω f 1 f 2 ( 1 ) w . x = r Ω f 2 , s Ω f 1 ( 1 ) a . r + b . s = r Ω f 2 , s Ω f 1 ( 1 ) a . r ( 1 ) b . s = r Ω f 2 ( 1 ) a . r s Ω f 1 ( 1 ) b . s = W ( f 2 ) ( a ) W ( f 1 ) ( b ) .
Since h w t ( a ) , h w t ( b ) l and f 1 and f 2 are l - CI, we have W ( f 2 ) ( a ) = 0 , W ( f 1 ) ( b ) = 0 and hence W ( f ) ( w ) = 0 .  □
Theorem 10.
If f 1 and f 2 are l-CI, then f 1 f 2 is l-CI, and if | Ω f 1 | | Ω f 2 | + | Ω f 1 | + | Ω f 2 | = 2 n 1 + n 2 1 , then f 1 f 2 is l-resilient.
Proof. 
Since Ω f 1 f 2 = Ω f 1 f 2 Ω f 1 f 2 , then for any w Z 2 n 1 + n 2 with h w t ( w ) = l and w = ( a , b ) , a Z 2 n 2 , b Z 2 n 1 , we have W ( f ) ( w ) = W ( f 2 ) ( a ) + W ( f 1 ) ( b ) + W ( f 2 ) ( a ) W ( f 1 ) ( b ) . On the other hand, f 1 , f 2 are l CI and h w t ( a ) , h w t ( b ) l which yields that W ( f 2 ) ( a ) = 0 and W ( f 1 ) ( b ) = 0 . This means that W ( f ) ( w ) = 0 .  □
Theorem 11.
For two boolean functions f 1 , f 2 , the boolean function f 1 f 2 is not correlation immune.
Proof. 
Consider the element w Z 2 n 1 + n 2 such that h w t ( w ) = l and w = ( a , b ) , where a Z 2 n 2 , b Z 2 n 1 . In this case we have
W ( f ) ( w ) = x Z 2 n 1 + n 2 , x = ( r , s ) f ( x ) ( 1 ) w . x = x Ω f 1 f 2 ( 1 ) w . x = r Z 2 n 2 , s Ω f 1 ( 1 ) w . x + r Ω f 2 , s = 0 ( 1 ) w . x = r Z 2 n 2 , s Ω f 1 ( 1 ) a . r ( 1 ) b . s + r Ω f 2 ( 1 ) a . r = r Z 2 n 2 ( 1 ) a . r s Ω f 1 ( 1 ) b . s + W ( f 2 ) ( a ) .
In other words, if a = 0 , then W ( f ) ( w ) = 2 n 2 W ( f 1 ) ( b ) + W ( f 2 ) ( 0 ) and if a 0 then W ( f ) ( w ) = W ( f 2 ) ( a ) .  □
The algebraic immunity of these constructions is presented in the following:
Theorem 12.
Let f 1 : Z 2 n 1 Z 2 and f 2 : Z 2 n 2 Z 2 be two boolean functions. Then
(i) A I ( f 1 f 2 ) = 2 ,
(ii) A I ( f 1 f 2 ) m i n { A I ( f 1 ) , A I ( f 2 ) } ,
(iii) A I ( f 1 f 2 ) m i n { A I ( f 1 ) , A I ( f 2 ) } + 1 ,
(iv) A I ( f 1 f 2 ) A I ( f 1 ) + 1 .
Proof. 
(i) x 1 x n 1 is an annihilator of f 1 f 2 so
A I ( f 1 f 2 ) = 2 .
(ii) If g 1 and g 2 are annihilators of f 1 and f 2 respectively, then g 1 and g 2 are annihilators of f 1 f 2 too.
(iii) If g 1 and g 2 are annihilators of f 1 and f 2 respectively, then x n 1 g 1 and x n 1 + 1 g 2 are annihilators of f 1 f 2 too.
(iv) If g 1 is an annihilator of f 1 , then x 1 g 1 is an annihilator of f 1 f 2 .  □
In the following theorem, we investigate nolinearity of these constructions.
Theorem 13.
Let f 1 F n 1 and f 2 F n 2 . Then
( i ) n l ( f 1 f 2 ) = m i n { | Ω f 1 | + | Ω f 2 | , 2 n 1 + n 2 | Ω f 1 | + | Ω f 2 | , 2 n 1 + n 2 1 m a x ( x , y ) 0 { | W ( f 1 ) ( x ) + W ( f 2 ) ( y ) | } } . ( i i ) n l ( f 1 f 2 ) = m i n { | Ω f 1 | | Ω f 2 | , 2 n 1 + n 2 | Ω f 1 | | Ω f 2 | , 2 n 1 + n 2 1 m a x ( x , y ) 0 { | W ( f 1 ) ( x ) W ( f 2 ) ( y ) | } } . ( i i i ) n l ( f 1 f 2 ) = m i n { | Ω f 1 | + | Ω f 2 | + | Ω f 1 | | Ω f 2 | , 2 n 1 + n 2 ( | Ω f 1 | + | Ω f 2 | + | Ω f 1 | | Ω f 2 | ) , 2 n 1 + n 2 1 m a x ( x , y ) 0 { | W ( f 1 ) ( x ) + W ( f 2 ) ( y ) + W ( f 1 ) ( x ) W ( f 2 ) ( y ) | } } . ( i v ) n l ( f 1 f 2 ) = m i n { 2 n 2 | Ω f 1 | + | Ω f 2 | , 2 n 1 + n 2 2 n 2 | Ω f 1 | + | Ω f 2 | , 2 n 1 + n 2 1 m a x { W ( f 2 ) ( x ) , 2 n 2 W ( f 1 ) ( y ) + | Ω f 2 | } } .
Proof. 
It is a straight result from Lemma 2 and the following conditions
(i) h w t ( f 1 f 2 ) = | Ω f 1 + Ω f 2 | ,
(ii) h w t ( f 1 f 2 ) = | Ω f 1 | | Ω f 2 | ,
(iii) h w t ( f 1 f 2 ) = | Ω f 1 | | Ω f 2 | + | Ω f 1 | + | Ω f 2 | ,
(iv) h w t ( f 1 f 2 ) = 2 n 2 | Ω f 1 | + | Ω f 2 | .  □

4. Conclusions

Boolean functions have many applications in fault-tolerant distributed computing and quantum cryptographic key. The fundamental tool in analysis of cryptographic boolean functions is the Walsh spectrum. In this paper, we introduced four new constructions of cryptographic boolean functions by using Cayley graph products. These boolean functions are constructed from smaller ones and the Walsh spectrum of them can be derived by Walsh spectrum of the smaller ones. Next, we investigated the conditions of correlation, algebraic immunity and nonlinearity of these families by the smaller boolean functions. These conditions help designers to design large boolean functions with desired cryptography properties. In future works, we can apply our method for other graph products.

Author Contributions

M.G., M.D., V.T.-Y., F.E.-S. wrote the paper.

Funding

Matthias Dehmer thanks the Austrian Science Funds for supporting this work (project P30031).

Conflicts of Interest

The authors declare that there is no conflict of interest.

References

  1. Siegenthaler, T. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inform. Theory 1984, 30, 776–780. [Google Scholar] [CrossRef]
  2. Courtois, N.; Meier, W. Algebraic attacks on stream ciphers with linear feedback. In Advances in Cryptology, Proceedings of the Eurocrypt’03. LNCS 2656; Springer: Berlin, Germany, 2003; pp. 345–359. [Google Scholar]
  3. Courtois, N.; Pieprzyk, J. Cryptanalysis of block ciphers with overdefined systems of equations. In Advances in Cryptology, Proceedings of the Asiacrypt 2002. LNCS 2501; Springer: Berlin, Germany; New York, NY, USA, 2002; pp. 267–287. [Google Scholar]
  4. Bernasconi, A.; Codenotti, B. Spectral analysis of Boolean functions as a graph eigenvalue problem. IEEE Trans. Comput. 1999, 48, 345–351. [Google Scholar] [CrossRef]
  5. Stanica, P. Graph eigenvalues and Walsh spectrum of Boolean functions. In Combinatorial Number Theory, de Gruyter, Proceedings of the ‘Integers Conference 2005’ in Celebration of the 70th Birthday of Ron Graham, Carrollton, GA, USA, 27–30 October 2005; pp. 431–442.
  6. Cusic, T.W.; Stanica, P. Cryptographic Boolean Functions and Applications; Academic Press: Cambridge, MA, USA; Elseveir Inc.: Amsterdam, The Netherlands, 2009. [Google Scholar]
  7. Carlet, C. Boolean Functions for Cryptography and Error Correcting Codes. In Chapter of the Monograph Boolean Models and Methods in Mathematics, Computer Science and Engineering; Crama, Y., Hammer, P.L., Eds.; Cambridge University Press: Cambridge, UK, 2010; pp. 257–397. [Google Scholar]
  8. Wu, C.; Feng, D. Boolean Functions and Their Applications in Cryptography; Springer: Beijing, China, 2016. [Google Scholar]
  9. Meier, W.; Staffelbach, O. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology, Proceedings of the Eurocrypt’89. LNCS 434; Springer: Berlin, Germany, 1990; pp. 549–562. [Google Scholar]
  10. Chor, B.; Goldreich, O.; Hastad, J.; Friedman, J.; Rudich, S.; Smolensky, R. The bit extraction problem or t-resilient functions. In Proceedings of the 26th Annual Symposium on Foundations of Computer Science, Portland, OR, USA, 21–23 October 1985; pp. 396–407. [Google Scholar]
  11. Gopalakrishnan, K.; Hoffman, D.G.; Stinson, D.R. A note on a conjecture concerning symmetric resilient functions. Inform. Process. Lett. 1993, 47, 139–143. [Google Scholar] [CrossRef]
  12. Maitra, S.; Sarkar, P. Hamming weights of correlation immune Boolean functions. Inform. Process Lett. 1999, 71, 149–153. [Google Scholar] [CrossRef]
  13. Wu, C.K.; Yu, J. On the annihilators of cryptographic Boolean functions. Acta Electron. Sin. 2006, 34, 51–54. [Google Scholar]
  14. Biggs, N. Algebraic Graph Theory; Cambridge University Press: Cambridge, UK, 1974. [Google Scholar]
  15. Imrich, W.; Klavzar, S. Product Graphs: Structure and Recognition; Wiley: Hoboken, NJ, USA, 2000. [Google Scholar]
  16. Abdollahi, A.R.; Loghman, A. Cayley graphs isomorphisms of the product of two Cayley graphs. Ars Combin. to appear.
  17. Abreu, N.; Cardoso, D.M.; Carvalho, P.; Vinagre, C.T.M. Spectra and Laplacian spectra of arbitrary powers of lexicographic products of graphs. Discret. Math. 2017, 340, 3235–3244. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Ghorbani, M.; Dehmer, M.; Taghvayi-Yazdelli, V.; Emmert-Streib, F. A Graph Theoretic Approach to Construct Desired Cryptographic Boolean Functions. Axioms 2019, 8, 40. https://doi.org/10.3390/axioms8020040

AMA Style

Ghorbani M, Dehmer M, Taghvayi-Yazdelli V, Emmert-Streib F. A Graph Theoretic Approach to Construct Desired Cryptographic Boolean Functions. Axioms. 2019; 8(2):40. https://doi.org/10.3390/axioms8020040

Chicago/Turabian Style

Ghorbani, Modjtaba, Matthias Dehmer, Vahid Taghvayi-Yazdelli, and Frank Emmert-Streib. 2019. "A Graph Theoretic Approach to Construct Desired Cryptographic Boolean Functions" Axioms 8, no. 2: 40. https://doi.org/10.3390/axioms8020040

APA Style

Ghorbani, M., Dehmer, M., Taghvayi-Yazdelli, V., & Emmert-Streib, F. (2019). A Graph Theoretic Approach to Construct Desired Cryptographic Boolean Functions. Axioms, 8(2), 40. https://doi.org/10.3390/axioms8020040

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop