Next Article in Journal
Dynamic ILC for Linear Repetitive Processes Based on Different Relative Degrees
Next Article in Special Issue
An Image-Encipherment Algorithm Using a Combination of a One-Dimensional Chaotic Map and a Three-Dimensional Piecewise Chaotic Map
Previous Article in Journal
On Impulsive Implicit ψ-Caputo Hybrid Fractional Differential Equations with Retardation and Anticipation
Previous Article in Special Issue
A New Mixture Differential Cryptanalysis on Round-Reduced AES
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity

1
School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
2
Westone Cryptologic Research Center (CRC), Chengdu 610095, China
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(24), 4822; https://doi.org/10.3390/math10244822
Submission received: 25 October 2022 / Revised: 23 November 2022 / Accepted: 15 December 2022 / Published: 19 December 2022
(This article belongs to the Special Issue Advances in Algebraic Coding Theory and Cryptography)

Abstract

:
Boolean functions and vectorial Boolean functions are the most important nonlinear components of stream ciphers. They should satisfy several criteria such as high nonlinearity, proper resiliency and so on to guarantee the security of the whole system. However, there are some constraints among the criteria, and how to achieve a trade-off between them is an important issue. In this paper, some nonlinear Boolean functions possessing simple algebraic normal form with special Walsh spectrum are proposed. By using these functions, we provide two construction methods on balanced and resilient Boolean functions with high nonlinearity. In addition, based on the disjoint linear codes and vector matrices with special properties, some resilient vectorial Boolean functions with currently best-known nonlinearity have also been given.

1. Introduction

Stream ciphers play an important role in the confidential communication of government, military and other important departments and various mobile communication systems. Cryptographic functions, including Boolean functions and multi-output Boolean functions, are usually used as the most important nonlinear component in symmetric cryptosystems, especially in stream ciphers, and their properties directly affect the security of the whole encryption system. For the known linear cryptographic attack, related attack, Berlekamp–Massey attack, algebraic attack and other attack methods, it is necessary to use functions with high nonlinearity, certain resiliency, high algebraic degree and so on. However, there are some constraints among these criteria, and how to construct Boolean functions with a good trade-off among some of the criteria is an interesting research problem, for instance, the trade-off between the resiliency and nonlinearity, the optimization of algebraic immunity, the new class of Bent functions and the autocorrelation properties. In this paper, we mainly focus on the good trade-off between nonlinearity and resiliency of Boolean functions and vectorial Boolean functions.
In order to obtain Boolean functions satisfying certain criteria, modifications of the Maiorana–McFarland (M–M) construction [1] by concatenating small functions are often employed. The properties of the modified M-M functions absolutely depend on the small functions. Thus, properly selecting the small functions is crucial for the method. For an n-variable function ( n = 2 k ), when the small functions are different k-variable linear functions with number 2 k , the constructed function is called Bent [2]. This kind of functions possess the maximal nonlinearity 2 n 1 2 n / 2 1 , but they are not balanced. In [3], balanced Boolean functions with known best nonlinearity have been given by iteratively replacing all zero linear functions in the M-M methods, and Dobbertin obtained the same result, respectively, in [4]. However, how to construct a resilient Boolean function with high nonlinearity is an interesting problem; many results have been provided by using modified M-M methods, see [5,6,7,8,9,10,11,12,13,14,15,16], and the nonlinearity of some resilient functions can be strictly larger than 2 n 1 2 n / 2 .
Vectorial Boolean functions are usually used to improve the production efficiency of the key that generated stream ciphers. They can be viewed as a collection of Boolean functions. An n-input and m-output vectorial Boolean function is referred to as an ( n , m ) function. Similarly to the Boolean function, vectorial Boolean functions also need to satisfy criteria such as nonlinearity, resiliency and so on. For ( n , m ) functions with n even, the upper bound of the nonlinearity is still 2 n 1 2 n / 2 1 . However, they are not balanced either. How to construct resilient ( n , m ) functions with nonlinearity lower than the upper bound but larger than 2 n 1 2 n / 2 is also an important problem in recent years. By contrast, fewer results have been obtained than the Boolean ones [17,18,19,20,21].
In this paper, we provide some techniques to generate balanced Boolean and resilient Boolean and vectorial Boolean functions with high nonlinearity. For the Boolean case, several kinds of nonlinear small functions with special algebraic normal forms are given. These functions have simple spectral distributions and are suitable to use in the modified M-M method. For the vectorial Boolean case, a construction method based on the disjoint linear codes and vector matrices with special properties is given, and a class of resilient ( n , m ) functions with nonlinearity larger than 2 n 1 2 n / 2 are obtained. It is shown that some of the functions even have currently best-known nonlinearity.

2. Preliminaries

An n-variable Boolean function f ( x ) is a mapping from F 2 n to F 2 ; x = ( x 1 , , x n ) F 2 n can be represented by the following algebraic normal form (ANF):
f ( x 1 , x 2 , , x n ) = u F 2 n λ u ( i = 1 n x i u i ) .
where λ u F 2 , u = ( u 1 , , u n ) . The algebraic degree of f ( x ) , denoted by d e g ( f ) , is the maximal value of w t ( u ) , where w t ( u ) denotes the Hamming weight of u such that λ u 0 . For any n-variable Boolean function f ( x ) , the Walsh transform of f B n at point ω is denoted by W f ( ω ) and calculated as follows:
W f ( ω ) = x F 2 n ( 1 ) f ( x ) + ω · x ,
where the scalar product of ω and x is defined as ω · x = ω 1 x 1 + + ω n x n (mod 2).
Definition 1 
([22]). The nonlinearity of a Boolean function f B n , denoted by N f , is defined as the least distance to the set of all affine functions, and it can be obtained through the Walsh transform as follows:
N f = 2 n 1 1 2 max ω F 2 n | W f ( ω ) | .
The function of the original Maiorana–McFarland class is defined as follows:
Definition 2 
([1]). For any positive integers s and k such that n = s + k , the Maiorana–McFarland function is a function f B n defined by
f ( y , x ) = ϕ ( y ) · x + π ( y ) , x F 2 k , y F 2 s ,
where ϕ is any mapping from F 2 s to F 2 k and π ( y ) B s . When ϕ is a one-to-one mapping and s = k , the function is bent.
A spectral characterization of correlation-immune Boolean functions has been derived.
Theorem 1 
([23]). A Boolean function f ( x ) B n is t-resilient, where 0 t n 1 , if and only if its Walsh transform satisfies
W f ( ω ) = 0 , for 0 w t ( ω ) t ,
where wt ( ω ) is the Hamming weight of the vector ω F 2 n , i.e., the number of ones in ω.
It is shown that [24] for a t-resilient Boolean function f, the algebraic degree d e g ( f ) n t 1 , and the maximum value is referred to as optimal algebraic degree.
The notion of algebraic immunity was introduced as a measure of resistance to algebraic attacks.
Definition 3 
([25]). The function g B n is said to be an annihilator of f B n if it satisfies that f ( x ) g ( x ) = 0 for a nonzero g B n . The algebraic immunity of f, denoted by A I ( f ) , is the minimum degree of all nonzero annihilators of f and 1 + f .
An ( n , m ) function can be regarded as a mapping from F 2 n to F 2 m , which is F : F 2 n F 2 m . In addition, it can be viewed as a collection of m Boolean functions, namely F ( X ) = ( f 1 ( X ) , f 2 X , , f m ( X ) ) , where f 1 , f 2 , , f m B n are component Boolean functions.
Definition 4 
([26]). The nonlinearity of an ( n , m ) function F ( X ) = ( f 1 ( X ) , f 2 X , , f m ( X ) ) is denoted by N F :
N F = min c F 2 m * N f c ,
where f c = i = 1 m c i f i , F 2 m * = F 2 m \ { 0 } .
Similarly, the nonlinearity of an ( n , m ) function can also be denoted by the Walsh transform:
N f = 2 n 1 1 2 max ω F 2 n , c F 2 m * W f c ( ω ) .
Definition 5 
([27]). An ( n , m ) function F ( X ) = ( f 1 ( X ) , f 2 X , , f m ( X ) ) is t-resilient if and only if for any c = c 1 , c 2 , , c m F 2 m * , f c X n = i = 1 m c i f i X n is t-resilient.

3. Construction of Boolean Function

In this section, we give several nonlinear functions with special constructions and analyse their spectral distributions, respectively. These functions will be useful in the M-M construction methods, and two methods are given to obtain a balanced and resilient Boolean function with very high nonlinearity. First of all, we consider the case of a simple function with only a single nonlinear term.

3.1. Small Functions with Special ANF

Lemma 1 
([10]). Let f ( x ) = x 1 x 2 x n , then
W f ( α ) = 2 n 2 , if α = 0 ( 1 ) ω t ( α ) + 1 · 2 if α 0 .
Remark 1. 
Let f = x 1 x 2 x k + a · X n , where s + k = n , a = ( a k , a s ) F 2 k × F 2 s and X n = ( x 1 , x 2 , , x n ) . Let α F 2 k , β F 2 s , then
W f ( α , β ) = 0 , β a s 2 s ( 2 k 2 ) , β = a s , α = a k ( 1 ) w t ( α k + α ) + 1 2 s + 1 , β = a s , α a k .
In Lemma 1 and Remark 1, both functions have only a single nonlinear term. Then, we consider the spectral distributions of some functions with two nonlinear terms.
Theorem 2. 
Let f = x 1 x 2 x i + x j x j + 1 x n , i < j < n be an n-variable Boolean function, and ( α , β , γ ) F 2 i × F 2 j i 1 × F 2 n j + 1 , then
W f ( α , β , γ ) = 2 n 2 n i + 1 2 j + 2 j i + 1 , α = 0 , β = 0 , γ = 0 ( 1 ) w t ( γ ) + 1 ( 2 j 2 j i + 1 ) , α = 0 , β = 0 , γ 0 ( 1 ) w t ( α ) + 1 ( 2 n i + 1 2 j i + 1 ) , α 0 , β = 0 , γ = 0 ( 1 ) w t ( α ) + w t ( γ ) 2 j i + 1 , α 0 , β = 0 , γ 0 0 , β 0 .
Proof of Theorem 2. 
Let X = ( X i , X j i 1 , X n j + 1 ) F 2 i × F 2 j i 1 × F 2 n j + 1 , then
W f ( α , β , γ ) = X F 2 n ( 1 ) f + α · X i + β · X j i 1 + γ · X n j + 1 = X i ( 1 ) x 1 x 2 x i + α · X i · X j i 1 ( 1 ) β · X j i 1 · X n j + 1 ( 1 ) x j x j + 1 x n + γ · X n j + 1 .
In order to obtain the value of the equation, the following cases are needed.
Case 1: When β 0 ,
X j i 1 F 2 j i 1 ( 1 ) β · X j i 1 = 0 .
Then,
W f ( α , β , γ ) = 0 .
Case 2: When β = 0 ,
W f ( α , β , γ ) = 2 j i 1 · X i ( 1 ) x 1 x 2 x i + α · X i · X n j + 1 ( 1 ) x j x j + 1 x n + γ · X n j + 1 .
Let f 1 ( x ) = x 1 x 2 x i be an i-variable Boolean function and f 2 ( x ) = x j x j + 1 x n be an ( n j + 1 ) -variable Boolean function, then
W f ( α , β , γ ) = 2 j i 1 W f 1 ( α ) W f 2 ( γ ) .
According to Lemma 1,
W f 1 ( α ) = 2 i 2 , α = 0 ( 1 ) w t ( α ) + 1 2 , α 0 ,
W f 2 ( γ ) = 2 n j + 1 2 , γ = 0 ( 1 ) w t ( γ ) + 1 2 , γ 0 .
So we have the next four cases:
Case 2.1: When α = 0 , γ = 0 , then
W f ( α , β , γ ) = 2 j i 1 ( 2 i 2 ) ( 2 n j + 1 2 ) = 2 n 2 n i + 1 2 j + 2 j i + 1 .
Case 2.2: When α = 0 , γ 0 , then
W f ( α , β , γ ) = 2 j i 1 ( 2 i 2 ) ( 1 ) w t ( γ ) + 1 2 = ( 1 ) w t ( γ ) + 1 ( 2 j 2 j i + 1 ) .
Case 2.3: When α 0 , γ = 0 , then
W f ( α , β , γ ) = 2 j i 1 ( 1 ) w t ( α ) + 1 2 ( 2 n j + 1 2 ) = ( 1 ) w t ( α ) + 1 ( 2 n i + 1 2 j i + 1 ) .
Case 2.4: When α 0 , γ 0 , then
W f ( α , β , γ ) = 2 j i 1 ( 1 ) w t ( α ) + 1 2 ( 1 ) w t ( γ ) + 1 2 = ( 1 ) w t ( α ) + w t ( γ ) 2 j i + 1 .
According to all cases above, the theorem is proved. □
Theorem 3. 
Let f = x 1 x 2 x j + x i x i + 1 x n , i < j < n be an n-variable Boolean function, and ( α , β , γ ) F 2 i 1 × F 2 j i + 1 × F 2 n j , then
W f ( α , β , γ ) = 2 n 2 i ( 2 n j + 1 4 ) , α = 0 , β = 0 , γ = 0 ( 1 ) w t ( β ) + 1 ( ( 2 n j + 1 4 ) + 2 i ) , α = 0 , β 0 , γ = 0 ( 1 ) w t ( β ) + w t ( γ ) + 1 ( 2 i 4 ) , α = 0 , γ 0 ( 1 ) w t ( α ) + w t ( β ) + 1 ( 2 n j + 1 4 ) , α 0 , γ = 0 4 ( 1 ) w t ( α ) + w t ( β ) + w t ( γ ) , α 0 , γ 0 .
Proof of Theorem 3. 
Let X = ( X i 1 , X j i + 1 , X n j ) F 2 i 1 × F 2 j i + 1 × F 2 n j . We have that
W f ( α , β , γ ) = X F 2 n ( 1 ) f + α · X i 1 + β · X j i + 1 + γ · X n j .
The mutual term between two polynomials x 1 x 2 x j and x i x i + 1 x n is x i x i + 1 x j . The Walsh spectra will be discussed in the following situations:
Case 1: When α = 0 , γ = 0 ,
W f ( α , β , γ ) = X F 2 n ( 1 ) f + β · X j i + 1 .
In this case, it can be divided into the following two cases according to the value of β :
Case 1.1: When β = 0 ,
W f ( α , β , γ ) = X F 2 n ( 1 ) x 1 x 2 x j + x i x i + 1 x n .
When X n runs around F 2 n , a total of 2 n j 1 + 2 i 1 1 = 2 n j + 2 i 1 2 ones of the value of x 1 x 2 x j + x i x i + 1 x n are taken.
Therefore,
W f ( α , β , γ ) = 2 n 2 n j + 1 2 i + 4 .
Case 1.2: When β 0 ,
W f ( α , β , γ ) = X F 2 n ( 1 ) x 1 x 2 x j + x i x i + 1 x n + β · X j i + 1 .
It is known that β · X j i + 1 is a balanced function, and when X n runs around F 2 n , there are 2 n j + 2 i 1 2 ones of the value of x 1 x 2 x j + x i x i + 1 x n . Note that when x 1 x 2 x j + x i x i + 1 x n take the value 1, x i x j should be 1.
Therefore,
W f ( α , β , γ ) = ( 1 ) w t ( β ) + 1 ( 2 n j + 1 + 2 i 4 ) .
Case 2: When α = 0 , γ 0 , then we have
W f ( α , β , γ ) = X F 2 n ( 1 ) x 1 x 2 x j + x i x i + 1 x n + β · X j i + 1 + γ · X n j = X F 2 n , X j i + 1 = 1 ( 1 ) x 1 x 2 x j + x i x i + 1 x n + β · 1 + γ · X n j + X F 2 n , X j i + 1 1 ( 1 ) β · X j i + 1 + γ · X n j = ( 1 ) w t ( β ) X i 1 , X n j ( 1 ) x 1 x 2 x i 1 + x j + 1 x j + 2 x n + γ · X n j = ( 1 ) w t ( β ) X i 1 ( 1 ) x 1 x 2 x i 1 X n j ( 1 ) x j + 1 x j + 2 x n + γ · X n j = ( 1 ) w t ( β ) ( 2 i 1 2 ) ( 1 ) w t ( γ ) + 1 2 = ( 1 ) w t ( β ) + w t ( γ ) + 1 ( 2 i 4 ) .
Case 3: When α 0 , γ = 0 ,
W f ( α , β , γ ) = X F 2 n ( 1 ) x 1 x 2 x j + x i x i + 1 x n + α · X i 1 + β · X j i + 1 = X , X j i + 1 = 1 ( 1 ) x 1 x 2 x j + x i x i + 1 x n + β · 1 + α · X i 1 + X F 2 n , X j i + 1 1 ( 1 ) β · X j i + 1 + α · X i 1 = ( 1 ) w t ( β ) X i 1 , X n j ( 1 ) x 1 x 2 x i 1 + x j + 1 x j + 2 x n + α · X i 1 = ( 1 ) w t ( β ) X i 1 ( 1 ) x 1 x 2 x i 1 + α · X i 1 X n j ( 1 ) x j + 1 x j + 2 x n = ( 1 ) w t ( β ) ( 1 ) w t ( α ) + 1 2 ( 2 n j 2 ) = ( 1 ) w t ( α ) + w t ( β ) + 1 ( 2 n j + 1 4 ) .
Case 4: When α 0 , γ 0 ,
W f ( α , β , γ ) = X F 2 n ( 1 ) x 1 x 2 x j + x i x i + 1 x n + α · X i 1 + β · X j i + 1 + γ · X n j = X j i + 1 = 1 ( 1 ) x 1 x 2 x j + x i x i + 1 x n + β · 1 + α · X i 1 + γ · X n j + X j i + 1 1 ( 1 ) β · X j i + 1 + α · X i 1 + γ · X n j = ( 1 ) w t ( β ) X F 2 n , X j i + 1 = 1 ( 1 ) x 1 x 2 x i 1 + x j + 1 x j + 2 x n + α · X i 1 + γ · X n j = ( 1 ) w t ( β ) ( 1 ) w t ( α ) + 1 2 ( 1 ) w t ( γ ) + 1 2 = 4 ( 1 ) w t ( α ) + w t ( β ) + w t ( γ ) .
Thus, the theorem is proved. □
The above theorems give some nonlinear functions with special spectral distributions. The following constructions shows that these nonlinear functions can be used as the small functions in the modified M-M construction method, and two classes of balanced and resilient Boolean functions with very high nonlinearity are obtained.

3.2. Balanced Boolean Function with High Nonlinearity

Construction 1. 
Let n 8 be even, and ϕ be a bijective mapping from F 2 n / 2 to F 2 n / 2 . Let ϕ ( 0 ) = 0 and ϕ ( δ ) = θ with δ be a fixed vector satisfying that w t ( θ ) > k for k n / 2 . Let y = ( y 1 , , y n / 2 ) , x = ( x 1 , , x n / 2 ) . For any ( y , x ) F 2 n / 2 × F 2 n / 2 , a Boolean function f B n can be obtained as follows:
f ( y , x ) = b F 2 n / 2 y b g b ( x ) ,
where
y b = 1 , y = b 0 , y b ,
and for any { i 1 , , i k } { 1 , , n / 2 } , { j 1 , , j k } { 1 , , n / 2 } ,
g b ( x ) = ϕ ( b ) · x , b { 0 , δ } ϕ ( δ ) · x x i 1 x i 2 x i k , b = 0 ϕ ( δ ) · x x j 1 x j 2 x j k 1 , b = δ .
Theorem 4. 
Let f be the function obtained by the above construction, and n is even, n 8 . Then, we have:
1. 
f is balanced;
2. 
deg ( f ) = n / 2 + k ;
3. 
N f = 2 n 1 2 n / 2 + 2 n / 2 2 .
Proof of Theorem 4. 
For any ( β , α ) F 2 n / 2 × F 2 n / 2 , we have
W f ( β , α ) = ( y , x ) F 2 n ( 1 ) f ( y , x ) + ( β , α ) · ( y , x ) = b F 2 n / 2 ( 1 ) β · b x F 2 n / 2 ( 1 ) g b ( x ) + α · x = b F 2 n / 2 ( 1 ) β · b · W g b ( α ) .
When b { 0 , δ } ,
W g b ( α ) = 2 n / 2 , α = ϕ ( b ) 0 , α ϕ ( b ) .
Let α = ( α 1 , , α n / 2 ) , α i = ( α i 1 , , α i k ) , α i = ( α i k + 1 , , α i n / 2 ) , { i 1 , , i k } { i k + 1 , , i n / 2 } { 1 , , n / 2 } . Let θ i = ( θ i 1 , , θ i k ) , θ i = ( θ i k + 1 , , θ i n / 2 ) .
When b = 0 ,
W g b ( α ) = 2 n / 2 2 n / 2 2 , α = ϕ ( δ ) ± 2 n / 2 2 , α j θ j , α i = θ i 0 , α i θ i .
Let α j = ( α j 1 , , α j k ) , α j = ( α j k + 1 , , α j n / 2 ) , { j 1 , , j k } { j k + 1 , , j n / 2 } { 1 , , n / 2 } . Let θ j = ( θ j 1 , , θ j k ) , θ j = ( θ j k + 1 , , θ j n / 2 ) .
When b = δ ,
W g b ( α ) = 2 n / 2 2 n / 2 2 , α = ϕ ( δ ) ± 2 n / 2 2 , α j θ j , α j = θ j 0 , α j θ j .
Thus,
m a x | W f ( α ) | = 2 n / 2 + 1 2 n / 2 1 .
That means
N f = 2 n 1 2 n / 2 + 2 n / 2 2 .
When b { 0 , δ } , we have
W g b ( 0 ) = 0 .
Since w t ( θ ) > k , when b = 0 and b = δ , we have
α i θ i , α j θ j .
This means W g 0 ( 0 ) = 0 and W g δ ( 0 ) = 0 . Thus, for any b F 2 n , W g b ( 0 ) = 0 . So, we have W f ( 0 ) = b F 2 n / 2 W g b ( 0 ) = 0 , and f is balanced.
Obviously, the terms y 1 y 2 y n / 2 x i 1 x i 2 x i k and y 1 y 2 y n / 2 x j 1 x j 2 x j k are all in the ANF of the function and cannot cancel each other out. Thus, deg ( f ) = n / 2 + k . □
Remark 2. 
In this subsection, we provide some small nonlinear functions with special Walsh spectrum which can be applied to construction method of M-M functions, and Construction 1 shows a method to obtain a balanced Boolean function using the small functions. It is known that the best nonlinearity for a balanced function is given by Seberry et al. in [3] and Dobbertin in [4]. When n < 10 , the nonlinearity in Construction 1 can equal the best result, but when n > 12 , the nonlinearity will be smaller. Further research on the applications of the small function in Theorems 2 and 3, such as using the high-meets-low technology [15], will be an interesting challenge.

3.3. The Algebraic Immunity

Next, we discuss the algebraic immunity of the functions in Construction 1. Let y = ( y 1 , y 2 , , y n / 2 ) , τ = ( τ 1 , τ 2 , , τ n / 2 ) , then f ( y , x ) can be represented as
f ( y , x ) = f 1 ( y , x ) + f 2 ( y , x ) ,
where
f 1 ( y , x ) = τ F 2 n / 2 \ Δ ( i = 1 n / 2 ( y i + τ i + 1 ) ) g c τ ( x ) ,
where g c τ ( X ) = c τ · X , w t ( c τ ) 0 , and Δ = { 0 , δ } . We define f 1 ( y , x ) = ϕ ( y ) · x + π ( y ) as an M-M bent function containing f 1 ( y , x ) as a part of its ANF. Then, f ( y , x ) can be rewritten as the following form:
f ( y , x ) = f 1 ( y , x ) + f 2 ( y , x ) .
Let f and g be two n-variable functions. Noticing
A I ( f ) d e g ( g ) A I ( f + g ) A I ( f ) + d e g ( g ) ,
we have
A I ( f 1 ( y , x ) ) d e g ( f 2 ( y , x ) ) A I ( f ( y , x ) ) A I ( f 1 ( y , x ) ) + d e g ( f 2 ( y , x ) ) .
As it is known that
A I ( f 1 ( y , x ) ) d e g ( ϕ ) + A I ( π ( y ) ) + 1 .
By Inequations (7) and (8), it can be seen that the degree of the permutation ϕ and the algebraic immunity of function π ( y ) will have a great effect on the A I ( f ( y , x ) ) , and the functions g 0 ( x ) and g δ ( x ) chosen in the constructions may also influence the algebraic immunity of f ( y , x ) . Simulations show that the usage of different ϕ , g 0 ( x ) , g δ ( x ) and π ( y ) will result in different algebraic immunity. Since the mapping ϕ , the functions π ( y ) , g 0 ( x ) and g δ ( x ) used in the construction do not need to be unique, so in our constructions, for a fixed n, we can easily obtain a large number of balanced functions with the same high nonlinearity but different algebraic immunity. The following examples list balanced functions that possess good algebraic immunity and high nonlinearity.
Example 1. 
When n = 8 , k = 3 , and ( y , x ) F 2 4 × F 2 4 , f ( y , x ) = b F 2 4 y b g b ( x ) . According to Theorem 4, it is a balanced Boolean function, and deg ( f ) = n / 2 + k = 4 + 3 = 7 is the known optimal algebraic degree, N f = 2 n 1 2 n / 2 + 2 n / 2 2 = 116 is equal to the best nonlinearity in [3,4]. The truth table of f ( y , x ) is as follows:
0110100010010111 | | 0101010101010101 | | 0011001100110011 | | 0110011001100110 | | 0000111100001111 | | 0101101001011010 | | 0011110000111100 | | 0110100101101001 | | 0000000011111111 | | 0101010110101010 | | 0011001111001100 | | 0110011010011001 | | 0000111111110000 | | 0101101010100101 | | 0011110011000011 | | 1001011001101010 .

3.4. Resilient Boolean Function with High Nonlinearity

Definition 6 
([11]). A set of Boolean functions { g 1 , g 2 , , g c } B n such that for any α F 2 n ,
W g i ( α ) W g j ( α ) = 0 , 1 i < j c ,
is called a set of disjoint spectra functions.
Obviously, the following set of all n / 2 -variable t-resilient affine functions
T 1 = { g c ( x ) = c · x | c F 2 n / 2 , w t ( c ) > t } ,
is a set of disjoint spectra functions.
Let x = ( x , x ) , where x F 2 n / 2 2 k , x F 2 2 k and h ( x ) be a fixed 2 k -variable function. Then,
T 2 = { g c ( x ) = c · x + h ( x ) | c F 2 n / 2 2 k , w t ( c ) > p }
is also a set of disjoint spectra functions. If h c ( x ) is q-resilient, then g c ( X ) is ( p + q + 1 ) -resilient.
Construction 2. 
Let n 12 , 1 t n / 2 2 , 1 k < n / 4 and p + q + 1 = t satisfying that i = 0 t n / 2 i i = p + 1 n / 2 2 k n / 2 2 k i = | T 2 | . Let T 2 T 2 with | T 2 | = i = 0 t n / 2 i , and T = T 1 T 2 . Let x F 2 n / 2 , y F 2 n / 2 and ϕ be a bijective mapping from F 2 n / 2 to T. Then, we construct the function f B n as follows:
f ( y , x ) = b F 2 n / 2 y b ϕ ( b ) , y F 2 n / 2 ,
where y b is defined as in Construction 1.
Theorem 5. 
Let f ( y , x ) be as in Construction 2. Then,
1. 
f is t-resilient;
2. 
N f = 2 n 1 2 n / 2 + 2 n / 2 2 k N h ;
3. 
d e g ( f ) = n / 2 + d e g ( h ) .
Proof of Theorem 5. 
Let ( β , α ) = F 2 n / 2 × F 2 n / 2 , Then,
W f ( β , α ) = y F 2 n / 2 x F 2 n / 2 ( 1 ) f ( y , x ) + α · x + β · y = b F 2 n / 2 ( 1 ) β · b x F 2 n / 2 ( 1 ) ϕ ( b ) + α · x = b F 2 n / 2 ( 1 ) β · b W ϕ ( b ) ( α ) .
Note that the functions ϕ ( b ) are t-resilient. When 0 w t ( β , α ) t , we have 0 w t ( α ) t , so W ϕ ( b ) ( α ) = 0 . Thus, W f ( β , α ) = 0 , which means f ( y , x ) is t-resilient.
It is known that for any ϕ ( b ) T 1 , W ϕ ( b ) ( α ) = 2 n / 2 , and for any ϕ ( b ) T 2 , W ϕ ( b ) ( α ) = 2 n / 2 2 k ( 2 2 k 2 N h ) . Since T 1 and T 2 are two sets of disjoint spectra functions
max ( β , α ) | W f ( β , α ) | = 2 n / 2 + 2 n / 2 2 n / 2 2 k + 1 N h ,
which means
N f = 2 n 1 2 n / 2 + 2 n / 2 2 k N h .
Similar to the proof of Theorem 1, the algebraic degree is n / 2 + d e g ( h ) . □
Example 2. 
For n = 44 , t = 2 , let k = 7 , p = 0 and q = 1 . We have i = 0 2 44 / 2 i i = 1 8 8 i . Let T 2 T 2 with | T 2 | = 254 . Let h be a 14-variable, 1-resilient function with nonlinearity 8100 and ϕ be a bijective mapping from F 2 22 to T = T 1 T 2 . By Construction 2, we can construct a 2-resilient function f B 20 with nonlinearity 2 43 2 21 2 14 2 12 2 11 2 10 , which agrees with Theorem 2 and has nonlinearity larger than [11].
In this subsection, a construction method to obtain a resilient Boolean function with high nonlinearity is given. Since this method is also a modified M-M class, the algebraic properties are similar to the balanced case.

4. Construction of Vectorial Boolean Function

In this section, by using disjoint linear codes and vector matrices with special properties, a class of resilient ( n , m ) function with very high nonlinearity is given.

4.1. Disjoint Linear Codes and Vector Matrices

Definition 7 
([19]). Disjoint linear codes are a set of [ u , m , t ] linear codes C = { C 1 , C 2 , , C N } satisfying that:
C i C j = 0 , 1 i < j N .
where 0 is the all-zero vector.
We denote N u , m , t the number of u , m , t disjoint linear codes, where t is the minimum weight of the [ u , m ] code.
Lemma 2 
([18]). Let θ 0 , , θ m 1 be a basis of a u , m , t + 1 linear code C. Let β be a primitive elememt of F 2 m , and let 1 , β , , β m 1 be a polynomial basis in F 2 m . Define a bijection ϕ : F 2 m C ,
ϕ ( b 0 + b 1 β + + b m 1 β m 1 ) = b 0 θ 0 + + b m 1 θ m 1 .
Define the matrix A that contains all the code words by
A = ϕ 1 ϕ β ϕ β m 1 ϕ β ϕ β 2 ϕ β m ϕ β 2 m 2 ϕ 1 ϕ β m 2 .
Then, for any nonzero linear combination of all columns in matrix A, each nonzero code word of C appears only once.
Lemma 3 
([20]). Let u , m , d be integers with 2 m u . Let α be a root of the primitive polynomial p x = 1 + p 1 x + + p k 1 x k 1 + x u F 2 x , and 1 , α , α 2 , α u 1 be a polynomial basis of F 2 u . Define a bijection π : F 2 u F 2 u ,
π ( b 0 + b 1 α + + b u 1 α u 1 ) = b 0 , b 1 , , b u 1 .
Define matrix B of size 2 u 1 × m by
B = π 1 π α π α m 1 π α π α 2 π α m π α 2 u 2 π 1 π α m 2 = B 0 B 1 B 2 u 2 .
It is known that for any nonzero linear combination of columns in matrix B, the nonzero vector in F 2 u appears only once. If for any vector c F 2 m * such that w t c · B i t , where i = 0 , 1 , , 2 u 2 . Then, this row will be deleted from matrix B. Thus, we will obtain a new matrix B ˜ . The number of rows of matrix B ˜ is denoted by M ( u , m , t + 1 ) .

4.2. Resilient Vectorial Function with High Nonlinearity

Construction 3. 
Let n = 2 u 12 be even. Let m, t, k be positive integers with m , t < n / 4 and m < k < u . Let X n = X u , X u = X n k , X k F 2 n with X u , X u F 2 u , X n k F 2 n k , and X k F 2 k . Then, an n , m function can be constructed as
F X n = f 1 X n , f 2 X n , , f m X n ,
where for any i = 1 , 2 , , m ,
f i ( X n ) = φ i X u · X u , X u E 0 ψ i X n k · X k , X n k E 1
and ψ i , φ i , E 0 , E 1 are defined as follows.
Let C 1 , C 2 , , C s be a set of [ u , m , t + 1 ] disjoint linear codes satisfying that s = N ( u , m , t + 1 ) . Let A 1 , , A s be the matrices associated with C 1 , C 2 , , C s as defined in Lemma 2. For 1 j s and 1 i m , we denote A j i the i column of matrix A j and
A ˜ = A 1 1 A 1 2 A 1 m A 2 1 A 2 2 A 2 m A s 1 A s 2 A s m .
It is easy to know that the size of the matrix A ˜ is s · ( 2 m 1 ) × m . Let E 0 = { e 1 , , e δ } F 2 u and δ = s · ( 2 m 1 ) . For any 1 i m , φ i will be a bijective from E 0 to A ˜ :
φ 1 ( e 1 ) φ 2 ( e 1 ) φ m ( e 1 ) φ 1 ( e 2 ) φ 2 ( e 2 ) φ m ( e 2 ) φ 1 ( e δ ) φ 2 ( e δ ) φ m ( e δ ) = A ˜ .
In Lemma 3, let π be a bijective from F 2 k to F 2 k , then a matrix B ˜ of the size M ( k , m , t + 1 ) × m can be obtained. We define E 1 = ( F 2 u \ E 0 ) × F 2 u k = { ϵ 1 , , ϵ γ } F 2 n k , then γ = | E 1 | = 2 u k · ( 2 u s · ( 2 m 1 ) ) = 2 u k · ( 2 u N ( u , m , t + 1 ) · ( 2 m 1 ) ) . For any 1 i m , ψ i will be a bijective from E 1 to B ˜ γ :
ψ 1 ( ϵ 1 ) ψ 2 ( ϵ 1 ) ψ m ( ϵ 1 ) ψ 1 ( ϵ 2 ) ψ 2 ( ϵ 2 ) ψ m ( ϵ 2 ) ψ 1 ( ϵ γ ) ψ 2 ( ϵ γ ) ψ m ( ϵ γ ) = B ˜ γ
where B ˜ γ consists of any γ rows of B ˜ .
Theorem 6. 
Let F X n = f 1 X n , f 2 X n , , f m X n be the vectorial functions constructed above. Then, we have
1. 
F is t-resilient;
2. 
N f = 2 n 1 2 n / 2 1 2 k 1 .
Proof of Theorem 6. 
From the definitions of φ i and ψ i , it is known that both of them are bijective. Let α = β , β = γ , γ F 2 n with β , β F 2 u , γ F 2 n k and γ F 2 k . For any c F 2 m , let f c ( X n ) = c · F ( X n ) . Then, we have
W f c α = X n F 2 n 1 f c X n α · X n = H 1 + H 2 .
where
H 1 = X u E 0 X u F 2 u 1 φ c X u · X u β , β · X u , X u   = X u E 0 1 β · X u X u F 2 u 1 φ c X u + β · X u ,
and
H 2 = X n k E 1 1 γ · X n k X k F 2 k 1 ψ c X n k + γ · X k .
When φ c 1 β = , we have H 1 = 0 , otherwise H 1 = 2 n / 2 · 1 β · φ c 1 β = ± 2 n / 2 . So H 1 0 , ± 2 n / 2 , in the same way, H 2 0 , ± 2 k . Thus, the maximum value of | W f c | is 2 n / 2 2 k .
According to (3),
N f c = 2 n 1 2 n / 2 1 2 k 1 .
Combined with (5), we can obtain that the nonlinearity of the constructed function F is
N F = 2 n 1 2 n / 2 1 2 k 1 .
When 0 w t α t , we have w t β t and w t γ t . Therefore, for X u E 0 and X n k E 1 , by the definitions of ψ i and φ i , we can obtain w t ψ c X u t + 1 and w t φ c X n k t + 1 . Obviously, ψ c X u + β 0 and φ c X n k + γ 0 . Thus, H 1 = H 2 = 0 , which means for any 0 w t α t , W f c α = 0 . By Theorem 1, f c is a t-resilient function and so is F . □
Remark 3. 
In Construction 3, the numbers of rows of the matrixs A ˜ and B ˜ should be enough to ensure that both φ i and ψ i are bijective mappings. Hence, the following inequation must hold N ( u , m , t + 1 ) · ( 2 m 1 ) · 2 u + M ( k , m , t + 1 ) · 2 k 2 n , where the value of N ( u , m , t + 1 ) and M ( k , m , t + 1 ) can be found in [19,20].
Example 3. 
Let n = 32 , m = 4 , t = 1 and k = 11 . Note that N ( 16 , 4 , 2 ) = 4365 , M 11 , 4 , 2 = 1957 and 4365 × ( 2 4 1 ) × 2 16 + 1957 × 2 11 2 32 holds. By Construction 2, a 1-resilient ( 32 , 4 ) functions with nonlinearity 32 , 4 , 1 , 2 31 2 15 2 11 can be obtained. The nonlinearity of this function is better than the results in [19,20].
Based on Construction 3, we list some results in Table 1:
The table shows that our constructions can sometimes obtain functions with higher nonlinearity than the known result. In other cases, our methods can at least provide the same nonlinearity as the known result, and how to improve the nonlinearity in the equal cases will be the future work.

5. Conclusions

This paper introduces three construction methods to obtain Boolean functions and vectorial Boolean functions with good properties. Firstly, several types of nonlinear functions with special Walsh spectra are given. They can be used in the modified M-M construction methods. For instance, the functions with only a nonlinear term are usually used to optimize the algebraic degree, and in this paper we use them to obtain balanced and resilient functions with high nonlinearity. How to use the other special functions provided is a very interesting research problem. Secondly, a construction of resilient vectorial Boolean function with very high nonlinearity is proposed. The construction combines the disjoint linear codes and the vector matrices with special properties together and provides some functions with currently best-known nonlinearity. Further improvements towards increasing the output dimension as much as possible under the premise of ensuring the nonlinearity appear to be an interesting research task.

Author Contributions

L.L. worked on conceptualization, methodology, writing—original draft preparation, research, and formal analysis of the work; L.W. conducted the formal analysis, writing—original draft preparation and supervision; Q.Z. was dedicated to visualization, software, validation, and writing—review and editing; D.Z. dedicated himself to project administration, writing—review and editing, and supervision. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No. 61902314), the Natural Science Basic Research Plan in Shaanxi Province of China (No. 2019JQ867), the Equipment Pre-research Key Laboratory Foundation of China (No. 6142103190101) and the Natural Science Foundation of Shaanxi Provincial Department of Education (No. 20JK0911).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Camion, P.; Carlet, C.; Charpin, P.; Sendrier, N. On Correlation-Immune Functions. In International Cryptology Conference on Advances in Cryptology; Springer: Berlin/Heidelberg, Germany, 1991; pp. 86–100. [Google Scholar]
  2. Rothaus, O.S. On bent function. J. Comb. Theory Ser. A 1976, 20, 300–305. [Google Scholar] [CrossRef] [Green Version]
  3. Seberry, J.; Zhang, X.M.; Zheng, Y.L. Nonlinearly balanced Boolean functions and their propagation characteristics. In Advances in Cryptology—CRYPTO; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1993; Volume 773, pp. 49–60. [Google Scholar]
  4. Dobbertin, H. Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity. In Fast Software Encryption; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1994; pp. 61–74. [Google Scholar]
  5. Sarkar, P.; Maitra, S. Construction of nonlinear Boolean functions with important crypto -graphic properties. In Advances in Cryptology—EUROCRYPT 2000; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2000; pp. 485–506. [Google Scholar]
  6. Tarannikov, Y. New Constructions of Resilient Boolean Functions with Maximal Nonlinearity. In Proceedings of the International Workshop on Fast Software Encryption, Yokohama, Japan, 2–4 April 2000; Springer: Berlin/Heidelberg, Germany, 2001; pp. 66–77. [Google Scholar]
  7. Fedorova, M.; Tarannikov, Y. On the constructing of highly nonlinear resilient Boolean functions by means of special matrices. In Proceedings of the International Conference on Cryptology in India, Chennai, India, 16–20 December 2022; Springer: Berlin/Heidelberg, Germany, 2001; pp. 254–266. [Google Scholar]
  8. Carlet, C. A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction. In Advances in Cryptology— Eurocrypt 2002; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; pp. 549–564. [Google Scholar]
  9. Maitra, S.; Pasalic, E. A Maiorana-McFarland type construction for resilient Boolean functions on variables (even) with nonlinearity. Discret. Appl. Math. 2006, 154, 357–369. [Google Scholar] [CrossRef] [Green Version]
  10. Pasalic, E. Maiorana-McFarland class: Degree optimization and algebraic properties. IEEE Trans. Inf. Theory 2006, 52, 4581–4594. [Google Scholar] [CrossRef]
  11. Zhang, W.G.; Pasalic, E. Construction of almost optimal resilent Boolean functions on large even number of variables. IEEE Trans. Inf. Theory 2009, 55, 5822–5831. [Google Scholar] [CrossRef] [Green Version]
  12. Tarannikov, Y. Generalized proper matrices and constructing of m-resilient Boolean functions with maximal nonlinearity for expanded range of parameters. Cryptol. ePrint Arch. 2014, 11, 229–245. [Google Scholar]
  13. Zhang, W.G.; Pasalic, E. Generalized Maiorana-McFarland construction of resilient Boolean functions with high nonlinearity and good algebraic properties. IEEE Trans. Inf. Theory 2014, 60, 6681–6695. [Google Scholar] [CrossRef]
  14. Zhang, F.R.; Wei, Y.Z.; Pasalic, E. Large sets of disjoint spectra plateaued functions inequivalent to partially linear functions. IEEE Trans. Inf. Theory 2018, 64, 2987–2999. [Google Scholar] [CrossRef]
  15. Zhang, W.G. High-Meets-Low: Construction of Strictly Almost Optimal Resilient Boolean Functions via Fragmentary Walsh Spectra. IEEE Trans. Inf. Theory 2019, 65, 5856–5864. [Google Scholar] [CrossRef]
  16. Sosa-Gómez, G.; Paez-Osuna, O.; Rojas, O.; Rodrigues, P.L.d.A.; Kanarek, H.; Madarro-Capo, E.J. Construction of Boolean Functions from Hermitian Codes. Mathematics 2022, 10, 899. [Google Scholar] [CrossRef]
  17. Cheon, J.H. Nonlinear Vector Resilient Functions. In Advances in Cryptology—CRYPTO; Lecture Notes in Computer Science; Kilian, J., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2139, pp. 458–469. [Google Scholar]
  18. Johansson, T.; Pasalic, E. A construction of resilient functions with high nonlinearity. IEEE Trans. Inf. Theory 2003, 49, 494–501. [Google Scholar] [CrossRef] [Green Version]
  19. Zhang, W.G.; Pasalic, E. Constructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes. IEEE Trans. Inf. Theory 2014, 60, 1638–1651. [Google Scholar] [CrossRef]
  20. Zhang, W.G.; Li, L.Y.; Pasalic, E. Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity. IET Inf. Secur. 2017, 11, 199–203. [Google Scholar] [CrossRef] [Green Version]
  21. Zhao, H.; Wei, Y. New construction of highly nonlinear resilient S-boxes via linear codes. Front. Comput. Sci. 2022, 16, 1–7. [Google Scholar] [CrossRef]
  22. Meier, W.; Staffelbach, O. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology-Eurocrypt 1990; Lecture Notes in Computer Sceince; Springer: Berlin/Heidelberg, Germany, 1990; Volume 434, pp. 549–562. [Google Scholar]
  23. Xiao, G.; Massey, J.L. A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 1988, 34, 569–571. [Google Scholar] [CrossRef] [Green Version]
  24. Siegenthaler, T. Correalation immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 1984, 30, 776–780. [Google Scholar] [CrossRef]
  25. Meier, W.; Pasalic, E.; Carlet, C. Algebraic attacks and decomposition of Boolean functions. In Advances in Cryptology—EUROCRYPTO 2004; Lecture Notes in Computer Sceince; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3027, pp. 474–491. [Google Scholar]
  26. Nyberg, K. On the Construction of Highly Nonlinear Permutations. In Advances in Cryptology—EUROCRYPT’ 92. EUROCRYPT 1992; Lecture Notes in Computer Science; Rueppel, R.A., Ed.; Springer: Berlin/Heidelberg, Germany, 1993; Volume 658, pp. 92–98. [Google Scholar]
  27. Zhang, X.M.; Zheng, Y. Cryptographically resilient functions. IEEE Trans. Inf. Theory 1997, 43, 1740–1747. [Google Scholar] [CrossRef]
Table 1. ( n , m , t , N F ) S-boxes with higher nonlinearity than [19].
Table 1. ( n , m , t , N F ) S-boxes with higher nonlinearity than [19].
Ours[19]
( 22 , 4 , 1 , 2 21 2 10 2 8 ) ( 22 , 4 , 1 , 2 21 2 10 2 9 )
( 30 , 4 , 1 , 2 29 2 14 2 10 ) ( 30 , 4 , 1 , 2 29 2 14 2 11 )
( 32 , 4 , 1 , 2 31 2 15 2 10 ) ( 32 , 4 , 1 , 2 31 2 15 2 11 )
( 28 , 5 , 1 , 2 27 2 13 2 10 ) ( 28 , 5 , 1 , 2 27 2 13 2 11 )
( 38 , 5 , 1 , 2 37 2 18 2 13 ) ( 38 , 5 , 1 , 2 37 2 18 2 14 )
( 42 , 5 , 1 , 2 41 2 20 2 13 ) ( 42 , 5 , 1 , 2 41 2 20 2 14 )
( 32 , 6 , 1 , 2 31 2 15 2 12 ) ( 32 , 6 , 1 , 2 31 2 15 2 13 )
( 58 , 7 , 1 , 2 57 2 28 2 18 ) ( 58 , 7 , 1 , 2 57 2 28 2 19 )
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, L.; Wang, L.; Zhao, Q.; Zheng, D. On Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity. Mathematics 2022, 10, 4822. https://doi.org/10.3390/math10244822

AMA Style

Li L, Wang L, Zhao Q, Zheng D. On Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity. Mathematics. 2022; 10(24):4822. https://doi.org/10.3390/math10244822

Chicago/Turabian Style

Li, Luyang, Linhui Wang, Qinglan Zhao, and Dong Zheng. 2022. "On Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity" Mathematics 10, no. 24: 4822. https://doi.org/10.3390/math10244822

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop