• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • University of Bergen Library
  • Registrations from Cristin
  • View Item
  •   Home
  • University of Bergen Library
  • Registrations from Cristin
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Cryptographically strong permutations from the butterfly structure

Li, Kangquan; Li, Chunlei; Helleseth, Tor; Qu, Longjiang
Journal article, Peer reviewed
Accepted version
Thumbnail
View/Open
Accepted version (377.2Kb)
URI
https://hdl.handle.net/11250/2986819
Date
2021
Metadata
Show full item record
Collections
  • Department of Informatics [881]
  • Registrations from Cristin [8666]
Original version
Designs, Codes and Cryptography. 2021, 89, 737-761   10.1007/s10623-020-00837-5
Abstract
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a cryptographic function is desired to have boomerang uniformity as low as its differential uniformity. Based on generalized butterfly structures recently introduced by Canteaut, Duval and Perrin, this paper presents infinite families of permutations of \({\mathbb {F}}_{2^{2n}}\) for a positive odd integer n, which have the best known nonlinearity and boomerang uniformity 4. Both open and closed butterfly structures are considered. The open butterflies, according to experimental results, appear not to produce permutations with boomerang uniformity 4. On the other hand, from the closed butterflies we derive a condition on coefficients \(\alpha , \beta \in {\mathbb {F}}_{2^n}\) such that the functions

$$\begin{aligned} V_i(x,y) := (R_i(x,y), R_i(y,x)), \end{aligned}$$

where \(R_i(x,y)=(x+\alpha y)^{2^i+1}+\beta y^{2^i+1}\) and \(\gcd (i,n)=1\), permute \({{\mathbb {F}}}_{2^n}^2\) and have boomerang uniformity 4. In addition, experimental results for \(n=3, 5\) indicate that the proposed condition seems to cover all such permutations \(V_i(x,y)\) with boomerang uniformity 4.
Publisher
Springer
Journal
Designs, Codes and Cryptography
Copyright
Copyright 2021 Springer

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit