10.07.2015 Views

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1Boolean functions incryptography— [. . . ] J’en reviens à notre livre <strong>de</strong> philosophie,c’est comme les principes rationnels, ou les loisscientifiques, la réalité se conforme à cela, à peuprès, mais rappelle-toi le grand mathématicienPoincaré, il n’est pas sûr que les mathématiquessoient rigoureusement exactes.Le côté <strong>de</strong> GuermantesMarcel Proust [221]Contents1.1 Cryptographic criteria for Boolean functions . . . . . . . . . . . . . 81.1.1 The filter and combiner mo<strong>de</strong>ls . . . . . . . . . . . . . . . . . . . . . . 81.1.2 Balancedness and resiliency . . . . . . . . . . . . . . . . . . . . . . . . 81.1.3 Algebraic <strong>de</strong>gree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.1.4 Algebraic immunity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.1.5 Nonlinearity and bentness . . . . . . . . . . . . . . . . . . . . . . . . . 111.2 Families of Boolean functions with good cryptographic properties 111.2.1 Tra<strong>de</strong>-offs between the different criteria . . . . . . . . . . . . . . . . . 111.2.2 The Carlet–Feng family . . . . . . . . . . . . . . . . . . . . . . . . . . 121.2.3 The Tu–Deng family . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121.2.4 The Tang–Carlet–Tang family . . . . . . . . . . . . . . . . . . . . . . 151.2.5 The Jin et al. family . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Boolean functions are a commonly used building block in the <strong>de</strong>sign of symmetric cryptosystems,especially in that of stream ciphers. Obviously, the properties of such functions are critical for thesecurity requirements of the final system built upon them. If not carefully chosen, the use of aweak Boolean function can in<strong>de</strong>ed jeopardize the entire system. T<strong>here</strong>fore, several cryptographicproperties have been <strong>de</strong>fined and studied to ensure immunity of the system to different kindsof attacks; the ever evolving <strong>de</strong>sign of those naturally entails new restrictions on the classes of

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!