here - Sites personnels de TELECOM ParisTech - Télécom ParisTech
here - Sites personnels de TELECOM ParisTech - Télécom ParisTech
here - Sites personnels de TELECOM ParisTech - Télécom ParisTech
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
20 Chapter 2. On a conjecture about addition modulo 2 k − 12.4.1 General situation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352.4.2 Combining variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372.4.3 One block: d = 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372.4.4 A helpful constraint: min i(α i) ≥ B − 1 . . . . . . . . . . . . . . . . . 402.4.5 Analytic study: d = 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 422.4.6 Extremal value: β i = 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 452.5 A closed-form expression for f d . . . . . . . . . . . . . . . . . . . . . 472.5.1 Experimental results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482.5.2 Splitting the sum into atomic parts . . . . . . . . . . . . . . . . . . . . 502.5.3 The residual term T d X . . . . . . . . . . . . . . . . . . . . . . . . . . . 532.5.4 A polynomial expression . . . . . . . . . . . . . . . . . . . . . . . . . . 582.5.5 The coefficients a d,n(i 1 ,...,i n). . . . . . . . . . . . . . . . . . . . . . . . . 602.5.6 An additional relation . . . . . . . . . . . . . . . . . . . . . . . . . . . 642.6 Asymptotic behavior: β i → ∞ . . . . . . . . . . . . . . . . . . . . . . 672.6.1 The limit f d (∞, . . . , ∞) . . . . . . . . . . . . . . . . . . . . . . . . . . 672.6.2 The limit f d (1, ∞, . . . , ∞) . . . . . . . . . . . . . . . . . . . . . . . . . 782.7 An inductive approach . . . . . . . . . . . . . . . . . . . . . . . . . . 802.7.1 Overflow and inertia . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802.7.2 Adding 0’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812.7.3 Adding 1’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822.8 Other works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852.8.1 Cusick et al. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852.8.2 Carlet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852.8.3 Towards a complete proof . . . . . . . . . . . . . . . . . . . . . . . . . 862.9 Efficient test of the Tu–Deng conjecture . . . . . . . . . . . . . . . 862.9.1 The Tu–Deng algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 862.9.2 Necklaces and Lyndon words . . . . . . . . . . . . . . . . . . . . . . . 882.9.3 Implementation <strong>de</strong>tails . . . . . . . . . . . . . . . . . . . . . . . . . . . 89As was un<strong>de</strong>rlined in the previous chapter, the good cryptographic properties of the Booleanfunctions of the Jin et al. family [142] <strong>de</strong>scribed in Subsection 1.2.5, and more precisely theoptimality of their algebraic immunity, <strong>de</strong>pend on the validity of a combinatorial conjecture. Thepurpose of this chapter, if not to prove that conjecture in its full generality, is at least to give agood insight into its expected validity not only through a thorough theoretical study, but alsoby exposing experimental evi<strong>de</strong>nce. Part of the work presented in this chapter is the result ofcollaborations with Gérard Cohen, Sihem Mesnager and Hugues Randriam and already appearedin different forms [96, 94]. Several preprints [97, 95, 53] including additional results are availableas well.The main approach used in this chapter is that of reformulating the conjecture in terms ofcarries occurring in an addition modulo 2 k − 1. This formalism and the very basic propertiesverified by that quantity are <strong>de</strong>veloped in Section 2.1. Although such an approach may at firstseem quite naive to the rea<strong>de</strong>r, what makes the study of the conjecture seemingly so difficult isprecisely that a suitable algebraic structure to cast upon the problem has yet to be found, sothat only a purely combinatorial point of view is possible as of today.Nevertheless, the point of view adopted <strong>here</strong> provi<strong>de</strong>s already enough information to prove inSection 2.2 that the special case of the conjecture required by the family of Tang, Carlet and