JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (11): 89-94.doi: 10.6040/j.issn.1671-9352.2.2014.212

Previous Articles    

Matrix description and properties of global avalanche characteristics

YUAN Hong-bo, YANG Xiao-yuan, WEI Yue-chuan, LIU Long-fei, FAN Cun-yang   

  1. Key Laboratory of Network & Information Security of APF, Engineering University of APF, Xi'an 710086, Shaanxi, China
  • Received:2014-06-24 Revised:2014-10-17 Online:2014-11-20 Published:2014-11-25

Abstract: The global avalanche characteristics matrix representation method was proposed by starting from the expression of global avalanche characteristics.And the same absolute value indicator of Boolean functions f(x) and f(x+α) were proved.The relationship between global avalanche characteristics (GAC) and Walsh spectrum was studied by matrix representation and the GAC absolute indicator's limits between a Boolean function and an affine functions. At last, the influence on GAC indicator by modifying sequence of a Boolean function was analyzed. In combination with hill-climbing algorithm, a large number of Boolean functions with good absolute value indicator were achieved via M-MF Bent functions.

Key words: hill-climbing algorithm, nonlinearity, global avalanche characteristics, matrix, Boolean functions

CLC Number: 

  • TP309
[1] ZHANG Xianmo, ZHENG Yuliang. GAC—the criterion for global avalanche characteristics of crytographic functions[J]. Journal for Universal Computer Science, 1995, 1(5):316-333.
[2] ADAMS C M, TAVARES S E. Generating and counting binary Bent sequences[J]. IEEE Transactions on Information Theory, 1995, 36(5):1170-1173.
[3] 周宇.布尔函数的密码学性质研究[D].西安:西安电子科技大学,2009. ZHOU Yu. Research on cryptographic properties of Boolean functions[D]. Xi'an: Xidian University, 2009.
[4] CARLET C. Generalized partial spreads[J]. IEEE Transactions on Information Theory, 1995, 41(5):1482-1487.
[5] BIHAM E, SHAMIR A. Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991, 4(1):3-72.
[6] ZHOU Jinjun, CHEN Weihong, GAO Fengxiu. Best linear approximation and correlation immunity of functions over Zm*[J]. IEEE Transactions on Information Theory, 1999, 45(1):303-308.
[7] ZENG Xiangyong, CARLET C, SHAN Jinyong, et al. More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks[J]. IEEE Transactions on Information Theory, 2011, 57:6310-6320.
[8] SHANNON C. Excommunication theory of secrecy systems[J]. Bell Systems Technical Journal, 1949, 28(4):656-715.
[9] 张薇,杨晓元,韩益亮.密码基础理论与协议[M].北京:清华大学出版社,2012. ZHANG Wei,YANG Xiaoyuan, HAN Yiliang. Based theory and cryptography protocol[M]. Beijing: Tsinghua University Press, 2012.
[10] DILLON J F. Elementary hadamard difference sets[D]. Maryland: University of Maryland, 1974.
[11] MCELIECE R L. A family of noncyclic difference sets[J]. Journal of Combinatorial Theory, 1973, 15:1-10.
[12] ST?NIC? P. Nonlinearity, local and global avalanche characteristics of balanced Boolean functions[J]. Discret Math, 2002, 248:181-193.
[13] ST?NIC? P, SUNG S H. Improving the nonlinearity of certain balanced Boolean functions with good local and global avalanche characteristics[J]. Information Processing Letter, 2001, 79:167-172.
[14] MAITRA S. Highly nonlinear balanced Boolean functions with good local and global avalanche charac-teristics[J]. Information Processing Letter, 2002, 83:281-286.
[15] CANTEAUT A, CARLET C, CHARPIN P, et al. Propagation characteristics and correlation immunity of highly nonlineaar Boolean functions[J]. Lecture Notes in Computer Sceince, 2000, 1807:507-522.
[16] ST?NIC? P, SUNG S H. Boolean functions with five controllable cryptographic properties[J]. Des Codes Cryptogr, 2004, 31:147-157.
[17] TANG Deng, ZHANG Weiguo, TANG Xiaohu. Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties[J]. Springer Science Des Codes Cryptogr, 2013, 67:77-91.
[1] ZUO Zhi-cui, ZHANG Xian-yong, MO Zhi-wen, FENG Lin. Block discernibility matrix based on decision classification and its algorithm finding the core [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(8): 25-33.
[2] GONG Chun-mei, FENG Li-xia, REN Xue-ming. (*,~)-good congruences on completely J *,~-simple semigroups [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(6): 11-16.
[3] ZHANFG Fang-fang, CAO Xing-chao. Lexical and semantic relevance matching based neural document ranking [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 46-53.
[4] ZHANG Xiu-quan, LI Xiao-chao. P-information fusion and its P-matrix reasoning intelligent generation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(4): 93-99.
[5] SUN Xiao-qing, WANG Xin. Pseudo Drazin inverse of 2×2 anti-triangular matrix in Banach algebras [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 58-66.
[6] HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43.
[7] ZHANG Ling, REN Xue-fang, SHI Kai-quan. Intelligent switch-camouflage of information laws and P-law augmented matrices [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(8): 90-97.
[8] GUO Hua-long, REN Xue-fang, ZHANG Ling. Relationships between dynamic data mining and P-augmented matrix [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(8): 105-110.
[9] . Construction of expert relationship network based on random walk strategy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 30-34.
[10] SUN Tian-feng, HU Bin. On construction of resilient functions with maximum algebraic immunity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 106-113.
[11] CUI An-gang, LI Hai-yang. Equivalence between the affine matrix rank minimization problem and the unconstrained matrix rank minimization problem [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(4): 86-89.
[12] FU Xue-rong, YAO Hai-lou. Tilting comodules over triangular matrix coalgebras [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(4): 25-29.
[13] WANG Chao. Gorenstein injective modules over upper triangular matrix Artin algebras [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(2): 89-93.
[14] YANG Yuan-hui, LI Guo-dong, WU Chun-fu, WANG Xiao-long. Fast pose estimation for on-board camera and scene reconstruction in monocular vision SLAM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(12): 116-124.
[15] TANG Ji-hua, CHEN Bao-hui, SHI Kai-quan. P-augmented matrix reasoning and intelligent decomposition mining of information [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(12): 61-66.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!