Affiliation:
1. Department of Mathematics, University of Paris VIII, F-93526 Paris, France
2. Laboratory Geometry, Analysis and Applications (LAGA), University Sorbonne Paris Nord, CNRS, UMR 7539, F-93430 Villetaneuse, France
3. Telecom Paris, Polytechnic Institute, F-91120 Palaiseau, France
Abstract
Vectorial Boolean functions and codes are closely related and interconnected. On the one hand, various requirements of binary linear codes are needed for their theoretical interests but, more importantly, for their practical applications (such as few-weight codes or minimal codes for secret sharing, locally recoverable codes for storage, etc.). On the other hand, various criteria and tables have been introduced to analyse the security of S-boxes that are related to vectorial Boolean functions, such as the Differential Distribution Table (DDT), the Boomerang Connectivity Table (BCT), and the Differential-Linear Connectivity Table (DLCT). In previous years, two new tables have been proposed for which the literature was pretty abundant: the c-DDT to extend the DDT and the c-BCT to extend the BCT. In the same vein, we propose extended concepts to study further the security of vectorial Boolean functions, especially the c-Walsh transform, the c-autocorrelation, and the c-differential-linear uniformity and its accompanying table, the c-Differential-Linear Connectivity Table (c-DLCT). We study the properties of these novel functions at their optimal level concerning these concepts and describe the c-DLCT of the crucial inverse vectorial (Boolean) function case. Finally, we draw new ideas for future research toward linear code designs.
Reference48 articles.
1. (1977). Data Encryption Standard (Standard No. NBS FIPS PUB 46).
2. Daemen, J., and Rijmen, V. (2002). The Design of Rijndael: AES–The Advanced Encryption Standard, Information Security and Cryptography; Springer.
3. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish);Anderson;Fast Software Encryption,1994
4. (1998). Cryptographic Protection for Data Processing Systems, Cryptographic Transformation Algorithm. Inv. No. 3583, UDC 681.325.6:006.354. (Standard No. GOST 28147-89). (In Russian).
5. Serpent: A new block cipher proposal;Vaudenay;Fast Software Encryption, Proceedings of the 5th International Workshop, FSE’98, Paris, France, 23–25 March 1998,1998