APN Permutations: Difference between revisions

From Boolean
Jump to navigation Jump to search
 
Line 116: Line 116:
<center><math>+w^8x^{12}+w^{35}x^{11}+w^{44}x^{10}+w^{45}x^8+w^8x^7+w^{61}x^6+w^{59}x^5+w^{20}x^4+w^{12}x^3+w^{37}x^2+w^2x</math></center>
<center><math>+w^8x^{12}+w^{35}x^{11}+w^{44}x^{10}+w^{45}x^8+w^8x^7+w^{61}x^6+w^{59}x^5+w^{20}x^4+w^{12}x^3+w^{37}x^2+w^2x</math></center>


where <math>w=u^{-2}</math><ref name="Dillon"></ref>.
where <math>w=u^{-2}</math>.<ref name="Dillon"></ref>


It was used later in the cryptosystem Fides<ref name="BBKMW">B. Bilgin, A. Bogdanov, M. Knezevic, F. Mendel and Q. Wang. <i>Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware.</i> Proceedings of International  Workshop Cryptographic Hardware and Embedded Systems CHES 2013, Lecture Notes in Computer Science 8086, pp. 142-158, 2013.</ref>, which has been subsequently broken due to its weaknesses in the linear component.
It was used later in the cryptosystem Fides<ref name="BBKMW">B. Bilgin, A. Bogdanov, M. Knezevic, F. Mendel and Q. Wang. <i>Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware.</i> Proceedings of International  Workshop Cryptographic Hardware and Embedded Systems CHES 2013, Lecture Notes in Computer Science 8086, pp. 142-158, 2013.</ref>, which has been subsequently broken due to its weaknesses in the linear component.

Latest revision as of 14:28, 21 November 2024

Characterization of Permutations

Component Functions

An -function is a permutation if and only if all of its components Failed to parse (syntax error): {\displaystyle f_λ} for are balanced.

Autocorrelation Functions of the Directional Derivatives

For any boolean function , we denote by the following value related to the Fourier (or Walsh) transform of :

The characterization in terms of the component functions given above can be equivalently expressed as

for any Failed to parse (syntax error): {\displaystyle λ\in\mathbb{F}^*_{2^n}} .

Equivalently [1], is a permutation if and only if

for any .

Characterization of APN Permutations

Up to CCZ-equivalence, all of the APN permutations known so far belong to a few families, namely:[2]

1. APN monomial functions in odd dimension.

2. One infinite family of quadratic polynomials in dimension , with odd and .[3]

3. Dillon's permutation in dimension 6.[4]

4. Two sporadic quadratic APN permutations in dimension 9.[5]

On the component functions

Clearly we have that no component function can be of degree 1. (This result is true for general APN maps)

For even we have also that no component can be partially-bent[6]. This implies that, in even dimension, no component can be of degree 2.

Autocorrelation Functions of the Directional Derivatives

An -function is an APN permutation if and only if [1]

and

for any .

On APN Power Functions

For odd, all power APN functions and the known APN binomials are permutations. When is even, no APN function exists in a class of permutations including power permutations.

Specifically:

If a power function over is APN, then for every we have if and only if , that is,

If is odd, then and, if is even, then .

Consequently, APN power functions are permutations if is odd, and are three-to-one over if is even.[7]

APN Permutations and Codes

Any linear subspace of of dimension is called a binary linear code of length and dimension and is denoted by , where is the minimum Hamming distance of .

Any linear code is associated with its dual code, denoted by and defined as

Let be a binary matrix. We say that a linear binary code of length is defined by the parity check matrix if where is the transposed matrix of .

APN (and AB) properties were expressed in terms of codes in [8]. In particular, we mention the following result:


Theorem. Let be a function on such that and let be the Failed to parse (syntax error): {\displaystyle [2^m − 1,k,d]-} code defined by the parity check matrix

where each entry is viewed as a binary vector and is the primitive element of Then:

1. The code is such that .

2. is APN if and only if .

3. is AB if and only if the weight of every codeword in lies in .


A binary linear code in is called simplex. Simplex codes constitute a family of linear error-correcting or error-detecting block codes, easily implemented as polynomial codes (i.e. codes whose encoding and decoding algorithms may be conveniently expressed in terms of polynomials over a base field).

A dimensional code is called a double simplex code if it can be written as a direct sum of two simplex codes. The following result provides a connection between APN permutations and double simplex codes:

Theorem.[9] Let be APN, with .

is CCZ-equivalent to an APN permutation if and only if is a double simplex code, i.e. , where are simplex codes.

An APN Permutation in Dimension 6

In his paper [10], Hou conjectured that APN permutations did not exist in even dimension. He proved the following theorem that covers the case of :

Let be a permutation polynomial with . Then:

1. If , then is not APN.

2. If , then is not APN.

The question of whether APN permutations exist in even dimension was a long-standing problem until, in 2009, Dillon presented an APN permutation (of algebraic degree and nonlinearity ) in dimension 6.

This function is CCZ-equivalent to the Kim function (where is a primitive element of ) and it is given by the polynomial

where .[4]

It was used later in the cryptosystem Fides[11], which has been subsequently broken due to its weaknesses in the linear component.

Dillon's function is also EA-equivalent to an involution and it is studied further in the introduction of the butterfly construction[12]. Unfortunately, this construction does not allow obtaining APN permutations in more than six variables[13].

The Big Open APN Problem

The question of existence of APN permutations in even dimension remains open. There exist nonexistent results within the following classes:

1. Plateaued functions (when APN, they have bent components);

2. A class of functions including power functions;

3. Functions whose univariate representation coefficients lie in , or in for divisible by 4; [10]

4. Functions whose univariate representation coefficients satisfy ; [14]

5. Functions having at least one partially-bent component[6].

References

  1. 1.0 1.1 Thierry Berger, Anne Canteaut, Pascale Charpin, Yann Laigle-Chapuy, On Almost Perfect Nonlinear Functions Over GF(2^n), IEEE Transactions on Information Theory, 2006 Sep,52(9),4160-70
  2. Bartoli, D., Timpanella, M. On a conjecture on APN permutations. Cryptogr. Commun. 14, 925–931 (2022)
  3. Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218–4229 (2008)
  4. 4.0 4.1 Browning, K., Dillon, J.F., McQuistan, M., Wolfe, A.J.: An APN permutation in dimension six. In: Post-proceedings of the 9-th International conference on Finite Fields and their applications, American Mathematical Society, vol. 518, pp. 33–42 (2010)
  5. Beierle, C., Leander, G.: New instances of quadratic APN functions, arXiv:2009.07204 (2020)
  6. 6.0 6.1 Marco Calderini, Massimiliano Sala, Irene Villa, A note on APN permutations in even dimension, Finite Fields and Their Applications, vol. 46, 1-16, 2017
  7. H. Dobbertin. Private Communication, 1998.
  8. Carlet, Claude & Charpin, Pascale & Zinoviev, Victor. (1998). Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems. Designs, Codes and Cryptography, vol. 15, p. 125-156.
  9. Browning, K.A. & Dillon, J.F. & Kibler, R.E. & McQuistan, M.T.. (2009). APN polynomials and related codes. Journal of Combinatorics, Information & System Sciences. 34.
  10. 10.0 10.1 X.-D. Hou. Affinity of Permutations of . Proceedings of Workshop on Coding and Cryptography WCC 2003, pp. 273-280, 2003. Completed version in Discrete Applied Mathematics 154 (2), pp. 313-325, 2006.
  11. B. Bilgin, A. Bogdanov, M. Knezevic, F. Mendel and Q. Wang. Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. Proceedings of International Workshop Cryptographic Hardware and Embedded Systems CHES 2013, Lecture Notes in Computer Science 8086, pp. 142-158, 2013.
  12. L. Perrin, A. Udovenko, A. Biryukov. Cryptanalysis of a theorem: decomposing the only known solution to the big APN problem. Proceedings of CRYPTO 2016, Lecture Notes in Computer Science 9815, part II, pp. 93-122, 2016.
  13. L. Perrin, A. Canteaut, S. Tian. If a generalized butterfly is APN then it operates on 6 bits. Special Issue on Boolean Functions and Their Applications 2018, Cryptography and Communications 11 (6), pp. 1147-1164, 2019.
  14. A. Canteaut. Differential cryptanalysis of Feistel ciphers and differentially uniform mappings. Proceedings of Selected Areas on Cryptography, SAC 1997, pp. 172-184, 1997.