Cryptographic Boolean Functions and ApplicationsBoolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research. - Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions - Provides engineers and scientists with a needed reference for the use of Boolean functions in cryptography - Addresses the issues of cryptographic Boolean functions theory and applications in one concentrated resource - Organized logically to help the reader easily understand the topic |
Contents
1 | |
5 | |
Chapter 3 Avalanche and propagation criteria | 25 |
Chapter 4 Correlation immune and resilient Boolean functions | 49 |
Chapter 5 Bent Boolean functions | 73 |
Chapter 6 Stream cipher design | 119 |
Other editions - View all
Cryptographic Boolean Functions and Applications Thomas W. Cusick,Pantelimon Stanica Limited preview - 2017 |
Cryptographic Boolean Functions and Applications Thomas W. Cusick,Pantelimon Stănică No preview available - 2009 |
Cryptographic Boolean Functions and Applications Thomas W. Cusick,Pantelimon Stanica No preview available - 2017 |
Common terms and phrases
affine function à algebraic attacks algebraic normal form algorithm assume balanced bent functions Berlin binary bitstring block cipher Boole Boolean function Bruijn sequences byte Carlet Cayley graph Cayley graph associated ciphertext coefficients computation concatenation construction correlation attack correlation immune crypt.-Crypto crypt.-Eurocrypt cryptanalysis defined definition degree denote Dobbertin eigenvalues encryption equations equivalent F₂ Figure function f given Hamming weight IEEE Trans Inform immune of order input integer keystream Lemma length Let f LFSR linear complexity LNCS Maitra Math matrix nonzero obtain output bit output sequence permutation plaintext PRBG Proof proved quadratic random relinearization result Rijndael rotation symmetric functions S-box SAC(n satisfies PC(k satisfies the SAC shift registers Springer stream ciphers string strongly regular strongly regular graph subspace symmetric Boolean functions Theorem Trans Inform Theory truth table V₁ V₂ values variables vector Walsh transform wt(f zero