Abstract
In this paper, we study the relationship between algebraic manipulation detection (AMD) codes and highly nonlinear functions. As applications, on one hand, a generic construction for systematic AMD codes is introduced based on highly nonlinear functions. Systematic AMD codes with new parameters can be generated from known highly nonlinear functions. Especially, several infinite classes of optimal systematic AMD codes, some with asymptotically optimal tag size, can be constructed. On the other hand, systematic AMD codes are used to construct highly nonlinear functions. The known construction by Cramer et al. (2008) for systematic AMD codes turns out to be based on a special kind of functions with high nonlinearity.
Similar content being viewed by others
References
Ahmadi, H., Safavi-Naini, R.: Detection of algebraic manipulation in the presence of leakage. Information Theoretic Security - ICITS 2013, Lecture Notes in Computer Science, vol. 8317, pp 238–258. Springer, Cham (2013)
Akdemir, K.D., Wang, Z., Karpovsky, M., Sunar, B.: Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. Fault analysis in cryptography, pp 171–199. Springer, Berlin (2012)
Alekseev, M.: On encoding polynomials for strong algebraic manipulation detection codes. Electron Notes Discrete Math. 57, 3–8 (2017)
Alekseev, M.: On strengthening of weak algebraic manipulation detection codes. International Journal of Embedded and Real-Time Communication Systems 6(2), 1–26 (2015)
Bao, J., Ji, L., Wei, R., Zhang, Y.: New existence and nonexistence results for strong external difference families. Discret. Math. 341(6), 1798–1805 (2018)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3–72 (1991)
Canteaut, A., Charpin, P., Dobbertin, H.: Weight divisibility of cyclic codes, highly nonlinear functions on \(\mathbb {F}_{2^{m}}\), and cross correlation of maximum-length sequences. SIAM J. Discrete Math. 13(1), 105–138 (2000)
Carlet, C., Ding, C.: Highly nonlinear mappings. J. Complex. 20(2-3), 205–244 (2004)
Carlet, C., Ding, C.: Authentication schemes from highly nonlinear functions. Des. Codes Crypt. 40(1), 71–79 (2006)
Carlet, C., Ding, C.: Nonlinearities of S-boxes. Finite Fields and Their Applications 13(1), 121–135 (2007)
Chanson, S., Ding, C., Salomaa, A.: Cartesian authentication codes from functions with optimal nonlinearity. Theor. Comput. Sci. 290(3), 1737–1752 (2003)
Colbourn, C.J., Dinitz, J.H.: Handbook of Combinatorial Designs. Chapman& hall/CRC (2007)
Cramer, R., Dodis, Y., Fehr, S., Padró, C., Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965, pp 471–488. Springer, Berlin (2008)
Cramer, R., Fehr, S., Padró, C.: Algebraic manipulation codes. Science China Mathematics 56(7), 1349–1358 (2013)
Cramer, R., Padró, C., Xing, C.: Optimal algebraic manipulation detection codes in the constant-error model. Theory of Cryptography TCC 2015, Lecture Notes in Computer Science, vol. 9014, pp 481–501. Springer, Berlin (2015)
Cusick, T.W., Ding, C., Renvall, A.: Stream ciphers and number theory. In: North-Holland Mathematical Library, vol. 55. North-Holland/Elsevier, Amsterdam (1998)
Dillon, J.F.: Elementary Hadamard Difference Sets. Ph.D, Thesis, University of Maryland (1974)
Ding, C., Helleseth, T., Martinsen, H.M.: New families of binary sequences with optimal three-level autocorrelation. IEEE Trans. Inform. Theory 47 (1), 428–433 (2001)
Ding, C., Helleseth, T., Kløve, T., Wang, X.: A general construction of authentication codes. IEEE Trans. Inform. Theory 53(6), 2229–2235 (2007)
Ding, C., Niederreiter, H.: Systematic authentication codes from highly nonlinear functions. IEEE Trans. Inform. Theory 50(10), 2421–2428 (2004)
Hou, X.: q-Ary bent functions constructed from chain rings. Finite Fields and Their Applications 4(1), 55–61 (1998)
Huczynska, S., Paterson, M.B.: Weighted external difference families and R-optimal AMD codes. Discret. Math. 342(3), 855–867 (2019)
Jedwab, J., Li, S.: Construction and nonexistence of strong external difference families. Journal of Algebraic Combinatorics 49(1), 21–48 (2019)
Jia, W., Zeng, X., Helleseth, T., Li, C.: A class of binomial bent functions over the finite fields of odd characteristic. IEEE Trans. Inform. Theory 58 (9), 6054–6063 (2012)
Karpovsky, M., Wang, Z.: Design of strongly secure communication and computation channels by nonlinear error detecting codes. IEEE Trans. Comput. 63(11), 2716–2728 (2013)
Levina, A.B., Taranov, S.V., Kaplun, D., Klionskiy, D., Gulvanskii, V.: AMD Codes based on wavelet transform. Progress In Electromagnetics Research Symposium - Fall (PIERS-FALL) - 2017, pp 2534–2539 (2017)
Levina, A.B., Taranov, S.V.: New construction of algebraic manipulation detection codes based on wavelet transform. In: Proceedings of the 18th Conference of Open Innovations Association FRUCT - 2016, pp 187–192 (2016)
Li, N., Tang, X., Helleseth, T.: New constructions of quadratic bent functions in polynomial form. IEEE Trans. Inform. Theory 60(9), 5760–5767 (2014)
Lu, X., Niu, X., Cao, H.: Some results on generalized strong external difference families. Des. Codes Crypt. 86(12), 2857–2868 (2018)
Martin, W.J., Stinson, D.R.: Some nonexistence results for strong external difference families using character theory. Bull. Inst. Combin. Appl. 80, 79–92 (2017)
Matsui, M.: Linear cryptanalysis method for DES cipher. Advances in Cryptology - EUROCRYPT’93, Lecture Notes in Computer Science, vol. 765, pp 386–397. Springer, Berlin (1994)
Mesnager, S.: Bent functions: Fundamentals and results. Springer (2016)
Mesnager, S., Zhou, Z., Ding, C.: On the nonlinearity of Boolean functions with restricted input. Cryptogr. Commun. 11(1), 63–76 (2019)
Nyberg, K.: Perfect nonlinear S-boxes. Advance in Cryptology - EUROCRYPT’91, Lecture Notes in Computer Science, vol. 547, pp 378–386. Springer, Berlin (1991)
Olsen, J.D., Scholtz, R.A., abd Welch, L.R.: Bent function sequences. IEEE Trans. Inform. Theory 28(6), 858–864 (1982)
Paterson, M.B., Stinson, D.R.: Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discret. Math. 339(12), 2891–2906 (2016)
Rothaus, O.S.: On bent functions. Journal of Combinatorial Theory Series A 20(3), 300–305 (1976)
Shao, M., Miao, Y.: On optimal weak algebraic manipulation detection codes and weighted external difference families. Des. Codes Crypt. 88(7), 1349–1369 (2020)
Tang, D., Carlet, C., Tang, X.: Highly nonlinear boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inform. Theory 59(1), 653–664 (2013)
Wang, Z., Karpovsky, M.: Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. IEEE 17th International On-Line Testing Symposium, pp 234–239 (2011)
Wee, H.: Public key encryption against related key attacks. Public Key cryptography-PKC 2012, Lecture Notes in Computer Science, vol. 7293, pp 262–279. Springer, Berlin (2012)
Wen, J., Yang, M., Feng, K.: The (n, m, k, λ)-strong external difference family with m ≥ 5 exists. arXiv:1612.09495v1 (2016)
Wen, J., Yang, M., Fu, F., Feng, K.: Cyclotomic construction of strong external difference families in finite fields. Des. Codes Crypt. 86(5), 1149–1159 (2018)
Wu, Y., Li, N., Zeng, X.: Linear codes from perfect nonlinear functions over finite fields. IEEE Trans. Commun. 68(1), 3–11 (2020)
Acknowledgments
The authors are very grateful to the reviewers for their comments and suggestions that improved the presentation and quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This research is supported by JSPS Grant-in-Aid for Scientific Research (B) under Grant No. 18H01133.
Rights and permissions
About this article
Cite this article
Shao, M., Miao, Y. Algebraic manipulation detection codes via highly nonlinear functions. Cryptogr. Commun. 13, 53–69 (2021). https://doi.org/10.1007/s12095-020-00453-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-020-00453-z