Skip to main content
Log in

Algebraic manipulation detection codes via highly nonlinear functions

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

In this paper, we study the relationship between algebraic manipulation detection (AMD) codes and highly nonlinear functions. As applications, on one hand, a generic construction for systematic AMD codes is introduced based on highly nonlinear functions. Systematic AMD codes with new parameters can be generated from known highly nonlinear functions. Especially, several infinite classes of optimal systematic AMD codes, some with asymptotically optimal tag size, can be constructed. On the other hand, systematic AMD codes are used to construct highly nonlinear functions. The known construction by Cramer et al. (2008) for systematic AMD codes turns out to be based on a special kind of functions with high nonlinearity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ahmadi, H., Safavi-Naini, R.: Detection of algebraic manipulation in the presence of leakage. Information Theoretic Security - ICITS 2013, Lecture Notes in Computer Science, vol. 8317, pp 238–258. Springer, Cham (2013)

    Google Scholar 

  2. Akdemir, K.D., Wang, Z., Karpovsky, M., Sunar, B.: Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. Fault analysis in cryptography, pp 171–199. Springer, Berlin (2012)

    MATH  Google Scholar 

  3. Alekseev, M.: On encoding polynomials for strong algebraic manipulation detection codes. Electron Notes Discrete Math. 57, 3–8 (2017)

    Article  Google Scholar 

  4. Alekseev, M.: On strengthening of weak algebraic manipulation detection codes. International Journal of Embedded and Real-Time Communication Systems 6(2), 1–26 (2015)

    Article  Google Scholar 

  5. Bao, J., Ji, L., Wei, R., Zhang, Y.: New existence and nonexistence results for strong external difference families. Discret. Math. 341(6), 1798–1805 (2018)

    Article  MathSciNet  Google Scholar 

  6. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3–72 (1991)

    Article  MathSciNet  Google Scholar 

  7. Canteaut, A., Charpin, P., Dobbertin, H.: Weight divisibility of cyclic codes, highly nonlinear functions on \(\mathbb {F}_{2^{m}}\), and cross correlation of maximum-length sequences. SIAM J. Discrete Math. 13(1), 105–138 (2000)

    Article  MathSciNet  Google Scholar 

  8. Carlet, C., Ding, C.: Highly nonlinear mappings. J. Complex. 20(2-3), 205–244 (2004)

    Article  MathSciNet  Google Scholar 

  9. Carlet, C., Ding, C.: Authentication schemes from highly nonlinear functions. Des. Codes Crypt. 40(1), 71–79 (2006)

    Article  MathSciNet  Google Scholar 

  10. Carlet, C., Ding, C.: Nonlinearities of S-boxes. Finite Fields and Their Applications 13(1), 121–135 (2007)

    Article  MathSciNet  Google Scholar 

  11. Chanson, S., Ding, C., Salomaa, A.: Cartesian authentication codes from functions with optimal nonlinearity. Theor. Comput. Sci. 290(3), 1737–1752 (2003)

    Article  MathSciNet  Google Scholar 

  12. Colbourn, C.J., Dinitz, J.H.: Handbook of Combinatorial Designs. Chapman& hall/CRC (2007)

  13. Cramer, R., Dodis, Y., Fehr, S., Padró, C., Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965, pp 471–488. Springer, Berlin (2008)

    MATH  Google Scholar 

  14. Cramer, R., Fehr, S., Padró, C.: Algebraic manipulation codes. Science China Mathematics 56(7), 1349–1358 (2013)

    Article  MathSciNet  Google Scholar 

  15. Cramer, R., Padró, C., Xing, C.: Optimal algebraic manipulation detection codes in the constant-error model. Theory of Cryptography TCC 2015, Lecture Notes in Computer Science, vol. 9014, pp 481–501. Springer, Berlin (2015)

    MATH  Google Scholar 

  16. Cusick, T.W., Ding, C., Renvall, A.: Stream ciphers and number theory. In: North-Holland Mathematical Library, vol. 55. North-Holland/Elsevier, Amsterdam (1998)

  17. Dillon, J.F.: Elementary Hadamard Difference Sets. Ph.D, Thesis, University of Maryland (1974)

  18. Ding, C., Helleseth, T., Martinsen, H.M.: New families of binary sequences with optimal three-level autocorrelation. IEEE Trans. Inform. Theory 47 (1), 428–433 (2001)

    Article  MathSciNet  Google Scholar 

  19. Ding, C., Helleseth, T., Kløve, T., Wang, X.: A general construction of authentication codes. IEEE Trans. Inform. Theory 53(6), 2229–2235 (2007)

    Article  MathSciNet  Google Scholar 

  20. Ding, C., Niederreiter, H.: Systematic authentication codes from highly nonlinear functions. IEEE Trans. Inform. Theory 50(10), 2421–2428 (2004)

    Article  MathSciNet  Google Scholar 

  21. Hou, X.: q-Ary bent functions constructed from chain rings. Finite Fields and Their Applications 4(1), 55–61 (1998)

    Article  MathSciNet  Google Scholar 

  22. Huczynska, S., Paterson, M.B.: Weighted external difference families and R-optimal AMD codes. Discret. Math. 342(3), 855–867 (2019)

    Article  MathSciNet  Google Scholar 

  23. Jedwab, J., Li, S.: Construction and nonexistence of strong external difference families. Journal of Algebraic Combinatorics 49(1), 21–48 (2019)

    Article  MathSciNet  Google Scholar 

  24. Jia, W., Zeng, X., Helleseth, T., Li, C.: A class of binomial bent functions over the finite fields of odd characteristic. IEEE Trans. Inform. Theory 58 (9), 6054–6063 (2012)

    Article  MathSciNet  Google Scholar 

  25. Karpovsky, M., Wang, Z.: Design of strongly secure communication and computation channels by nonlinear error detecting codes. IEEE Trans. Comput. 63(11), 2716–2728 (2013)

    Article  MathSciNet  Google Scholar 

  26. Levina, A.B., Taranov, S.V., Kaplun, D., Klionskiy, D., Gulvanskii, V.: AMD Codes based on wavelet transform. Progress In Electromagnetics Research Symposium - Fall (PIERS-FALL) - 2017, pp 2534–2539 (2017)

  27. Levina, A.B., Taranov, S.V.: New construction of algebraic manipulation detection codes based on wavelet transform. In: Proceedings of the 18th Conference of Open Innovations Association FRUCT - 2016, pp 187–192 (2016)

  28. Li, N., Tang, X., Helleseth, T.: New constructions of quadratic bent functions in polynomial form. IEEE Trans. Inform. Theory 60(9), 5760–5767 (2014)

    Article  MathSciNet  Google Scholar 

  29. Lu, X., Niu, X., Cao, H.: Some results on generalized strong external difference families. Des. Codes Crypt. 86(12), 2857–2868 (2018)

    Article  MathSciNet  Google Scholar 

  30. Martin, W.J., Stinson, D.R.: Some nonexistence results for strong external difference families using character theory. Bull. Inst. Combin. Appl. 80, 79–92 (2017)

    MathSciNet  MATH  Google Scholar 

  31. Matsui, M.: Linear cryptanalysis method for DES cipher. Advances in Cryptology - EUROCRYPT’93, Lecture Notes in Computer Science, vol. 765, pp 386–397. Springer, Berlin (1994)

    Google Scholar 

  32. Mesnager, S.: Bent functions: Fundamentals and results. Springer (2016)

  33. Mesnager, S., Zhou, Z., Ding, C.: On the nonlinearity of Boolean functions with restricted input. Cryptogr. Commun. 11(1), 63–76 (2019)

    Article  MathSciNet  Google Scholar 

  34. Nyberg, K.: Perfect nonlinear S-boxes. Advance in Cryptology - EUROCRYPT’91, Lecture Notes in Computer Science, vol. 547, pp 378–386. Springer, Berlin (1991)

    Google Scholar 

  35. Olsen, J.D., Scholtz, R.A., abd Welch, L.R.: Bent function sequences. IEEE Trans. Inform. Theory 28(6), 858–864 (1982)

    Article  MathSciNet  Google Scholar 

  36. Paterson, M.B., Stinson, D.R.: Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discret. Math. 339(12), 2891–2906 (2016)

    Article  MathSciNet  Google Scholar 

  37. Rothaus, O.S.: On bent functions. Journal of Combinatorial Theory Series A 20(3), 300–305 (1976)

    Article  MathSciNet  Google Scholar 

  38. Shao, M., Miao, Y.: On optimal weak algebraic manipulation detection codes and weighted external difference families. Des. Codes Crypt. 88(7), 1349–1369 (2020)

    Article  MathSciNet  Google Scholar 

  39. Tang, D., Carlet, C., Tang, X.: Highly nonlinear boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inform. Theory 59(1), 653–664 (2013)

    Article  MathSciNet  Google Scholar 

  40. Wang, Z., Karpovsky, M.: Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. IEEE 17th International On-Line Testing Symposium, pp 234–239 (2011)

  41. Wee, H.: Public key encryption against related key attacks. Public Key cryptography-PKC 2012, Lecture Notes in Computer Science, vol. 7293, pp 262–279. Springer, Berlin (2012)

    MATH  Google Scholar 

  42. Wen, J., Yang, M., Feng, K.: The (n, m, k, λ)-strong external difference family with m ≥ 5 exists. arXiv:1612.09495v1 (2016)

  43. Wen, J., Yang, M., Fu, F., Feng, K.: Cyclotomic construction of strong external difference families in finite fields. Des. Codes Crypt. 86(5), 1149–1159 (2018)

    Article  MathSciNet  Google Scholar 

  44. Wu, Y., Li, N., Zeng, X.: Linear codes from perfect nonlinear functions over finite fields. IEEE Trans. Commun. 68(1), 3–11 (2020)

    Article  Google Scholar 

Download references

Acknowledgments

The authors are very grateful to the reviewers for their comments and suggestions that improved the presentation and quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minfeng Shao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This research is supported by JSPS Grant-in-Aid for Scientific Research (B) under Grant No. 18H01133.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shao, M., Miao, Y. Algebraic manipulation detection codes via highly nonlinear functions. Cryptogr. Commun. 13, 53–69 (2021). https://doi.org/10.1007/s12095-020-00453-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-020-00453-z

Keywords

Mathematics Subject Classification (2010)

Navigation