Log in

The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

In a prior paper (Boukerrou et al. IACR Trans. Symmetric Cryptol. 2020(1), 331–362 2020), Boukerrou et al. introduced the Feistel Boomerang Connectivity Table (FBCT). FBCT is an important cryptanalytic technique on Feistel ciphers. In fact, the coefficients of FBCT are actually related to the second-order zero differential spectra of functions in even characteristic. In this paper, we push further the study initiated in Boukerrou et al. (IACR Trans. Symmetric Cryptol. 2020(1), 331–362 2020). Almost perfect nonlinear (APN) functions and the inverse function are interesting in cryptography and coding theory. In Boukerrou et al. (IACR Trans. Symmetric Cryptol. 2020(1), 331–362 2020), Boukerrou et al. determined the second-order zero differential spectra of APN functions and the inverse function in even characteristic. In order to derive further cryptographic properties of APN functions and the inverse function in odd characteristic, we calculate the second-order zero differential spectra of some APN functions and the inverse function in odd characteristic. In addition, these APN functions and the inverse function have low second-order zero differential uniformity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Biham, E., Dunkelman, O., Keller, N.: The rectangle attack-rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT LNCS, vol. 2045, pp 340–357. Springer, Heidelberg (2001)

  2. Biham, E., Dunkelman, O., Keller, N.: New results on boomerang and rectangle attacks. In: Daemen, J., Rijmen, V. (eds.) FSE LNCS, vol. 2365, pp 1–16. Springer (2002)

  3. Biryukov, A., De Cannière, C., Dellkrantz, G.: Cryptanalysis of SAFER++. In: Boneh, D. (ed.) CRYPTO LNCS, vol. 2729, pp 195–211. Springer (2003)

  4. Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT LNCS, vol. 5912, pp 1–18. Springer (2009)

  5. Boukerrou, H., Huynh, P., Lallemand, V., Mandal, B., Minier, M.: On the Feistel Counterpart of the Boomerang Connectivity Table introduction and analysis of the FBCT. IACR Trans. Symmetric Cryptol. 2020(1), 331–362 (2020)

    Article  Google Scholar 

  6. Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: Boomerang connectivity table: a new cryptanalysis tool. Eurocrypt 2018 LNCS 10821, 683–714 (2018)

    Article  MathSciNet  Google Scholar 

  7. Helleseth, T., Rong, C., Sandberg, D.: New families of almost perfect nonlinear power map**s. IEEE Trans. Inf. Theory 45, 475–485 (1999)

    Article  MathSciNet  Google Scholar 

  8. Helleseth, T., Sandberg, D.: Some power map**s with low differential uniformity. Appl. Algerbra Eng. Commun. Comput., 363–370 (1997)

  9. Kelsey, J., Kohno, T., Schneier, B.: Amplified boomerang attacks against reduced-round MARS and Serpent. In: HartmanisJan, G.G., Schneier, V.L. (eds.) FSE LNCS, vol. 1978, pp 75–93. Springer (2000)

  10. Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks: Theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948–4966 (2012)

    Article  MathSciNet  Google Scholar 

  11. Lidl, R., Niederreiter, H.: Finite fields. Addison Wesley, Reading (1983)

  12. Nyberg, K.: Differentially uniform map**s for cryptography. In: Advances in cryptology-EUROCRYPT’93, Lecture Notes in Computer Science, vol. 765, pp 55–64. Springer, New York (1994)

  13. Storer, T.: Cyclotomy and Difference Sets. Markham, Chicago (1967)

    MATH  Google Scholar 

  14. Wagner, D.: The boomerang attack. FSE 1999 LNCS 1636, 156–170 (1999)

    MATH  Google Scholar 

  15. Zha, Z., Wang, X.: Almost perfect nonlinear power functions in odd characteristic. IEEE Trans. Inf. Theory 57(7), 4826–4832 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qin Yue.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The paper was supported by National Natural Science Foundation of China (No. 61772015), the Postgraduate Research & Practice Innovation Program of Jiangsu Province (No. SJKY190167).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Yue, Q. & Tang, D. The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic. Cryptogr. Commun. 14, 653–662 (2022). https://doi.org/10.1007/s12095-021-00544-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-021-00544-5

Keywords

Mathematics Subject Classification (2010)

Navigation