zbMATH — the first resource for mathematics

On a conjecture of differentially 8-uniform power functions. (English) Zbl 1402.11149
Summary: Let \(m \geq 5\) be an odd integer. For \(d=2^m+2^{(m+1)/2}+1\) or \(d=2^{m+1}+3\), Blondeau et al. conjectured that the power function \(F_d=x^d\) over \(\mathrm {GF}(2^{2m})\) is differentially 8-uniform in which all values \(0, 2, 4, 6, 8\) appear. In this paper, we confirm this conjecture and compute the differential spectrum of \(F_d\) for both values of \(d\).

11T06 Polynomials over finite fields
94A60 Cryptography
11T71 Algebraic coding theory; cryptography (number-theoretic aspects)
11L05 Gauss and Kloosterman sums; generalizations
Full Text: DOI
[1] Berlekamp, ER; Rumsey, H; Solomon, G, On the solution of algebraic equations over finite fields, Inf. Control, 10, 553-564, (1967) · Zbl 0166.04803
[2] Biham, E; Shamir, A, Differential cryptanalysis of DES-like cryptosystems, J. Cryptol., 4, 3-72, (1991) · Zbl 0729.68017
[3] Blondeau, C; Perrin, L, More differentially \(6\)-uniform power functions, Des. Codes Cryptogr., 73, 487-505, (2014) · Zbl 1335.94033
[4] Blondeau, C; Canteaut, A; Charpin, P, Differential properties of power functions, Int. J. Inf. Coding Theory, 1, 149-170, (2010) · Zbl 1204.94061
[5] Blondeau, C; Canteaut, A; Charpin, P, Differential properties of \(x ↦ x^{2^t-1}\), IEEE Trans. Inf. Theory, 57, 8127-8137, (2011) · Zbl 1365.94404
[6] Canteaut A., Videau M.: Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. In: Advances in Cryptology (EUROCRYPT). Lecture Notes in Computer Science, vol. 2332, pp. 518-533. Springer, Berlin (2002). · Zbl 1056.94512
[7] Carlitz, L, Kloosterman sums and finite field extensions, Acta Arith., 16, 179-183, (1969) · Zbl 0194.07902
[8] Courtois N., Pieprzyk J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Advances in Cryptology-ASIACRYPT. Lecture Notes in Computer Science, vol. 2501, pp. 267-287. Springer, Berlin (2002). · Zbl 1065.94543
[9] Cusick, T; Dobbertin, H, Some new three-valued crosscorrelation functions of binary \(m\)-sequences, IEEE Trans. Inform. Theory, 42, 1238-1240, (1996) · Zbl 0855.94012
[10] Dempwolff U.: CCZ equivalence of power functions. Des. Codes Cryptogr. doi:10.1007/10623-017-0350-8. · Zbl 1426.11132
[11] Helleseth, T; Kholosha, A, On the equation \(x^{2^l+1}+x+a\) over \(GF(2^k)\), Finite Fields Appl., 14, 159-176, (2008) · Zbl 1130.11072
[12] Helleseth, T; Kholosha, A, \(x^{2^l+1}+x+a\) and related affine polynomials over \(GF(2^k)\), Cryptogr. Commun., 2, 85-109, (2010) · Zbl 1192.94098
[13] Jakobsen T., Knudsen L.R.: The interpolation attack on block ciphers. In: Fast Software Encryption-FSE. Lecture Notes in Computer Science, vol. 1267, pp. 28-40. Springer, Berlin (1997). · Zbl 1385.94047
[14] Lidl R., Niederreiter H.: Finite Fields. Encyclopedia of Mathematics and Its Applications, vol. 20, 2nd edn. Cambridge University Press, Cambridge (1997).
[15] Ma J., Zhang T., Feng T., Ge G.: New results on permutation polynomials over finite fields. Des. Codes Cryptogr. 83(2), 425-443 (2017). · Zbl 1369.11091
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.