Abstract
Recently, a class of cryptographic Boolean functions called generalized Maiorana–McFarland (GMM) functions was proposed in Zhang and Pasalic (IEEE Trans Inf Theory 60(10):6681–6695, 2014). In particular, it was demonstrated that certain subclasses within the GMM class satisfy all the relevant cryptographic criteria including a good resistance to (fast) algebraic cryptanalysis. However, the issue of efficient hardware implementation, which is essentially of crucial importance when such a function is used as a filtering function in certain stream cipher encryption schemes, has not been addressed in Zhang and Pasalic (2014). In this article, we analyze the complexity of hardware implementation of these subclasses and provide some exact estimates in terms of the number of elementary circuits needed. It turns out that these classes of cryptographically strong functions are also characterized with a very low hardware implementation cost, making these functions attractive candidates for the use in certain stream cipher schemes.

Similar content being viewed by others
Notes
Note that it is not clear how a low degree for \(f_i\) affects the vulnerability of the cipher, though the implementation cost is clearly reduced by that.
References
Armknecht, F.: Improving Fast Algebraic Attacks. Volume LNCS 3017, pp. 65–82. Springer, Berlin (2004)
Bollig, B., Löbbing, M., Sauerhoff, M., Wegener, I.: On the complexity of the hidden weighted bit function for various BDD models. RAIRO Theor. Inf. Appl. 33(2), 103–115 (2010)
Bryant, R.E.: On the complexity of VLSI implementations and graph representations of Boolean functions with application to integer multiplication. IEEE Trans. Comput. 40(2), 205–213 (1991)
Carlet, C.:. A larger class of cryptographic Boolean functions via a study of the Maiorana–McFarland constructions. In: Advances in Cryptology—CRYPTO’02, Volume LNCS 2442, pp. 549–564. Springer, Berlin (2002)
Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inf. Theory IT 52(7), 3105–3121 (2006)
Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Coding and Cryptography, Volume LNCS 5557, pp. 1–11. Springer, Berlin (2009)
Carlet, C.: On a Weakness of the Tu–Deng Function and Its Repair. Cryptology ePrint Archive, Report 2009/606
Carlet, C.: Comments on “Constructions of cryptographically significant Boolean functions using primitive polynomials”. IEEE Trans. Inf. Theory 57(7), 4852–4853 (2011)
Coppersmith, D.: Fast evaluation of logarithms in fields of characteristic two. IEEE Trans. Inf. Theory 30(4), 587–594 (1984)
Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—CRYPTO 2003, Volume LNCS 2729, pp. 176–194. Springer, Berlin (2003)
Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—EUROCRYPT 2003, Volume LNCS 2656, pp. 346–359. Springer, Berlin (2003)
Dalai, D.K., Gupta, K.C., Maitra, S.: Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. In: Fast Software Encryption 2005, Volume LNCS 3557, pp. 98–111. Springer, Berlin (2005)
Güneysu, T., Kasper, T., Novotný, M., Paar, C., Rupp, A.: Cryptanalysis with COPACOBANA. IEEE Trans. Comput. 57(11), 1498–1513 (2008). doi:10.1109/TC.2008.80
Khan, M.A., Özbudak, F.: Hybrid classes of balanced Boolean functions with good cryptographic properties. Inf. Sci. 273, 319–328. doi:10.1016/j.ins.2014.02.157, ISSN 0020-0255
Li, N., Qi, W.F.: Construction and analysis of Boolean functions of \(2t+1\) variables with maximum algebraic immunity. In: Advances in Cryptology—ASIACRYPT 2006, Volume LNCS 4284, pp. 84–98. Springer, Berlin (2006)
Maitra, S., Pasalic, E.: Further constructions of resilient Boolean functions with very high nonlinearity. IEEE Trans. Inf. Theory IT 48(7), 1825–1834 (2002)
Stanica, P., Maitra, S.: Rotation symmetric Boolean functions—count and cryptographic properties. Discrete Appl. Math. 156(10), 1567–1580 (2008)
Kavut, S., Maitra, S., Yücel, M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory IT 53(5), 1743–1751 (2007)
Maitra, S., Pasalic, E.: A Maiorana–McFarland type construction for resilient functions on variables (\(n\) even) with nonlinearity \(>2^{n-1}-2^{n/2}+2^{n/2-2}\). Discrete Appl. Math. 154, 357–369 (2006)
Mitra, S., Avya, L.J., McCluskey, E.J.: Efficient multiplexer synthesis techniques. IEEE Des. Test Comput. 17(4), 90–97 (2000). doi:10.1109/54.895009
Sarkar, P., Maitra, S.: Construction of nonlinear Boolean functions with important cryptographic properties. In: Advances in Cryptology—EUROCRYPT’00, Volume LNCS 1807, pp. 485–506. Springer, Berlin (2000)
Sarkar, P., Maitra, S.: Efficient implementation of cryptographically useful large Boolean functions. IEEE Trans. Comput. IT 52(4), 410–417 (2003)
Tang, X., Tang, D., Zeng, X., Hu, L.: Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity. Cryptology ePrint Archive, Report 2010/443, (2010). http://eprint.iacr.org/
Tu, Z., Deng, Y.: A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity. Cryptology ePrint Archive, Report 2010/179
Tu, Z., Deng, Y.: A conjecture on binary strings and its application on constructing Boolean functions of optimal algebraic immunity. Des. Codes Cryptogr. (2010). doi:10.1007/s10623-010-9413-9
Xiao, G., Massey, J.L.: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory IT 34(3), 569–571 (1988)
Wang, Q., Peng, J., Kan, H., Xue, X.: Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans. Inf. Theory IT 56, 3048–3053 (2010)
Wang, Q., Carlet, C., Stanica, P., Tan, C.H.: Cryptographic properties of the hidden weighted bit function. Discrete Appl. Math. 174, 1–10 (2014)
Wang, Q., Tan, C.H.: Cryptographic Boolean functions with a large number of variables. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), pp. 1534–1538 (2014). doi:10.1109/ISIT.2014.6875090
Zeng, X., Carlet, C., Shan, J., Hu, L.: More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inf. Theory IT 57(9), 6310–6320 (2010)
Zhang, W., Pasalic, E.: Generalized Maiorana–McFarland construction of resilient Boolean functions with high nonlinearity and good algebraic properties. IEEE Trans. Inf. Theory 60(10), 6681–6695 (2014)
Zhang, W., Xiao, G.: Constructions of almost optimal resilient Boolean functions on large even number of variables. IEEE Trans. Inf. Theory IT 55(12), 5822–5831 (2009)
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by a fellowship of the German Academic Exchange Service. This work was supported in part by the National Natural Science Foundation of China under Grants 61373008 and 61672414.
Rights and permissions
About this article
Cite this article
Pasalic, E., Chattopadhyay, A. & Zhang, W. Efficient implementation of generalized Maiorana–McFarland class of cryptographic functions. J Cryptogr Eng 7, 287–295 (2017). https://doi.org/10.1007/s13389-016-0139-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13389-016-0139-0