Abstract
Browning et al. (2010) exhibited almost perfect nonlinear (APN) permutations on \(\mathbb {F}_{2^{6}}\). This was the first example of an APN permutation on an even degree extension of \(\mathbb {F}_{2}\). In their approach of finding an APN permutation, Browning et al. made use of a necessary and sufficient condition based on the Walsh transform. In this paper, we give an algorithm based on a related necessary condition which checks whether a vectorial Boolean function is CCZ-inequivalent to a permutation. Using this algorithm, we are able to show that no function belonging to a known family of APN functions is equivalent to a permutation on \(\mathbb {F}_{2^{2m}}\), where m ≤ 6 (except for the known case on \(\mathbb {F}_{2^{6}}\)). We also give an EA-invariant based on the condition. Finally, we give a theoretical proof of the fact that no member of a specific family of APN functions is equivalent to a permutation on doubly-even degree extensions of \(\mathbb {F}_{2}\).
Similar content being viewed by others
Notes
Note that Algorithm 1 is easily modified to list all vector spaces with dimension greater than some value. For instance, assume the maximum dimension of a vector space in NBF is n/2 and it returns only one such vector space (or it returns two such vector spaces U,V which do not satisfy \(U + V = \mathbb {F}_{2^{n}}\)), then one can conclude by Condition 2 that the function is not CCZ-equivalent to any permutation.
References
Berger, T.P., Canteaut, A., Charpin, P., Laigle-Chapuy, Y.: On almost perfect nonlinear functions over \(\mathbb {F}_{2^{n}}\). IEEE Trans. Inf. Theor. 52(9), 4160–4170 (2006)
Bracken, C., Byrne, E., Markin, N., McGuire, G.: On the Walsh spectrum of a new APN function. In: S.D. Galbraith (ed.) Cryptography and Coding, 11th IMA International Conference, Cirencester, Proceedings, Lecture Notes in Computer Science, vol. 4887, pp. 92–98. Springer (2007)
Bracken, C., Byrne, E., Markin, N., McGuire, G.: New families of quadratic almost perfect nonlinear trinomials and multinomials. Finite Fields Appl 14(3), 703–714 (2008)
Bracken, C., Byrne, E., Markin, N., McGuire, G.: A few more quadratic APN functions. Cryptography and Communications 3(1), 43–53 (2011)
Browning, K., Dillon, J., Kibler, R., McQuistan, M.: APN polynomials and related codes. J. Comb. Inf. Syst. Sci. 34(1-4), 135–159 (2009)
Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: An APN permutation in dimension six. In: Finite fields. Theory and applications. Proceedings of the 9th international conference on finite fields and applications, Dublin, pp. 33–42. American Mathematical Society (AMS), Providence (2010)
Budaghyan, L., Calderini, M., Villa, I.: On equivalence between known families of quadratic APN functions. Finite Fields and Their Applications 66, 101704 (2020)
Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inform. Theory 54(5), 2354–2357 (2008)
Budaghyan, L., Carlet, C., Felke, P., Leander, G.: An infinite class of quadratic APN functions which are not equivalent to power mappings. In: 2006 IEEE International Symposium on Information Theory, pp. 2637–2641 (2006)
Budaghyan, L., Carlet, C., Helleseth, T., Kaleyski, N.: On the distance between APN functions. IEEE Transactions on Information Theory 66(9), pp. 5742-5753, (2020)
Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theor. 54(9), 4218–4229 (2008)
Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN functions from known ones. Finite Fields and Their Applications 15(2), 150–159 (2009)
Budaghyan, L., Carlet, C., Leander, G.: On a construction of quadratic APN functions. In: 2009 IEEE Information Theory Workshop, pp. 374–378 (2009)
Budaghyan, L., Helleseth, T., Kaleyski, N.: A new family of APN quadrinomials. IEEE Transactions on Information Theory, 66(11), pp. 7081–7087, (2020)
Budaghyan, L., Helleseth, T., Li, N., Sun, B.: Some results on the known classes of quadratic APN functions. In: Codes, cryptology and information security, Lecture Notes in Comput. Sci., vol. 10194, pp. 3–16. Springer, Cham (2017)
Calderini, M., Sala, M., Villa, I.: A note on APN permutations in even dimension. Finite Fields Appl. 46, 1–16 (2017)
Carlet, C.: Vectorial Boolean functions for cryptography. In: Y. Crama, P.L. Hammer (eds.) Boolean models and methods in mathematics, computer science, and engineering, Encyclopedia of Mathematics and its Applications, vol. 134, pp. xx+ 759. Cambridge University Press, Cambridge (2010)
Carlet, C., Charpin, P., Zinoviev, V.A.: Codes, bent functions and permutations suitable for des-like cryptosystems. Des. Codes Cryptogr. 15(2), 125–156 (1998)
Carlitz, L.: Explicit evaluation of certain exponential sums. Math. Scand. 44(1), 5–16 (1979)
Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): The Niho case. Information and Computation 151(1), 57–72 (1999)
Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): The Welch case 45, 1271 – 1275 (1999) Information Theory, IEEE Transactions on 45(06 1999), 1271–1275
Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): A new case for n divisible by 5. In: Jungnickel, D., Niederreiter, H. (eds.) Finite Fields and Applications, pp. 113–121. Springer Berlin Heidelberg, Berlin, Heidelberg (2001)
Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (corresp.). IEEE Trans. Inf. Theor. 14(1), 154–156 (1968)
Göloğlu, F., Langevin, P.: Almost perfect nonlinear families which are not equivalent to permutations. Finite Fields and Their Applications 67, 101707 (2020)
Hou, X.d.: Affinity of permutations of \(\mathbb {F_{2}^{n}}\). Discrete Appl. Math. 154(2), 313–325 (2006)
Kasami, T.: The weight enumerators for several classes of subcodes of the 2nd order binary reed-muller codes. Information and Control 18(4), 369–394 (1971)
Lidl, R., Niederreiter, H.: Finite fields and their applications. In: Handbook of algebra, vol. 1. Amsterdam, North-Holland (1996)
Nyberg, K.: Differentially uniform mappings for cryptography. In: T. Helleseth (ed.) Advances in Cryptology — EUROCRYPT ’93, pp. 55–64. Springer, Berlin (1994)
Nyberg, K.: S-boxes and round functions with controllable linearity and differential uniformity. In: Preneel, B. (ed.) Fast Software Encryption, pp. 111–130. Springer, Berlin (1995)
Pavlu̇, J.: Search for APN permutations among known APN functions. Master’s thesis, Charles University, Prague (2018)
Taniguchi, H.: On some quadratic APN functions. Designs, Codes and Cryptography 87(9), 1973–1983 (2019)
Yoshiara, S.: Equivalences of quadratic APN functions. J. Algebraic Comb. 35(3), 461–475 (2012)
Zhou, Y., Pott, A.: A new family of semifields with 2 parameters. Advances in Mathematics 234, 43–60 (2013)
Acknowledgements
The authors would like to thank the anonymous reviewers for their extensive reviews. During WCC 2019, we have become aware that Anne Canteaut and Leo Perrin independently devised an algorithm similar to Algorithm 1. This work was supported by the GAČR Grant 18-19087S - 301-13/201843.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: Boolean Functions and Their Applications IV
Guest Editors: Lilya Budaghyan and Tor Helleseth
Rights and permissions
About this article
Cite this article
Göloğlu, F., Pavlu̇, J. On CCZ-inequivalence of some families of almost perfect nonlinear functions to permutations. Cryptogr. Commun. 13, 377–391 (2021). https://doi.org/10.1007/s12095-021-00476-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-021-00476-0