Correlation immunity

In mathematics, the correlation immunity of a Boolean function is a measure of the degree to which its outputs are uncorrelated with some subset of its inputs. Specifically, a Boolean function is said to be correlation-immune of order m if every subset of m or fewer variables in x 1 , x 2 , , x n {\displaystyle x_{1},x_{2},\ldots ,x_{n}} is statistically independent of the value of f ( x 1 , x 2 , , x n ) {\displaystyle f(x_{1},x_{2},\ldots ,x_{n})} .

Definition

A function f : F 2 n F 2 {\displaystyle f:\mathbb {F} _{2}^{n}\rightarrow \mathbb {F} _{2}} is k {\displaystyle k} -th order correlation immune if for any independent n {\displaystyle n} binary random variables X 0 X n 1 {\displaystyle X_{0}\ldots X_{n-1}} , the random variable Z = f ( X 0 , , X n 1 ) {\displaystyle Z=f(X_{0},\ldots ,X_{n-1})} is independent from any random vector ( X i 1 X i k ) {\displaystyle (X_{i_{1}}\ldots X_{i_{k}})} with 0 i 1 < < i k < n {\displaystyle 0\leq i_{1}<\ldots <i_{k}<n} .

Results in cryptography

When used in a stream cipher as a combining function for linear feedback shift registers, a Boolean function with low-order correlation-immunity is more susceptible to a correlation attack than a function with correlation immunity of high order.

Siegenthaler showed that the correlation immunity m of a Boolean function of algebraic degree d of n variables satisfies m + d ≤ n; for a given set of input variables, this means that a high algebraic degree will restrict the maximum possible correlation immunity. Furthermore, if the function is balanced then m + d ≤ n − 1.[1]

References

  1. ^ T. Siegenthaler (September 1984). "Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications". IEEE Transactions on Information Theory. 30 (5): 776–780. doi:10.1109/TIT.1984.1056949.

Further reading

  1. Cusick, Thomas W. & Stanica, Pantelimon (2009). "Cryptographic Boolean functions and applications". Academic Press. ISBN 9780123748904.
  • v
  • t
  • e
Block ciphers (security summary)
Common
algorithms
  • AES
  • Blowfish
  • DES (internal mechanics, Triple DES)
  • Serpent
  • SM4
  • Twofish
Less common
algorithms
  • ARIA
  • Camellia
  • CAST-128
  • GOST
  • IDEA
  • LEA
  • RC5
  • RC6
  • SEED
  • Skipjack
  • TEA
  • XTEA
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
  • v
  • t
  • e
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption modes
Attacks
Design
Standardization
Utilization
  • v
  • t
  • e
Widely used ciphers
eSTREAM Portfolio
Software
Hardware
Other ciphers
Generators
Theory
Attacks
  • v
  • t
  • e
General
Mathematics
  • Category


Stub icon

This cryptography-related article is a stub. You can help Wikipedia by expanding it.

  • v
  • t
  • e