ArticlePDF Available

On Cryptographic Parameters of Permutation Polynomials of the form xrh(x(2n-1)/d)

Authors:

Abstract

The differential uniformity, the boomerang uniformity, and the extended Walsh spectrum etc are important parameters to evaluate the security of S (substitution)-box. In this paper, we introduce efficient formulas to compute these cryptographic parameters of permutation polynomials of the form xrh(x(2ⁿ-1)/d) over a finite field of q=2ⁿ elements, where r is a positive integer and d is a positive divisor of 2ⁿ-1. The computational cost of those formulas is proportional to d. We investigate differentially 4-uniform permutation polynomials of the form xrh(x(2ⁿ-1)/3) and compute the boomerang spectrum and the extended Walsh spectrum of them using the suggested formulas when 6≤n≤12 is even, where d=3 is the smallest nontrivial d for even n. We also investigate the differential uniformity of some permutation polynomials introduced in some recent papers for the case d=2n/2+1.
On cryptographic parameters of permutation polynomials of the
form xrh(x(2n1)/d)
Jaeseong Jeong1, Chang Heon Kim1, Namhun Koo2, Soonhak Kwon1, and Sumin Lee1
Email: wotjd012321@naver.com, {chhkim,shkwon,dltnals816}@skku.edu, nhkoo@ewha.ac.kr
1Department of Mathematics, Sungkyunkwan University, Suwon, Korea
2Institute of Mathematical Sciences, Ewha Womans University, Seoul, Korea
Abstract
The differential uniformity, the boomerang uniformity, and the extended Walsh spec-
trum etc are important parameters to evaluate the security of S(substitution)-box. In this
paper, we introduce efficient formulas to compute these cryptographic parameters of per-
mutation polynomials of the form xrh(x(2n
1)/d) over a finite field of q= 2nelements,
where ris a positive integer and dis a positive divisor of 2n1. The computational cost
of those formulas is proportional to d. We investigate differentially 4-uniform permutation
polynomials of the form xrh(x(2n
1)/3) and compute the boomerang spectrum and the
extended Walsh spectrum of them using the suggested formulas when 6 n12 is even,
where d= 3 is the smallest nontrivial dfor even n. We also investigate the differential
uniformity of some permutation polynomials introduced in some recent papers for the case
d= 2n/2+ 1.
Keywords. Permutation Polynomials, Differential Uniformity, Boomerang Uniformity,
Extended Walsh Spectrum, Differentially 4-Uniform Permutation Polynomials
Mathematics Subject Classification(2020) 94A60, 06E30
1 Introduction
Throughout this paper, F2nis the finite field of 2nelements, F
2nis the subset of nonzero
elements of F2n. For a function F:F2nF2n, we denote δF(a, b) with aF
2nand bF2n
by the number of solutions of the equation F(x) + F(x+a) = band
δF= max
aF
2n,bF2nδF(a, b).(1)
In this case, Fis said to be differentially δF-uniform. Constructing an S-box with good
cryptographic properties for symmetric cipher is essential to the security of the symmetric
cryptography, and Nyberg[20] suggested to choose an S-box with low differential uniformity to
avoid differential cryptanalysis. We call Falmost perfect nonlinear (APN) if Fis differentially
2-uniform, which is the optimal case for δF. Though S-Box does not need to be invertible,
invertible S-Box has many advantages in symmetric cryptography. Several APN permutations
1
are known when nis odd, and the inverse function F(x) = x2n2F2n[x] is always APN for
odd n. However, the situation for even nis quite different. It is known that there is no APN
permutation if n= 2,4, and a single example of APN permutation[5] is known for n= 6.
However, at this moment, the existence of APN permutations for even n8 is still unsettled,
and it is referred as the Big APN Problem.
Another important tool for cryptanalysis is the boomerang attack introduced by Wagner[22].
Recently, Cid et al.[8] introduced the boomerang connectivity table which contains the number
of solutions of
F1(F(x) + a) + F1(F(x+b) + a) = b(a, b F2n)
for a permutation F:F2nF2n, which is denoted by βF(a, b) in this paper. The boomerang
uniformity of F,βF, is defined as the maximum of βF(a, b) for all a, b F
2n, where the case
a= 0 or b= 0 are excluded because βF(a, 0) = βF(0, b) = qfor all a, b F2n. The boomerang
uniformity of an S-box is related to the success probability of the boomerang attack, hence
an S-box is suggested to have low boomerang uniformity. In [8], it is shown that βFδF,
and βF= 2 if and only if δF= 2 (i.e., Fis APN). In constructing an S-box, the cases
n= 4 and n= 8 are most preferred for implementations. However, when n= 4, there is no
APN permutation and it is also proved[3] that there is no permutation with βF= 4. When
n= 8, we do not know the existence of a permutation Fwith δF= 2 or βF= 4, and the
authors of [8] say that construction of a permutation polynomial Fwith βF= 4 would be quite
difficult. The result in [8] also says that a permutation of boomerang uniformity 4 needs to be
differentially 4-uniform, i.e., βF= 4 implies δF= 4. There are several results[3, 16, 19] about
the boomerang uniformity of the known differentially 4-uniform permutations. In [3, 16, 19],
some permutations having boomerang uniformity 4 are found when n2 (mod 4). However,
when n0 (mod 4), the lowest boomerang uniformity in the list is 6. Hence constructing a
permutation polynomial of boomerang uniformity 4 when 4 |nis still an open problem.
To construct a permutation with low boomerang uniformity, we investigate boomerang
uniformity of the known permutation polynomials. In particular, we consider permutation
polynomials of the form xrh(x(2n1)/d). Permutation polynomials of this form were first char-
acterized by Wan and Lidl[23], and have since been widely studied[2, 10, 11, 12, 13, 14, 15, 16,
17, 18, 21, 25, 27]. In this paper, we introduce efficient formulas to compute differential uni-
formity and boomerang uniformity of permutation polynomials of this form. These formulas
are more efficient when dis small. Since 3 |(2n1) for even n, we investigate permutation
polynomials of the form xrh(x(2n1)/3) for even n10. We also consider other important
cryptographic parameters like the extended Walsh spectrum, the nonlinearity, the differential
spectrum, and the boomerang spectrum for these permutation polynomials.
The rest of this paper is organized as follows. In section 2, we recall some known results
about permutation polynomials of the form xrh(x(2n1)/d ) and cryptographic properties includ-
ing the boomerang uniformity and the extended Walsh spectrum. In section 3, we give efficient
formulas for computing cryptographic parameters introduced in section 2 of permutation poly-
nomials of the form xrh(x(2n1)/d). In section 4, we investigate cryptographic parameters of
differentially 4-uniform permutations of the form xrh(x(2n1)/3) using our formulas obtained
in section 3, and we also investigate the differential uniformity of permutations of the form
xrh(x2n/21) in some recent papers for even n10. Finally we give a concluding remark in
section 5.
2
2 Preliminaries
2.1 Permutation polynomials of the form xrh(x(2n1)/d)
In this subsection, we focus on permutation polynomials of the form xrh(x(2n1)/d) introduced
by Wan and Lidl[23]. We first introduce the following notations which are also used in [23].
Definition 1. (Definition 1.1 of [23]) Let d|(2n1) and gbe a fixed primitive root of F2n.
Let ωd=g(2n1)/d be a primitive d-th root of unity in F2n. A map ψ:F
2n7→ (Z/dZ)+defined
by
ψ(a)Indg(a) (mod d)
where Indg(a)is the residue class (bmod (2n1)) such that a=gb.
Note that the following equation holds.
a(2n1)/d =ωψ(a)
d
With these notations, the following main theorem of [23] gives a characterization of permutation
polynomials of the form xrh(x(2n1)/d).
Theorem 1. (Theorem 1.2 of [23]) Let rbe a positive integer, dbe a positive divisor of 2n1.
Let h(x)F2n[x]. Then the polynomial F(x) = xrh(x(2n1)/d)is a permutation polynomial of
F2nif and only if the following conditions are satisfied :
(i) gcd(r, (2n1)/d)=1.
(ii) h(ωi)̸= 0 for all 0i < d.
(iii) ψh(ωi)
h(ωj)̸≡ r(ji) (mod d)for all 0i < j < d.
Park and Lee[21] introduced a simpler characterization of these permutation polynomials.
This result is also found in [1, 24, 27].
Theorem 2. (Lemma 2.1 of [27]) Let rbe a positive integer, dbe a positive divisor of 2n1
and µd={αF
2n:αd= 1}. Let h(x)F2n[x]. Then the polynomial F(x) = xrh(x(2n1)/d)
is a permutation polynomial of F2nif and only if the following conditions are satisfied :
(i) gcd(r, (2n1)/d)=1.
(ii) xrh(x)(2n1)/d permutes µd.
There are many results on the permutation polynomials of this form, and several recent
studies [2, 10, 11, 12, 13, 14, 15, 16, 17, 18] focus on the case d= 2n/2+ 1.
For any permutation polynomial, one can express the polynomial as the form xrh(x(2n1)/d)
for some rand d(see also Section 1 of [25]). This can be explained as follows. Let F(x) =
Xgcixdiwhere ci0 and di’s are distinct. Note that if Fhas a constant term then di= 0
for some i. Letting
d
F= gcd
i̸=j
(2n1, didj)
and dF= (2n1)/d
F, we can write F(x) = xrh(x(2n1)/dF) where r=difor some i. When F
is a monomial, we get d
F= 2n1 and dF= 1 which is the most efficient case.
3
2.2 Equivalent relations of Boolean functions
The followings definition contains some equivalence relations among the vectorial Boolean
functions on finite fields.
Definition 2. Let Fand Gbe functions defined on F2n.
(i) Fand Gare linear equivalent if F=L1GL2for some linear permutations L1and
L2.
(ii) Fand Gare affine equivalent if F=A1GA2for some affine permutations A1and
A2.
(iii) Fand Gare extended affine(EA) equivalent if F=A1GA2+A3for some affine
permutations A1and A2and an affine function A3.
The following equivalence, called CCZ-equivalence, was introduced in [6].
Definition 3. Let Fand Fbe functions defined on F2n. Denote GF={(x, F (x)) : xF2n}
and GF={(x, F (x)) : xF2n}. Then Fand Fare said to be CCZ-equivalent if there is
an affine permutation L:GF7→ GF.
The relation among the above mentioned equivalences are as follows; Linear equivalence
Affine equivalence EA equivalence CCZ-equivalence.
2.3 Boomerang uniformity
As mentioned in section 1, the boomerang uniformity of a permutation Fis defined as follows.
Definition 4. Let Fbe a permutation on F2n. We denote βF(a, b) (a, b F2n)by the number
of solutions of the following equation
F1(F(x) + a) + F1(F(x+b) + a) = b. (2)
The boomerang uniformity of Fis defined by
βF= max
a,bF
2n
βF(a, b).(3)
The boomerang uniformity is preserved under affine equivalence but is not preserved under
EA equivalence[3]. Furthermore Fand F1have the same boomerang uniformity[3] where
F1is the inverse permutation of F.
The authors of [16] consider the following system of equations.
Definition 5. Let Fbe a permutation on F2nand a, b F2n. We denote β
F(a, b)by the
number of solutions (x, y)of the following system
(F(x+a) + F(y+a) = b
F(x) + F(y) = b(4)
We also denote β
Fby
β
F= max
a,bF
2n
β
F(a, b).(5)
4
Then one has the following result on the boomerang uniformity[16].
Theorem 3. (Theorem 2.3 of [16]) The notations are same as those in Definition 4 and 5.
Then β
F=βF.
The key idea of Theorem 3 is
β
F(a, b) = βF1(a, b).(6)
Theorem 3 is useful when computing the boomerang uniformity of Fbecause F1is not used
in (4). However, since β
F(a, b) = βF1(a, b)̸=βF(a, b) in general, β
F(a, b) do not generate the
boomerang connectivity table[8] of F, the table of βF(a, b) for all a, b F2n.
2.4 Other notions of Boolean functions
In this subsection, we introduce some invariants of vectorial Boolean functions.
Definition 6 (Walsh Transform).Let a, b F2nand Fbe a function on F2n. Then
λF(a, b) = X
xF2n
(1)T r(ax+bF (x))
is called the Walsh transform of F, where T r (x) =
n1
X
i=0
x2ifor all xF2n.
Definition 7 ((Extended) Walsh Spectrum).Let Fa function defined on F2n.
(i) The multiset ΛF={λF(a, b) : aF2n, b F
2n}is called the Walsh spectrum of F.
(ii) The multiset Λ
F={|λF(a, b)|:aF2n, b F
2n}is called the extended Walsh spectrum
of F.
The nonlinearity can be defined using the notion of the Walsh transform.
Definition 8 (Nonlinearity).Let Fbe a function on F2nand
λF= max
aF2n,bF
2n
|λF(a, b)|(7)
be the maximum value in Λ
F. Then the nonlinearity of Fis defined by
N L(F)=2n11
2λF.(8)
Next we introduce another cryptographic parameter of Boolean functions related with the
differential uniformity.
Definition 9 (Differential Spectrum).Let Fbe a function defined on F2n. The multiset
DF={δF(a, b) : aF
2n, b F2n}
is called the differential spectrum of F.
It is known that if two functions Fand Fare CCZ-equivalent then Fand Fhave the
same extended Walsh spectrum, nonlinearity, and differential spectrum.
5
3 Efficient formulas for computing cryptographic parameters
of F(x) = xrh(x(2n1)/d)
Throughout this section, we fix F(x) = xrh(x(2n1)/d)F2n[x] for some h(x)F2n[x] where
ris an integer and dis a divisor of 2n1. We will present efficient formulas for computing the
differential uniformity, the differential spectrum, the boomerang uniformity, the Walsh trans-
form, the extended Walsh spectrum, and the nonlinearity of F(x). The introduced formulas
are efficient for small d.
3.1 The differential uniformity
In this subsection, an efficient formula for δFof F(x) = xrh(x(2n1)/d) is proposed. First we
introduce the the following result in [7].
Theorem 4. (Theorem 6 of [7]) Let µd={αF
2n:αd= 1}be the cyclic subgroup of order
din F
2n. If gcd(d, (2n1)/d) = 1 then differential uniformity of Fcan be computed by
δF= max
aµd,bF2nδF(a, b).(9)
We would like to extend the above result to the case gcd(d, (2n1)/d)>1. First we prove
the following lemma which is used in the proof of Theorem 5 and Theorem 8.
Lemma 1. If ψa
a= 0 equivalently a
a(2n1)/d
= 1 where a, aF
2n, then
Fa
ax=a
ar
F(x)
for all xF2n.
Proof. Since ψa
a= 0, we get ψa
ax=ψa
a+ψ(x) = ψ(x). Since F(x) = xrh(ωψ(x)),
we get
Fa
ax=a
axr
hωψa
ax=a
ar
xrh(ωψ(x)) = a
ar
F(x).
Theorem 5. Under the same condition as in Lemma 1 and for bF2n,
δF(a, b) = δFa,a
ar
b.
Proof. Suppose that yis a solution of F(x) + F(x+a) = b. By Lemma 1,
Fa
ay+Fa
ay+a=Fa
ay+Fa
a(y+a)
=a
ar
(F(y) + F(y+a)) = a
ar
b
6
Thus a
ayis a solution of
F(x) + F(x+a) = a
ar
b. (10)
This shows that there is a bijection between the set of solutions of F(x) + F(x+a) = band
the set of solutions of (10). Therefore, F(x) + F(x+a) = band (10) have same number of
solutions, which completes the proof.
The above theorem shows that for fixed a, aF
2nwith ψ(a) = ψ(a) the following is
satisfied
{δF(a, b) : bF2n}=δFa,a
ar
b:bF2n={δF(a, b) : bF2n}.
The second equality comes from the fact that b7→ a
ar
bis bijective. Let aibe any repre-
sentative element of the set
Ψi={aF
2n:ψ(a) = i}
for each 0 i<d. Suppose that we have already computed δF(ai, b) for all bF2nand
0i<d. Then for all aΨiand bF2n, we get
δF(a, b) = δFai,ai
arb(11)
from Theorem 5. Since giΨifor each 0 i < d, where gis a primitive root of F2n,
Rd={gi: 0 i<d}
can be an example of such set consisting of representative element of Ψi. Considering Rdas
the representative set, (11) is rewritten as
δF(a, b) = δFgi,gi
ar
b,(12)
and we also get the following corollary.
Corollary 1. The differential uniformity of Fcan be computed by
δF= max
aRd,bF2nδF(a, b).(13)
If we apply (1) for computing the differential uniformity, then we need to consider all
aF
2n, while we only need to consider aRdusing (13). Therefore our reduced search space
is only d/(2n1) of the original search space. In a similar way, we get another corollary which
is useful for computing the differential spectrum of F(x).
Corollary 2. For c∈ DF, let
DF,c ={(a, b)F
2n×F2n:δF(a, b) = c},
DF,c,d ={(a, b)Rd×F2n:δF(a, b) = c}.
Then we have
#DF,c,d = #DF,c ·d/(2n1).
7
Hence we can compute the differential spectrum of Fefficiently by computing the multiset
{δF(a, b) : aRd, b F
2n}
first and apply Corollary 2 to compute the multiplicity of each element in the above set.
Next we consider a special family of permutation polynomials of the form xrh(x(2n1)/d).
For an integer k, we denote νd(k) such that dvd(k)|kbut dvd(k)+1 k. Suppose that dis a
prime and gcd(d, (2n1)/d) = d, and then νd(2n1) >1. Now we consider the polynomials
G(x) = xr(x(2n1)/d +ξ).(14)
where ξµdνd(2n1) \µd. First we prove that G(x) is a permutation polynomial for some
special cases.
Theorem 6. Let d= 3 and gcd(3,(2n1)/3) = 3, that is, 6|n. If gcd(r, (2n1)/3) = 1 and
ξis a primitive 9-th root of unity, then G(x)is a permutation polynomial.
Proof. By Theorem 2, it remains to show that G(x) = xr(x+ξ)(2n1)/3permutes µ3. Since
ξ6+ξ3+ 1 = 0,
(ξ2+ξ)7=ξ14 +ξ13 +ξ12 +ξ11 +ξ10 +ξ9+ξ8+ξ7
=ξ12 +ξ9+ (ξ6+ξ3+ 1)(ξ8+ξ7) = ξ3+ 1 = ξ6
and hence we get (ξ2+ξ)21 = 1. Since (2n1)/3 is divisible by (261)/3 = 21 when 6|n, we
get
(ξ2+ξ)(2n1)/3=ξ(2n1)/3(ξ+ 1)(2n1)/3= 1.(15)
For convenience, we denote ω3=ξ3. Observe that
G(1) = (ξ+ 1)(2n1)/3
G(ω3) = ωr
3(ω3+ξ)(2n1)/3=ωr
3(ξ3+ξ)(2n1)/3=ωr
3ξ(2n1)/3(ξ2+ 1)(2n1)/3
=ωr
3ξ(2n1)/3(ξ+ 1)(2n1)/32=
(15) ωr
3(ξ+ 1)(2n1)/3
G(ω2
3) = ω2r
3(ω2
3+ξ)(2n1)/3=ω2r
3(ξ6+ξ10)(2n1)/3=ω2r
3(ξ6+ξ10)(2n1)/3
=ω2r
3(1 + ξ4)(2n1)/3=ω2r
3(1 + ξ)(2n1)/34=ω2r
3(ξ+ 1)(2n1)/3
and hence if gcd(r, (2n1)/3) = 1 then G(x) permutes µ3, which completes the proof.
We would like to show that the formula (13) in Corollary 1 for G(x) can be further simpli-
fied. First we prove the following lemma.
Lemma 2. Let ρF2nbe a primitive dνd(2n1)-th root of unity. If 2 is a primitive root mod
Ord(ξ), then
δG(ρj, b) = δG 1,ρj(r+(2n1)/d)b2nkj!
for some integer kjfor every 0< j < d.
8
Proof. Let xbe a solution of b=G(x) + G(x+ρj), that is,
b=G(x) + G(x+ρj) = xr+(2n1)/d +ξxr+ (x+ρj)r+(2n1)/d +ξ(x+ρj)r
Substitute x=ρjyinto the above equation we get
b= (ρjy)r+(2n1)/d +ξ(ρjy)r+ (ρjy+ρj)r+(2n1)/d +ξ(ρjy+ρj)i·(2n1)/d1
=ρj(r+(2n1)/d)yr+(2n1)/d +ξρj(2n1)/d yr+ (y+ 1)r+(2n1)/d +ξρj(2n1)/d (y+ 1)r
Hence we get
ρj(r+(2n1)/d)b=yr+(2n1)/d +ξρj(2n1)/d yr+ (y+ 1)r+(2n1)/d +ξρj(2n1)/d (y+ 1)r
Since ρj(2n1)/d µd, we get ξρj(2n1)/d µOrd(ξ)\µd. Since 2 is a primitive root mod
Ord(ξ), there is an integer kjsuch that ξ2kj=ξρj(2n1)/d. Raising 2nkj-th power to the last
equation, we get
ρj(r+(2n1)/d)b2nkj
= (y2nkj)r+(2n1)/d+ξ(y2nkj)r+(y2nkj+1)r+(2n1)/d +ξ(y2nkj+1)r
Hence z=y2nkj= (ρjx)2nkjis a solution of G(z) + G(z+ 1) = ρj(r+(2n1)/d)b2nkj.
Theorem 7. Under the same condition as in Lemma 2,
δG= max
bF2nδG(1, b).(16)
It is clear that we can set Rd={1}for computing the differential spectrum of G(x) in
Corollary 2.
3.2 The boomerang uniformity
For boomerang uniformity, we can derive similar theorem and formula to previous subsection.
We only consider the case for β
F.
Theorem 8. Suppose F(x)is a permutation. Let a, aF
2nand bF2n.If ψa
a= 0
equivalently a
a(2n1)/d
= 1, then
β
F(a, b) = β
Fa,a
ar
b.
Proof. Suppose that (x, y)=(x0, y0) is a solution of (4). By Lemma 1, we get
Fa
ax0+a+Fa
ay0+a=Fa
a(x0+a)+Fa
a(y0+a)
=a
ar
(F(x0+a) + F(y0+a)) = a
ar
b,
9
and also
Fa
ax0+Fa
ay0=a
ar
(F(x0) + F(y0)) = a
ar
b.
Thus (x, y) = a
ax0,a
ay0is a solution of
F(x+a) + F(y+a) = a
ar
b
F(x) + F(y) = a
ar
b
(17)
This shows that there is a bijection between the solutions of (4) and the solutions of (17).
Therefore, (4) and (17) have same number of solutions, which completes the proof.
Applying Theorem 3 and Theorem 8, we get the following.
Corollary 3. The boomerang uniformity of Fcan be computed by
βF= max
aRd,bF
2n
β
F(a, b).(18)
In Corollary 2, we used the formula (12) to compute the differential spectrum efficiently. We
can apply similar argument for the boomerang uniformity. We define the boomerang spectrum
of a permutation F. Since βF(a, b) = qwhen a= 0 or b= 0, we exclude these cases in the
definition of the boomerang spectrum.
Definition 10 (Boomerang Spectrum).For any permutation Fon F2n, the boomerang spec-
trum of Fis defined as the multiset
BF={βF(a, b) : a, b F
2n}.
It is shown[3] that if two permutations Fand Fdefined on F2nare boomerang equivalent,
then BF=BF. If we denote
B
F={β
F(a, b) : a, b F
2n},
then we can easily see that B
F=BFfrom (6). Note that the boomerang spectra of some
S-boxes including AES(Advanced Encryption Standards) S-box were investigated in [8]. Now
we have the following analogue to Corollary 2.
Corollary 4. Suppose F(x)is a permutation. For c∈ BF, we denote that
B
F,c ={(a, b)F
2n×F2n:β
F(a, b) = c}
B
F,c,d ={(a, b)Rd×F2n:β
F(a, b) = c}
Then we see that
#B
F,c = #B
F,c,d ·(2n1)/d.
Hence we can compute the boomerang spectrum of Fefficiently by computing the multiset
{βF(a, b) : aRd, b F
2n}
first and apply Corollary 4 to compute the multiplicity of each element in the above set.
10
3.3 The extended Walsh spectrum
The result for the Walsh spectrum is similar, though the proof technique is slightly different
from Section 3.1 and Section 3.2.
Theorem 9. Let b, bF
2nand aF2n. If ψb
b= 0 equivalently b
b(2n1)/d
= 1, then
λF(a, b) = λF b
br
a, b!.
where rr1 (mod (2n1)/d).
Proof. By Lemma 1,
ax +bF (x) = b
brb
br
ax +b·b
bF(x) = b
br
a b
br
x!+bF b
br
x!.
Since {(b/b)r
x:xF2n}=F2n, we obtain
λF(a, b) = X
xF2n
(1)T r(ax+bF (x)) =X
xF2n
(1)T r(b/b)r
a(b/b)r
x+bF(b/b)r
x
=X
(b/b)rxF2n
(1)T r(b/b)r
a(b/b)r
x+bF(b/b)r
x
=X
xF2n
(1)T r(b/b)r
ax+bF(x)=λF b
br
a, b!
which completes the proof.
From Theorem 9, we get
λF(a, b) = λF gi
br
a, gi!.(19)
Corollary 5. For cΛF, we denote that
ΛF,c ={(a, b)F2n×F
2n:λF(a, b) = c},ΛF,c,d ={(a, b)F2n×Rd:λF(a, b) = c},
Λ
F,|c|={(a, b)F2n×F
2n:λ
F(a, b) = |c|},Λ
F,|c|,d ={(a, b)F2n×Rd:λ
F(a, b) = |c|}
Then we see that
F,c = #ΛF,c,d ·(2n1)/d and
F,|c|= #Λ
F,|c|,d ·(2n1)/d.
Hence we can compute the Walsh spectrum and the extended Walsh spectrum of F(x)
efficiently by computing the multisets
{λF(a, b) : aF2n, b Rd}and {|λF(a, b)|:aF2n, b Rd}
first and apply Corollary 5 to compute the multiplicity of each element in the above sets,
respectively. The nonlinearity of F(x) can also be efficiently computed using Theorem 9.
11
Corollary 6. The nonlinearity of F(x)is given as
N L(F)=2n11
2max
aF2n,bRd
|λF(a, b)|.(20)
4 Numerical results for even n
4.1 A complete investigating for the case d= 3 when n12
It is well studied about the permutations of low boomerang uniformity including APN permu-
tations over F2nfor odd n. But the same topic on even nis not well studied yet. Especially
there is no known permutation polynomial of the boomerang uniformity at most 4 over F2n
when 4 |n. Since a permutation of the boomerang uniformity 4 is differentially 4-uniform, it is
worth to investigate the boomerang uniformity of differentially 4-uniform permutations. The
boomerang uniformity of power permutation Fwith δF= 4 is considered in [16]. Hence we
consider the second smallest case d= 3 in this section since 3 |(2n1) for every even n. A
complete investigating is the most inefficient method, but it is also the most obvious method.
And we can expect to offset this inefficiency by applying our formulas proposed in section 3.
4.1.1 Permutation binomials
We investigate the permutation binomials of the form
F(x) = xr(x(2n1)/3+gk) (21)
where 0 k < 2n1, when 4 n10 is even.
Reducing target space
As already mentioned in Section 2, it is known that the differential uniformity and the
extended Walsh spectrum are invariant under CCZ-equivalence and the boomerang uniformity
is invariant under affine equivalence and inversion. Therefore, if we know that some polynomials
have this equivalence, it is sufficient to investigate one of them as a representative. We first
introduce a corollary of the result about compositional inverse of F(x) in [18].
Theorem 10. ([18]) Let F(x) = xrh(x(2n1)/d). Then the compositional inverse of Fcan be
expressed as
F1(x) = xrh(x(2n1)/d)
where rr1 (mod (2n1)/d)and for some h(x)F2n[x].
Next we get the following linear equivalence.
Proposition 1. Let F(x) = xr(x(2n1)/3+gk).
(i) Let rr·2i(mod 2n1) be an element of the cyclotomic coset of r(mod 2n1). Then
F(x)is linear equivalent to
(xr(x(2n1)/3+gk)for even i
xr(2n1)/3(x(2n1)/3+gk)for odd i
12
for some k.
(ii) If kis contained in the same cyclotomic coset with k, then F(x) = xr(x(2n1)/3+gk)is
linear equivalent to F(x).
Proof. (i) We have (F(x))2i=x2i·r(x2i·(2n1)/3+gk·2i) = xr(x(1)i·(2n1)/3+gk·2i). If iis
even, then F(x) is linear equivalent to xr(x(2n1)/3+gk·2i). If iis odd, then
(F(x))2i=xr(x(2n1)/3+gk·2i) = gk·2ixr(2n1)/3(x(2n1)/3+g2n1k·2i),
thus F(x) is linear equivalent to xr(2n1)/3(x(2n1)/3+g2n1k·2i).
(ii) Let kk·2j(mod 2n1) for some 0 j < n. For L1(x) = x2jand L2(x) = x2nj, we
can see that F(x) = (L1FL2)(x).
A detail process to select a target space for our experiments is in Algorithm 1. By Propo-
sition 1, we consider a representative set of cyclotomic cosets mod (2n1)/3. We also apply
Theorem 10 in step 6-7. Note that ralr and kalr indicate whether there is an element that has
equivalence mentioned in Proposition 1 or Theorem 10 in Crand Ck, respectively.
Algorithm 1
Input : An even integer n
Output : Target space
1: Cr← {}, Ck← {}
2: for odd kfrom 1 to (2n1)/3do
3: ralr 0, kalr 0, i 0
4: while kalr = 0 and i<ndo
5: kk·2i(mod (2n1)/3)
6: if gcd(k,(2n1)/3) = 1 do
7: Compute 0 < r<(2n1)/3 such that kr1 (mod (2n1)/3)
8: if kor rbelong to Crdo
9: ralr = 1
10: if kbelong to Ckdo
11: kalr = 1
12: ii+ 1
13: if gcd(k, (2n1)/3) = 1 and ralr = 0 do
14: add kin Cr
15: if kalr = 0 do
16: add kin Ck
17: return {r+i(2n1)/d :rCr,0i<d} × Ck
Remark 1. By Theorem 10, when r≡ −1 (mod (2n1)/3), the inverse of xrh(x(2n1)/3)is
also of the form xrh(x(2n1)/3), that is, r=r. But we do not consider this property when
we generate a target space by Algorithm 1. In our experimental results if two permutation
polynomials have the same differential and boomerang spectrum and the same extended Walsh
spectrum, then we investigate that one is linear equivalent to the inverse of the another. Note
that some permutations are linear equivalent to their own inverse, for example F6,2,1(x)below.
13
Our experiments
For each even nwith 6 n12, we have the following experiments for all (r, k) in target
space generated by Algorithm 1.
Check whether F(x) is a permutation or not. Note that we can use Theorem 2.
If F(x) is a permutation, then check whether F(x) is differentially 4-uniform or not using
the formula (13).
If F(x) is differentially 4-uniform, then compute other cryptographic parameters includ-
ing βFusing the formulas in Section 3.
Unfortunately, as already mentioned in [7], there is no differentially 4-uniform permutation
binomial of the form (21) when n= 4,8,10,12. However, we find the following 3 differentially
4-uniform permutation binomials in F26. Cryptographic parameters of those differentially
4-uniform permutation binomials are described in Table 1. We denote these binomials as
F6,2,i(x).
i(r, k)DF6,2,i BF6,2,i Λ
F6,2,i
1 (20,7) {02268,21512,4252} {01953 ,21386,4378,6378 ,8126} {01512 ,82016,16504}
2 (41,7) {02394,21260,4378} {01890 ,2882,4882,6252 ,1263} {0819 ,41386,81008,12504 ,16189,20126 }
3 (62,7) {02394,21260,4378} {01890 ,2882,4882,6252 ,1263} {0819 ,41386,81008,12504 ,16189,20126 }
Table 1: Differentially 4-uniform binomials F6,2,i when n= 6
According to Remark 1, we confirm that F6,2,1is linear equivalent to its inverse, and F6,2,2
is linear equivalent to F1
6,2,3. Note that all F6,2,i(x) are of the form G(x) in Eq. (14).
4.1.2 Permutation trinomials
We investigate the permutation trinomials of the form
F(x) = xr(x2(2n1)/3+gkx(2n1)/3+gl) (22)
where 0 k, l < 2n1, when 6 n12 is even.
Reducing target space
Similar with the binomial case, we have the following linear equivalence among those poly-
nomials.
Proposition 2. Let F(x) = xr(x2(2n1)/3+gkx(2n1)/3+gl).
(i) If rr·2i(mod (2n1)/3) for some i, then F(x)is linear equivalent to xrh(x(2n1)/3)
for some h(x)F2n[x].
(ii) Let Ck,l ={(k·2i, l ·2i) (mod 2n1) : 0 i<n}and (k, l)Ck,l. Then
F(x) = xr(x2(2n1)/3+gkx(2n1)/3+gl)
14
is linear equivalent to F(x).
(iii) Let
F1(x) = xr(x2(2n1)/3+gk(2n1)/3x(2n1)/3+gl+(2n1)/3),
F2(x) = xr(x2(2n1)/3+gk+(2n1)/3x(2n1)/3+gl(2n1)/3).
Then F1(x)and F2(x)are linear equivalent to F(x).
Proof. If F(x) is of the form (22), then the exponents of monomials of F(x) belong in the
same class under modulo (2n1)/3. Thus we may write F(x) = xrh(x(2n1)/3) for some
h(x)F2n[x] where 0 r < (2n1)/3.
(i) We have (F(x))2i=x2i·r(x2i+1·(2n1)/3+gk·2ix2i·(2n1)/3+gl·2i). Thus we can express
(F(x))2i=xrh(x(2n1)/3) for some h(x)F2n[x], and F(x) is linear equivalent to xrh(x(2n1)/3).
(ii) Write (k, l)(k·2j, l ·2j) (mod 2n1) for some 0 j < n. For L1(x) = x2jand
L2(x) = x2nj, we can see that F(x)=(L1FL2)(x).
(iii) Let L3(x) = gx,L4(x) = g(2n1)/3rx,L5(x) = g2x, and L6(x) = g2(2n1)/32rx. Then
F1(x)=(L4FL3)(x) and F2(x)=(L6FL5)(x).
Proposition 2 shows that we can select target space of (r, k, l) for our experiments by
Cr×Ck× {0,· · · ,2n2}, where Crand Ckare in Algorithm 1. But the case k= 0 is not
contained in this target space. (In the case of binomials, if k= 0 then F(x) in Eq. (21)
cannot be a permutation by Theorem 2. Hence we reject the case k= 0 from initial process
for binomial case.) We generate Clbe a representative set of cyclotomic cosets mod 2n1.
Then the target space of our experiments for trinomials is
Cr×((Ck× {0,· · · ,2n2})({0} × Cl)) .
Our experiments
For each even nwith 6 n12, we have similar experiments in Section 4.1.1 for all
(r, k, l) in target space mentioned above.
The case n= 6
When n= 6, we get 11 differentially 4-uniform permutation trinomials only for r=
(2n1)/31 = 20. We consider Remark 1 to get the following 6 CCZ-inequivalent dif-
ferentially 4-uniform permutation trinomials. Table 2 contains cryptographic parameters of
those differentially 4-uniform permutation trinomials, denoted by F6,3,i. Note that F6,3,5and
F6,3,6are involutions, they do not belong our target space but we find that our some permuta-
tion polynomials are linear equivalent to these involutions. Note that F6,3,1is linear equivalent
to its inverse.
The case n= 8
When n= 8, we get 7 differentially 4-uniform permutation trinomials. See Table 3 for
details. We confirm that 2 permutation trinomials for r= (2n1)/3 = 84 are linear equivalent
15
i(k, l)DF6,3,i BF6,3,i Λ
F6,3,i
1 (0,11) {02457,21134,4441} {01848 ,2924,4882,6189,8105,1021 } {0,4,8,12,16,20,24}
2 (1,8) {02394,21260,4378} {01869 ,21050,4756,6210,884} {0,4,8,12,16,24}
3 (5,28) {02394,21260,4378} {01932 ,2987,4714,6252,863,1021 } {0,4,8,12,16,20,24}
4 (7,14) {02457,21134,4441} {01890 ,21008,4819,8126,10126} {0,4,8,12,16,20}
5 (13,13) {02331,21386,4315} {01974 ,21239,4483,6105,8105,1042 ,1221} {0,4,8,12,16,20,24}
6 (61,31) {02520,21008,4504} {02037 ,2714,4777,6210,884,1084 ,1263} {0,4,8,12,16,20,24}
Table 2: Differentially 4-uniform permutation trinomials F6,3,i when n= 6
to the inverse of each other, and hence we omit one of them in Table 3. Though F8,3,3and
F8,3,6have the same differential spectrum and the same extended Walsh spectrum, we cannot
confirm their CCZ-equivalence, nor the equivalence between F8,3,4and F8,3,5. Nevertheless, we
find at least 4 CCZ-inequivalent differentially 4-uniform trinomials for the case n= 8. Note
that we apply F28=F2[x]/(x8+x4+x3+x2+ 1), the SageMath default finite field of 28
elements which is not exactly same with the base field of AES F2[x]/(x8+x4+x3+x+ 1).
i(r, k, l)DF8,3,i BF8,3,i Λ
F8,3,i
1 (84,1,159) {037230,223460 ,44590} {031450 ,220655 ,49435,62635 ,8680,10170 } {4j: 0 j11}
2 (3,3,16) {036975,223970 ,44335} {032555 ,220145 ,47990,63655 ,8510,10170 } {024140 ,1633235,327820 ,4885}
3 (3,3,107) {035955,226010 ,43315} {032555 ,222950 ,46290,62805 ,8170,10255 } {022950 ,1634680,327650 }
4 (3,13,155) {035190,227540 ,42550} {032130 ,225840 ,44845,61615 ,8510,1085 } {021420 ,1636720,327140 }
5 (3,15,123) {035190,227540 ,42550} {031875 ,225755 ,45440,61785 ,885,1285 } {021420 ,1636720,327140 }
6 (3,29,39) {035955,226010 ,43315} {032470 ,223035 ,46205,62890 ,8340,1085 } {022950 ,1634680,327650 }
Table 3: Differentially 4-uniform permutation trinomials F8,3,i when n= 8
The cases n= 10 and n= 12
Unfortunately, when n= 10 and n= 12, we cannot find any differentially 4-uniform
permutation trinomials of the form (22). It takes 405 seconds and 42822 seconds(about 12
hours) for thess experiments for the case n= 10 and n= 12, respectively, using SageMath
performed on Intel Core i7-4770 3.40GHz with 8GB memory. Therefore, the same experiment
for the case n= 14 seems to be possible in several days, but we do not run this experiment
because expected experimental result is not optimistic like the cases n= 10 and n= 12.
4.1.3 Differentially 6-uniform permutation polynomials
Based on the experimental results in the above subsections, we can see that there is no APN
permutation of the form xrh(x(2n1)/3) and differentially 4-uniform permutation polybomials
of this form are very rare. Hence we also try the same experiments with the above subsections
for differentially 6-uniform permutation binomials and trinomials of the form xrh(x(2n1)/3).
We compute the differential spectrum and the extended Walsh specturm of differentially 6-
uniform permutation polynomials of the form xrh(x(2n1)/3), and count the number of CCZ-
inequivalent classes of differentially 6-uniform permutation binomials and trinomials that can
16
be distinguished by differential spectrum or extended Walsh spectrum, when 6 n12. The
results of these experiments are summarized in Table 4.
n6 8 10 12
# of binomials Fwith δF= 6 1 5 7 8
# of binomials Fwith δF= 6 when r≡ −1 1 2 5 7
# of trinomials Fwith δF= 6 11 615 1779 1618
# of trinomials Fwith δF= 6 when r≡ −1 11 141 1005 1615
Table 4: The number of CCZ-inequivalent differentially 6-uniform permutation polynomials
when 6 n12
In particular, we also indicate the number of differentially 6-uniform binomials and tri-
nomials obtained in the case r≡ −1 (mod (2n1)/3) in the second row and the forth row
of Table 4, respectively. We can see that many differentially 6-uniform permutation polyno-
mials of this form are in the case r≡ −1 (mod (2n1)/3). Especially for n= 12, only
one binomial and 3 trinomials are not in this case. Moreover, we can see that the number
of differentially 6-uniform permutation polynomials for r≡ −1 (mod (2n1)/3) is signifi-
cantly larger than the number of differentially 6-uniform permutation polynomials for r̸≡ −1
(mod (2n1)/3), when n= 10,12. Hence we may conjecture that permutation polynomials
of this form in the case r≡ −1 (mod (2n1)/3) have lower differential uniformity than the
case r̸≡ −1 (mod (2n1)/3) in average. In next subsection we give some heuristic analysis
for this conjecture.
4.2 Some Heuristic Analysis
In previous subsection, we can see that the differential uniformity for the case r≡ −1
(mod (2n1)/d) is relatively smaller than the case r̸≡ −1 (mod (2n1)/d). We can easily
see that there are the following upper bound of the differential uniformity of Fwhen r≡ −1
(mod (2n1)/d).
Theorem 11. Let F(x) = xrh(x(2n1)/d)where r≡ −1 (mod (2n1)/d). Then δF2d2+ 2.
Proof. For convenience we fix r= 2n2. Let F(x) = x2n2h(x(2n1)/d) and denote
Wa,i,j ={xF2n:ψ(x) = i, ψ(x+a) = j}
for a̸= 0 and 0 i, j < d. If xWa,i,j is a solution of F(x) + F(x+a) = bthen it is also
a solution of x2n2h(ωi
d) + (x+a)2n2h(ωj
d) = b. Then, it is also a solution ofthe following
quadratic equation
Qa,b,i,j(x) = bx2+h(ωi
d) + h(ωj
d) + abx+ah(ωi
d) = 0.(23)
Since there are d2equations Qa,b,i,j(x) = 0(0 i, j < d), there are at most 2d2possible
solutions. When b=F(a) there is an exceptional case that x= 0, a are also solutions of
F(x) + F(x+a) = F(a) but 0, a ̸∈ Wa,i,j for any 0 i, j < d. Together with solutions of
Eq.(23) we get δF(a, F (a)) 2d2+ 2. If b̸=F(a), we get δF(a, b)2d2.
17
By Theorem 11, we can express F(x) + F(x+a) = bas a quadratic equation Qa,b,i,j(x)=0
for each 0 i, j < d when r1 (mod (2n1)/3). Since we can express F(x) = xrh(ωψ(x)
d),
if i=jthen F(x) + F(x+a) = bcan be expressed by xr+ (x+a)r=b·h(ωi
d)1which is
related with δxra, b h(ωi
d)1. Hence if xrhas low differential uniformity, then the above
equation has small number of solutions. But if r̸≡ −1 (mod (2n1)/3) and i̸=jthen it is
not easy to apply the similar argument with r≡ −1 (mod (2n1)/3) and i̸=j. For example,
it is well known that x3is APN for all n. For the case r= 3, we get a quadratic equation for
each case i=j, but we get a cubic equation for each case i̸=j. Hence we cannot apply same
arguement in Theorem 11 for the case r= 3.
Next we propose a heuristic analysis to compute an expected value of δFfor the case r≡ −1
(mod (2n1)/3). If b̸=F(a) then by Theorem 11 we can see that
δF(a, b) = X
i,j
|{xF2n:Qa,b,i,j(x) = 0} ∩ Wa,i,j |.
For each 0 i, j < d, we first check whether Qa,b,i,j(x) = 0 is solvable or not. If Qa,b,i,j (x) = 0
is solvable, we check each solution is contained in Wa,i,j or not. We assume that Wa,i,j’s are
uniformly distributed in F2n\ {0, a}and hence we apply the probability that each element in
F2n\ {0, a}is contained in each Wa,i,j by 1/d2. Also, we assume that each quadratic equation
Qa,b,i,j(x) = 0 is solvable with same probability 1/2. We denote
Da,b(k) = P r
X
0i,j<d
|{xFq:Qa,b,i,j(x)=0} ∩ Wa,i,j |=k
Ua,b(k) = P r
X
0i,j<d
|{xFq:Qa,b,i,j(x)=0} ∩ Wa,i,j | ≤ k
=
k/2
X
i=0
Da,b(2i)
that are computed under these assumptions. Then, we can compute that
P r(δFk) = Y
aRd,bFq
Ua,b(k)
P r(δF=k) = P r(δFk)P r (δFk2) = Y
aRd,bFq
Ua,b(k)Y
aRd,bFq
Ua,b(k2) (24)
We compare this heuristic analysis with actual experimental results in previous section
for trinomials of the form x(2n1)/31h(x(2n1)/3). This heuristic analysis does not meet with
actual experimental results (see Table 5 for n= 10). But this analysis is not ridiculous because
expected values given by (24) are somewhat similar with actual average(see Table 6).
We do not investigate for the cases n14 because it is expected to be difficult to compute.
We apply the expected value of δFobtained by this heuristic analysis to guess existence of
Fwith low differential uniformity. We summarize the expected value computed by (24) for
n14 in Table 7. When n= 14 or n= 16, the expected value of δFis not much larger than
the expected value of δFwhen n= 12 in Table 6. Since there are 1626 differentially 6-uniform
trinomials when n= 12(see Table 4), we can expect there may exist differentially 6-uniform
18
k4 6 8 10 12 14 16 18
Permutations 0 2136 2207 1850 1796 390 66 5
Actual Prob 0 0.2528 0.2612 0.2189 0.2125 0.0462 0.0078 0.0006
(24) 1.12 ×1018 0.0139 0.7127 0.2565 0.0162 0.0006 1.45 ×1081.83 ×107
Table 5: Comparison of heuristic analysis and actual data for trinomials when n= 10
n6 8 10 12
Average of δF7.16 7.93 9.12 10.32
Expected value from (24) 6.52 7.53 8.55 9.56
Table 6: Comparison of expected value and actual average of δFfor trinomials when 6 n12
permutation polynomials of the form x(2n1)/31h(x(2n1)/3) when n= 14 or n= 16. We
also note that we obtain that the expected value of δFis larger than 18 when n38. Hence
we guess that almost all permutation polynomials of this form archieve the upperbound of
differential uniformity in Theorem 11.
n14 16 18 20 22 24 26 28
Expected value from (24) 10.46 11.36 12.25 12.91 13.90 14.37 15.12 15.98
Table 7: Expected value of δFwhen n14
Next we consider G(x) in Eq. (14) with d= 3 and r≡ −1 (mod (2n1)/3). We denote
them by
Gn,j,i(x) = xi(2n1)/31(x(2n1)/3+ξ)
where ξµ3νd(2n1) \µ3is a primitive 3j-th root of unity and 0 i < 3. Note that we showed
that each Gn,2,i(x) is a permutation polynomial in Theorem 6. It can be applied for the case
j > 2 if Eq. 15 holds, and we confirm that G18,3,i(x) is a permutation polynomial for each i.
By applying Theorem 2, (24) also can be simplified by
P r(δGn,j,i =k) = Y
bF2n
U1,b(k)Y
bF2n
U1,b(k2) (25)
We compare the expected value computed by Eq. (25) with actual differential uniformity
of Gn,j,i in Table 8. Expected value from (24) is less than expected value from (24), but is
significantly larger than actual differential uniformity of Gn,j,i.
4.3 The case d̸= 3
We also investigate the differential uniformity of permutation polynomials of the form xrh(xn/21)
discussed in some recent papers, see Table 9 for details. This is the case d= 2n/2+ 1 and we
19
(n, j, i) (6,2,-) (12,2,0) (12,2,1) (18,2,-) (18,3,-) (24,2,-)
δGn,j,i 4 6 8 8 8 8
Expected value from (25) 5.77 8.72 8.72 11.59 11.59 14.04
Table 8: Comparison of extended value and actual δGn,j,i
denote m=n/2 in Table 9 for convenience. Note that
F25(x) = x2n2m+2 +x2n3·2m+4 +x2n5·2m+6 +x2n7·2m+8 +x7·2m5+x5·2m3+x3·2m1,
F27(x) = x2n2m+2 +x2n5·2m+6 +x2n7·2m+8 +x7·2m5+x3·2m1
in Table 9, which are too long to be expressed in Table 9.
Polynomial Introduced in 6 8 10
x(2n1)/(2t1)+1 +αx (n= 2st,t=odd) Theorem 1.1 in [2] 4 lin. 4
x3·2m+1 +x2m+3 +x4Theorem 3.1 in [10] 16 34
x3·2m1+x2m+1 +x2Theorem 3.3 in [10] 16 34
x2m+2+1 +x2m+4 +x5Theorem 3.4 in [10] 16 64
x2m+21+x3·2m+x3Theorem 3.5 in [10] 16 44
x3·2m2+αx Theorem B in [11] 10 34
x2m+11+αx2m+γx Theorem 1.1 in [12] 8 16 32
xs(2m1)+1 +xt(2m1)+1 +xTheorem 1 and 3 in [14] 16 10 64
x2n1+2m1+1 +x2m+xTheorem 4.7 in [15] 16 34
x2n1+2m1+1 +x2m+2 +xTheorem 4.8 in [15] 8 10
α2m1x2n2m+1 +αx2m+11+xTheorem 4.9 in [15] 14 32 62
x32m2+x2m+11+x2n2m+1 +x2n2m+1 +2 +xTheorem 3.9 in [17] 16 32 104
x2m+1x2(x2m1+x12m)2m2m/21Theorem 3.13 in [17] 28
x2m+1x2(x2m1+x2n2m)2(2m+1 2m/21)/3Theorem 3.15 in [17] 16
F25(x) Theorem 3.25 in [17] 16 16 36
F27(x) Theorem 3.27 in [17] 16 16 34
Table 9: Differential uniformity of some permutation polynomials for even 6 n10
We investigate the differential uniformity of those polynomials only when they are permu-
tations, thus if the differential uniformity is omitted in the table, then the polynomial in that
case is not a permutation. Please refer the cited papers for detailed conditions where each
polynomial in the first column is a permutation polynomial. From the table, we see that the
differential uniformity is not very low except the case in the first row when n2 (mod 4).
However, since n= 2tin this case, the polynomial is x2m+2 +αx. The differential unifor-
mity of this polynomial was already investigated in [26], and the boomerang uniformity was
investigated in [16]. We also computed the differential uniformity of these polynomial when
n= 12, which is not the case n2 (mod 4), but we get δF= 88. For the class of permutation
20
polynomials in [14], there are several pairs (s, t) that the corresponding polynomial is a per-
mutation, and the value in Table 9 is the minimal value of the differential uniformity of those
permutation polynomials for each n. Overall, it is not very optimistic to get a permutation
polynomial of low differential uniformity for the case d= 2m+ 1.
5 Conclusion
Compared with permutations having low differential uniformity, the permutations with low
boomerang uniformity are not well studied yet. Since a permutation of the boomerang uni-
formity 4 is also differentially 4-uniform, the study of the boomerang uniformity of the known
differentially 4-uniform permutations(see Table 1 in [9] for known differentially 4-uniform per-
mutations) is important. Our research in this paper focuses on this topic. In this paper,
we get efficient formulas for computing some cryptographic parameters (including boomerang
and differential uniformity) of permutation polynomials of the form xrh(x(2n1)/d). The com-
putational cost of our formulas is proportional to d. We tried our formulas to investigate
differentially 4-uniform permutations for d= 3 with even 6 n10, where 3 is the least
nontrivial factor dividing 2n1 for even n. For n= 4,8, we computed the boomerang unifor-
mity and the boomerang spectrum of differentially 4-uniform permutations using the suggested
formula which turned out to be rather large. We also investigated the differential uniformity
of some permutation polynomials for the case d= 2m+ 1 and found out that they are not
suitable for S-box construction.
Acknowledgement This research was supported by the National Research Foundation of
Korea (KRF) Grant funded by the Korea government (MSIP) (No. 2016R1A5A1008055)
Namhun Koo was supported by the National Research Foundation of Korea (NRF) grant
funded by the Korea government (MSIT) (No. 2021R1C1C2003888). Soonhak Kwon was
supported by the National Research Foundation of Korea (NRF) grant funded by the Korea
government (MSIT) (No. 2019R1F1A1058920 and No. 2021R1F1A1050721).
References
[1] A. Akbary, and Q. Wang, On Polynomials of the Form xrf(x(q1)/l), International
Journal of Mathematics and Mathematical Sciences, Vol. 2007, Article ID 23408.
https://doi.org/10.1155/2007/23408
[2] S. Bhattacharya, and S. Sarkar, On some permutation binomials and trinomials over F2n,
Des. Codes Cryptogr. 82(1-2) (2017) 149-160 https://doi.org/10.1007/s10623-016-0229-0
[3] C. Boura, and A. Canteaut, On the Boomerang Uniformity of Cryptographic
Sboxes. IACR Transactions on Symmetric Cryptology, 2018(3) (2018) 290-310.
https://doi.org/10.13154/tosc.v2018.i3.290-310
[4] C. Boura, A. Canteaut, J. Jean, and V. Suder, Two notions of differential equivalence
on Sboxes, Des. Codes Cryptogr. 87(2-3) (2019) 185-202 https://doi.org/10.1007/s10623-
018-0496-z
21
[5] K.A. Browning, J.F. Dillon, M.T. McQuistan, and A.J. Wolfe, An APN permutation
in dimension six 9th, International conference on finite fields and applications; Finite
fields: theory and applications, Dublin, in Comtemporary Mathematics, 518 (2010) 33-42.
http://doi.org/10.1090/conm/518
[6] C. Carlet, P. Charpin, and V. Zinoviev, Codes, Bent Functions, and Permutations
Suitable For DES-like Cryptosystems, Des. Codes Cryptogr. 15(2) (1998) 125-156
https://doi.org/10.1023/A:1008344232130
[7] P. Charpin, and G.M. Kyureghyan, On sets determining the differential spectrum
of mappings, International Journal of Information and Coding Theory, 4(2-3) (2017)
170-184, a recent revised version is available at https://hal.inria.fr/hal-01406589v3.
https://doi.org/10.1504/IJICOT.2017.083844
[8] C. Cid, T. Huang, T. Peyrin, Y. Sasaki, and L. Song, Boomerang Connectivity Table:
A New Cryptanalysis Tool. In: Nielsen J., Rijmen V. (eds) Advances in Cryptology –
EUROCRYPT 2018. Lecture Notes in Computer Science, vol 10821, pp.683-714, Springer,
Cham. https://doi.org/10.1007/978-3-319-78375-8 22
[9] S. Fu, and X. Feng, Involutory differentially 4-uniform permutations from known construc-
tions, Des. Codes Cryptogr. 87(1) (2019) 31-56 https://doi.org/10.1007/s10623-018-0482-5
[10] R. Gupta, and R.K. Sharma, Some new classes of permutation trinomials
over finite fields with even characteristic, Finite Fields Appl. 41 (2016) 89-96
http://dx.doi.org/10.1016/j.ffa.2016.05.004
[11] X. Hou, Determination of a type of permutation trinomials over finite fields, II, Finite
Fields Appl. 35 (2015) 16-35 http://dx.doi.org/10.1016/j.ffa.2015.03.002
[12] X. Hou, and S.D. Lappano, Determination of a type of permutation binomials over finite
fields, J. Number Theory 147 (2015) 14-23 http://dx.doi.org/10.1016/j.jnt.2014.06.021
[13] N. Li, and T. Helleseth, Several classes of permutation trinomials from Niho exponents
Cryptogr. Commun. 9 (2017) 693-705 https://doi.org/10.1007/s12095-016-0210-9
[14] N. Li, and T. Helleseth, New permutation trinomials from Niho exponents
over finite fields with even characteristic, Cryptogr. Commun. 11 (2019) 129-136
https://doi.org/10.1007/s12095-018-0321-6
[15] K. Li, L. Qu, and X. Chen, New classes of permutation binomials and
permutation trinomials over finite fields, Finite Fields Appl. 43 (2017) 69-85
https://doi.org/10.1016/j.ffa.2016.09.002
[16] K. Li, L. Qu, B. Sun, and C. Li, New Results about the Boomerang Unifor-
mity of Permutation Polynomials, IEEE Trans. on Inf. Theory, 65 (2019) 7542-7553
http://dx.doi.org/10.1109/TIT.2019.2918531
[17] K. Li, L. Qu, and Q. Wang, New constructions of permutation polynomials
of the form xrhx(xq1) over Fq2,Des. Codes Cryptogr. 86(10) (2019) 2379-2405
https://doi.org/10.1007/s10623-017-0452-3
22
[18] K. Li, L. Qu, and Q. Wang, Compositional inverses of permutation polynomi-
als of the form xrh(xs) over finite fields, Cryptogr. Commun. 11 (2019) 279-298
https://doi.org/10.1007/s12095-018-0292-7
[19] S. Mesnager, C. Tang, and M. Xiong, On the boomerang uniformity of (quadratic) per-
mutations over F2n,a preprint, available at https://arxiv.org/abs/1903.00501 (2019)
[20] K. Nyberg, Differentially uniform mappings for cryptography. In: Helleseth T. (eds) Ad-
vances in Cryptology — EUROCRYPT ’93. Lecture Notes in Computer Science 765 (1994)
55-64, Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48285-7 6
[21] Y.H. Park, and J.B. Lee, Permutation polynomial and group permutation polynomials,
Bull. Aust. Math. Soc. 63 (2001) 67-74 https://doi.org/10.1017/S0004972700019110
[22] D. Wagner, The Boomerang Attack. In: Knudsen L. (eds) Fast Software Encryption 1999.
Lecture Notes in Computer Science 1636 (1999) 156-170 Springer, Berlin, Heidelberg.
https://doi.org/10.1007/3-540-48519-8 12
[23] D. Wan, and R. Lidl, Permutation Polynomials of the Form xrf(x(q1)/d ) and
Their Group Structure, Monalshefte f¨ur Mathematik 112 (1991) 149-163, Springer.
https://doi.org/10.1007/BF01525801
[24] Q. Wang, Cyclotomic Mapping Permutation Polynomials over Finite Fields, In: Golomb
S.W., Gong G., Helleseth T., Song HY. (eds) Sequences, Subsequences, and Consequences.
Lecture Notes in Computer Science, vol 4893 (2007), pp. 119-128, Springer, Berlin, Hei-
delberg, https://doi.org/10.1007/978-3-540-77404-4 11
[25] Q. Wang, Cyclotomy and permutation polynomials of large indices, Finite Fields Appl.
22 (2013) 57-69 https://doi.org/10.1016/j.ffa.2013.02.005
[26] X. Zhu, X. Zeng, and Y. Chen, Some Binomial and Trinomial Differentially 4-Uniform Per-
mutation Polynomials, International Journal of Foundations of Computer Science 26(4)
(2015) 487-497 https://doi.org/10.1142/S0129054115500276
[27] M.E. Zieve, On some permutation polynomial over Fqof the form xrh(x(q1)/d). Proc.
Am. Math. Soc. 137 (2009) 2207-2216 https://doi.org/10.1090/S0002-9939-08-09767-0
23
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differential uniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question.
Article
Full-text available
At Eurocrypt’18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against the boomerang attack which is an important cryptanalysis technique introduced by Wagner in 1999 against block ciphers. Next, Boura and Canteaut introduced an important parameter related to the BCT for cryptographic S-boxes called boomerang uniformity. The purpose of this paper is to present a brief state-of-the-art on the notion of boomerang uniformity of vectorial Boolean functions (or S-boxes) and provide new results. More specifically, we present a slightly different but more convenient formulation of the boomerang uniformity and prove some new identities. Moreover, we focus on quadratic permutations in even dimension and obtain general criteria by which they have optimal BCT. As a consequence of the new criteria, two previously known results can be derived, and many new quadratic permutations with optimal BCT (optimal means that the maximal value in the Boomerang Connectivity Table equals the lowest known differential uniformity) can be found. In particular, we show that the boomerang uniformity of the binomial differentially 4-uniform permutations presented by Bracken, Tan, and Tan equals 4. Furthermore, we show a link between the boomerang uniformity and the nonlinearity for some special quadratic permutations. Finally, we present a characterization of quadratic permutations with boomerang uniformity 4. With this characterization, we show that the boomerang uniformity of a quadratic permutation with boomerang uniformity 4 is preserved by the extended affine (EA) equivalence.
Article
Full-text available
In EUROCRYPT 2018, Cid et al. 16 introduced a new concept on the cryptographic property of Sboxes: Boomerang Connectivity Table (BCT for short) for evaluating the subtleties of boomerang-style attacks. Very recently, BCT and the boomerang uniformity, the maximum value in BCT, were further studied by Boura and Canteaut 4. Aiming at providing new insights, we show some new results about BCT and the boomerang uniformity of permutations in terms of theory and experiment in this paper. Firstly, we present an equivalent technique to compute BCT and the boomerang uniformity, which seems to be much simpler than the original definition from 16. Secondly, thanks to Carlet’s idea 15, we give a characterization of functions f from Fn 2 to itself with boomerang uniformity δf by means of the Walsh transform. Thirdly, by our method, we consider boomerang uniformities of some specific permutations, mainly the ones with low differential uniformity. Finally, we obtain another class of 4-uniform BCT permutation polynomials over F2n, which is the first binomial.
Article
Full-text available
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differential uniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question.
Article
Full-text available
In this work, we discuss two notions of differential equivalence on Sboxes. First, we introduce the notion of DDT-equivalence which applies to vectorial Boolean functions that share the same difference distribution table (DDT). Next, we compare this notion to what we call the \(\gamma \)-equivalence, applying to vectorial Boolean functions whose DDTs have the same support. We discuss the relation between these two equivalence notions, demonstrate that the number of DDT- or \(\gamma \)-equivalent functions is invariant under EA- and CCZ-equivalence and provide an algorithm for computing the DDT-equivalence and the \(\gamma \)-equivalence classes of a given function. We study the sizes of these classes for some families of Sboxes. Finally, we prove a result that shows that the rows of the DDT of an APN permutation are pairwise distinct.
Article
Full-text available
Substitution boxes (S-boxes) are important components of block ciphers that can cause confusion in cryptosystems. The functions used as S-boxes should have low differential uniformity, high nonlinearity and high algebraic degree. When \(k>3\), due to the lack of knowledge about the existence of almost perfect nonlinear permutations over \(\mathbb {F}_{2^{2k}}\), which can offer optimal resistance to the differential cryptanalysis, S-boxes are often constructed from differentially 4-uniform permutations. To date, many infinite families of such functions have been constructed. In addition, the lower hardware implementation cost of S-boxes is an important criterion in the design of block ciphers. If the S-box is an involution, which means that the permutation is its own compositional inverse, then the implementation cost for its inverse can be saved. The same hardware circuit can thus be used for both encryption and decryption, which is an advantage in hardware implementation. In this paper, we investigate all of the differentially 4-uniform permutations that are known in the literature and determine whether they can be involutory. We find that some involutory differentially 4-uniform permutations with high nonlinearity and algebraic degree can be given from these known constructions. We also give some partial results and computer experiments to consider the problem of whether a permutation can be affine equivalent to an involution or it will become an involution upon adding an affine function. Some new families of differentially 4-uniform involutions constructed by composing the inverse function and cycles with length 3 are also given. This family of constructions has a high nonlinearity and a maximum algebraic degree.
Article
Full-text available
The study of computing compositional inverses of permutation polynomials over finite fields efficiently is motivated by an open problem proposed by G. L. Mullen (1991), as well as the potential applications of these permutation polynomials (Dillon 1974, Khachatrian and Kyureghyan, Discrete Appl. Math. 216, 622–626 2017, Lidl 1985, Lidl and Müller 1984, Rivest et al., ACM Commun. Comput. Algebra. 1978, 120–126 1976, Schwenk and Huber, Electron. Lett. 34, 759–760 1998). It is well known that every permutation polynomial over a finite field Fq can be reduced to a permutation polynomial of the form xrh(xs) with s∣(q − 1) and h(x)∈Fq[x] (Akbary et al., Finite Fields Appl. 15(2), 195–206 2009, Wang, Finite Fields Appl. 22, 57–69 2013). Recently, several explicit classes of permutation polynomials of the form xrh(xs) over Fq have been constructed. However, all the known methods to compute the compositional inverses of permutation polynomials of this form seem to be inadequately explicit, which could be a hurdle to potential applications. In this paper, for any prime power q, we introduce a new approach to explicitly compute the compositional inverse of a permutation polynomial of the form xrh(xs) over Fq, where s∣(q − 1) and gcd(r,q−1)=1. The main idea relies on transforming the problem of computing the compositional inverses of permutation polynomials over Fq into computing the compositional inverses of two restricted permutation mappings, where one of them is a monomial over Fq and the other is the polynomial xrh(x)s over a particular subgroup of Fq∗ with order (q − 1)/s. This is a multiplicative analog of Tuxanidy and Wang (Finite Fields Appl. 28, 244–281 2014), Wu and Liu (Finite Fields Appl. 24, 136–147 2013). We demonstrate that the inverses of these two restricted permutations can be explicitly obtained in many cases. As consequences, many explicit compositional inverses of permutation polynomials given in Zieve (Proc. Am. Math. Soc. 137, 2209–2216 2009), Zieve (arXiv:1310.0776, 2013), Zieve (arXiv:1312.1325v3, 2013) are obtained using this method.
Article
Full-text available
Permutation polynomials over finite fields have been studied extensively recently due to their wide applications in cryptography, coding theory, communication theory, among others. Recently, several authors have studied permutation trinomials of the form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$, where $q=2^k$, $h(x)=1+x^s+x^t$ and $r, s, t, k>0$ are integers. Their methods are essentially usage of a multiplicative version of AGW Criterion because they all transformed the problem of proving permutation polynomials over $\mathbb{F}_{q^2}$ into that of showing the corresponding fractional polynomials permute a smaller set $\mu_{q+1}$, where $\mu_{q+1}:=\{x\in\mathbb{F}_{q^2} : x^{q+1}=1\}$. Motivated by these results, we characterize the permutation polynomials of the form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$ such that $h(x)\in\mathbb{F}_q[x]$ is arbitrary and $q$ is also an arbitrary prime power. Using AGW Criterion twice, one is multiplicative and the other is additive, we reduce the problem of proving permutation polynomials over $\mathbb{F}_{q^2}$ into that of showing permutations over a small subset $S$ of a proper subfield $\mathbb{F}_{q}$, which is significantly different from previously known methods. In particular, we demonstrate our method by constructing many new explicit classes of permutation polynomials of the form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$. Moreover, we can explain most of the known permutation trinomials, which are in [6, 13, 14, 16, 20, 29], over finite field with even characteristic.
Article
Full-text available
Special issue on the honor of Gerard Cohen