NMIX: AN IDEAL CANDIDATE FOR KEY MIXING

Dipanwita Roy Chowdhury, Jaydeb Bhaumik

2009

Abstract

Boolean functions play an important role in cryptography. In this paper, a Boolean function ‘Nmix’ has been proposed which is balanced, reversible and highly nonlinear in nature. It has been proved that the bias of each of the bits decrease exponentially with the bit position. Thus the Boolean function provides high resistance against linear cryptanalysis compared to addition modulo 2n, the popularly known non-linear function used in cryptographic primitives. The cryptographic properties of Nmix are compared with similar cryptographic functions and the result justify to select it as as an ideal choice for key mixing.

References

  1. Bhaumik, J., Roy Chowdhury, D. (2009). An Integrated ECC-MAC Based on RS code, In Transcations on Computational Science, vol. 4, LNCS. 5430
  2. Koo, W. K., Lee, H., Kim, Y. H. and Lee, D. H. (2008). Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks, In ISA 2008, IEEE Computer Socity.
  3. Bhattacharya, D., Mukhopadhyay, D., Saha, D. and Roy Chowdhury, D. (2007). Strengthening NLS against Crossword Puzzle Attack, In ACISP-2007, LNCS, vol. 4586.
  4. Sarkar, P. and Mitra, S. 2004. Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine functions, In IEEE Transactions on Information Theory, vol. 50, no. 9.
  5. Stinson, D. R. (1995). Cryptography Theory and Practice, CRC Press, 1st edition.
  6. Matsui, M. (1993). Linear cryptoanalysis method for DES ciphers, In Eurocrypt 1993, LNCS, vol. 765.
  7. Rothaus, O. S. (1976). On “Bent” Functions, In Journal of Combinatorial Theory, vol. 20(A).
Download


Paper Citation


in Harvard Style

Roy Chowdhury D. and Bhaumik J. (2009). NMIX: AN IDEAL CANDIDATE FOR KEY MIXING . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 285-288. DOI: 10.5220/0002260702850288


in Bibtex Style

@conference{secrypt09,
author={Dipanwita Roy Chowdhury and Jaydeb Bhaumik},
title={NMIX: AN IDEAL CANDIDATE FOR KEY MIXING},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={285-288},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002260702850288},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - NMIX: AN IDEAL CANDIDATE FOR KEY MIXING
SN - 978-989-674-005-4
AU - Roy Chowdhury D.
AU - Bhaumik J.
PY - 2009
SP - 285
EP - 288
DO - 10.5220/0002260702850288