A note on the differential spectrum of a class of locally APN functions
Abstract
Let denote the finite field containing elements, where is a positive integer and is a prime. The function over with was recently studied by Budaghyan and Pal in [8], whose differential uniformity is at most when . In this paper, we study the differential uniformity and the differential spectrum of for . We first give some properties of the differential spectrum of any cryptographic function. Moreover, by solving some systems of equations over finite fields, we express the differential spectrum of in terms of the quadratic character sums.
Keywords: cryptographic function; differential uniformity; differential spectrum; character sum
Mathematics Subject Classification: 11T06, 94A60
I Introduction
Let be the finite field with elements, where is a prime power. We denote by . Any cryptographic function can be uniquely represented as a univariate polynomial of degree less than . For a function , the main tools to study regarding the differential attack [2] are the difference distribution table (DDT for short) and the differential uniformity introduced by Nyberg [26] in 1994. The DDT entry at point for any , denoted by , is defined as
where is the derivative function of at the element . Note that when and , the equation has solutions in , which means . Besides, when and , the equation has no solutions, which means . Therefore, for any polynomial, the DDT entries in the line are trivial. The differential uniformity of , denoted by , is defined as
Generally speaking, the smaller the value of , the stronger the resistance of used in S-boxes against the differential attack. A cryptographic function is called differentially -uniform if . Particularly when , is called a planar function [12] or a perfect nonlinear (abbreviated as PN) function [25]. When , is called an almost perfect nonlinear (abbreviated as APN) function [26], which is of the lowest possible differential uniformity over as in such finite fields, no PN functions exist. Readers may refer to [4], [7], [14], [15], [16], [24], [29], [40], [47], [48] and references therein for some of the new developments on PN and APN functions. Apart from the concepts of PN and APN, a power function over is said to be locally-APN if
This definition was first introduced in [17] for the case and generalized in [37] for odd . For a general function , we can also give the concept of locally APN.
Definition 1.
Let be a function defined on . Then is called locally-APN if
In [4], the concept of the differential spectrum of a power function was introduced. The differential spectrum of a cryptographic function, compared with the differential uniformity, provides much more detailed information. In particular, the value distribution of the DDT is given directly by the differential spectrum. What’s more, the differential spectrum has many applications such as in sequences [3], [13], coding theory [9], [10], combinatorial design [32] etc. However, to determine the differential spectrum of a cryptographic function is usually a difficult problem. Power functions with known differential spectra are summarized in Table I.
For a polynomial function that is not a power function, the investigation of its differential spectrum is much more difficult. There are only a few cryptographic functions whose differential spectra were known [22], [27], [34], [36]. One of the focus of this paper is to explore a class of binomials studied in [8]. In [8], the differential uniformity of with has been investigated. In this paper, we determine the differential spectrum of such when , that is, .
This paper is organized as follows. Section II presents certain quadratic character sums that are essential for the computation of the aimed differential spectrum. In Section III, properties of the differential spectrum of any function are given. In Section IV, the number of solutions of several systems of equations over finite fields are investigated, which will be used in Section V, in which the differential spectrum of is determined. Section VI concludes this paper.
Condition | Ref | |||
gcd | [4] | |||
gcd | [4] | |||
[4] | ||||
[4],[38] | ||||
or | [5] | |||
, , odd | or | [6] | ||
, odd | [39] | |||
, odd | [39] | |||
[33] | ||||
, gcd | (locally APN) | [37] | ||
odd | [13] | |||
odd | [19] | |||
any | or | [41] | ||
any | [28] | |||
odd | gcd, | [46], [20] | ||
odd | gcd | or | [11] | |
odd | , , odd | [11] | ||
odd | any | [35], [45] | ||
odd | or | [15], [23] | ||
odd | even | [42] | ||
odd | , and | or | [44] | |
odd | , | [18] | ||
odd | or , , | or | [43] | |
odd | , , | [31], [15] | ||
odd | , , | [31], [15] | ||
odd | , | or , | [1] | |
any | , gcd | (locally APN) | [17] |
II On Quadratic Character Sums
In this section, we will introduce some results on the quadratic character sums over the finite field . Let be the quadratic multiplicative character of , which is defined as
Let be the polynomial ring over . We consider the character sum of the form
(1) |
with . The case of is trivial, and for , the following explicit formula was established in [21].
Lemma 1.
[21, Theorem 5.48] Let with odd and . Put and let be the quadratic character of . Then
Nevertheless, for a polynomials with degree or higher, computing or deriving a specific formula thereof is generally challenging. The subsequent lemma provides lower and upper bounds for any multiplicative character sum.
Lemma 2.
[30] Let be a finite field with odd. Let be a cubic polynomial with distinct roots in and be a multiplicative character sum of . Then we have
However, sometimes we need the exact value of the character sum . For the case , such a sum can be calculated by considering -rational points of elliptic curves over . More precisely, assume that is a cubic function over and denote
To evaluate , several primary concepts from the theory of elliptic curves shall be taken into consideration. More details on the terminologies and notation can be found in [30]. Let be the elliptic curve over , and denote the number of -rational points (with the extra point at infinity) on the curve . From Subsection 1.3 and Theorem 2.3.1 in [30, Chapter V], can be assessed by . To be more exact, for every ,
Furthermore,
(2) |
where and are the complex solutions of the quadratic equation . With an exploration, can be determined by directly and explicitly. We have
(3) |
Moreover, when , we have
(4) |
We define a specific character sum
which will be used in the sequel. In the following examples, we give the exact value of for a given .
Example 1.
Let . For , one has . By (3), we have
Example 2.
Let . For , one has . By (4), we have
The key to determine is to calculate the value of . For the convenience, we list the values of for all primes with in Table II, which are computed by MAGMA.
At last, we present several results below concerning the exact values of specific character sums used in Section V.
Lemma 3.
When , we have
-
1.
.
-
2.
.
-
3.
.
-
4.
.
-
5.
.
Proof.
-
1.
Set , then and
Let , then
Then . This implies that .
-
2.
Set . Then and
Hence .
- 3.
-
4.
Set , then .
Let , then we can obtain a quadratic equationwhose discriminant is . For , the number of satisfying the above quadratic equation is . Then
-
5.
It is clear that , otherwise , which contradicts to . Then
Let , then
(5) Note that if and only if . When , the discriminant of (5) is . Then we have
Set , then
That is desired result follows.
∎
III The properties of the differential spectrum of a general cryptographic function over finite field
First, we give the definition of the differential spectrum of a cryptographic function.
Definition 2.
Let be a function from to with differential uniformity , and
where . The differential spectrum of is defined as the multiset
Sometimes we ignore the zeros in the differential spectrum. We remark that our definition of the differential spectrum is a little different from that in [34]. In our definition of , we consider all the pairs , including . The values of can be obtained easily. That is, and .
From [15], it is known that the differential spectrum of a power function satisfies several identities. It is natural to consider how it behaves with respect to the differential spectrum of any function. In this section, we give some identities of the differential spectrum of a general cryptographic function. Let be a polynomial over with differential uniformity . We have the following theorem.
Theorem 1.
We have
(6) |
(7) |
and
(8) |
where
(9) |
Proof.
According to the definition of , we have
The last equation holds since when runs through the integers in the range , each should occur.
Besides, for a fixed , there are distinct pairs such that , then we have
And for a given ,
since for any , there exists exactly one satisfying . Then
In the following, we prove the last statement. Note that
since the number of solutions of of the equation is and is uniquely determined by .
It is clear that
This completes the proof. ∎
IV On the number of solutions of certain systems of equations
In this section, we determine the number of solutions of several systems of equations which are needed in Section V.
Lemma 4.
Let . Let denote the number of solutions of the following system of equations
(10) |
with . Then we have .
Proof.
The system (10) can be rewritten as
(11) |
If , then we get . Note that is a desired solution if and only if . Therefore, the number of such desired solutions is . If , then , we have
whose solution is . Similarly, the number of such desired solutions is . Together with the two cases and removing one identical solution , . ∎
Lemma 5.
Let . Let denote the number of solutions of the following system of equations
(12) |
with . Then we have .
Proof.
Lemma 6.
Let . Let denote the number of solutions of the equation
(13) |
with . Then .
Proof.
We have
In the following, for a given , we discuss the number of solutions of the equation
with .
-
1.
. Then the desired solutions of should be with . Besides, the number of such solutions is .
-
2.
is a square element in . Let , then and the equation becomes . Thus, we have
-
3.
is a nonsquare element in . The number of solutions with of the equation is also . The proof is similar with 2) and we omit it.
In summary, we have
∎
V The differential spectrum of
Let be an odd integer, be an odd prime satisfying . Recall that and are binomials over . Note that , then we only study the differential properties of . In this section, we investigate the differential uniformity and the differential spectrum of . The differential uniformity and the differential spectrum of can be obtained directly and we omit them.
V-A The differential uniformity of
In this subsection, our primary objective is to determine the differential uniformity of , accompanied by a discussion of the number of potential solutions associated with the differential equation.
Theorem 2.
Let be an odd integer, be an odd prime with . The differential uniformity of is . Moreover, when .
Proof.
It is obvious that and for . For any , the differential equation becomes
(14) |
When , we discuss (14) in four cases shown in Table III, in which and denote the two solutions of the quadratic equations in Case III and Case IV.
Case | I | II | III | IV |
-
1.
When , is a solution of (14) if and only if , and is a solution of equation (14) if and only if . This indicates that for any , has exactly one solution in . For the remaining solutions not in , replacing by in Table III, it is effortless to check that has no solutions in Case I, Case III or Case IV. And for any , there are
solutions in Case II. In short, the equation has solutions in total and the number of such is .
-
2.
When ,
-
(a)
it is clear that (14) cannot have solutions in both Cases III and IV simultaneously as cannot be both and at the same time;
-
(b)
if (14) has two solutions in Case III, then and , which is a contradiction;
-
(c)
(14) has at most one solution in Case IV, otherwise both and would hold simultaneously, which is impossible with .
From the discussion above, the equation has at most two solutions when .
-
(a)
We finish the proof. ∎
V-B The value of pertaining to
Based on the discussion in Subsection V-A, to determine the differential spectrum of , we are required to determine , and . Further, according to Theorem 1 and the fact that , we need to examine the solutions of the system of equations
Theorem 3.
Let denote the number of solutions of the system of equations:
(15) |
Then .
Proof.
For a solution of (15), let denote the number of solutions containing zeros, where . In the first place, we are trying to evaluate . Let denote the number of solutions of the system (15) when . Then we have . Next, we compute in cases presented below.
- 1.
-
2.
In this case, we consider there is exactly one nonsquare element among and .
- (a)
-
(b)
When , the system (15) can be reduced to
This system of equations is the same as
By a simple comparison, we have . In the same manner, can be deduced.
In short, we have .
-
3.
In this case, we consider there are exactly two nonsquare elements among and .
-
(a)
When , the system (15) can be reduced to
From the second equation above, we can obtain that since and . Then the solutions of this system of equations is . Combined with the condition that and , and noting that the number of such and is each , we can obtain that .
-
(b)
Since and have the same status in the system (15) and so do and , it follows that .
-
(c)
When , the system (15) can be reduced to
Obviously, has no solution when , , which means . Besides, it is easy to check that .
In short, we have , .
-
(a)
-
4.
In this case, we consider there are exactly three nonsquare elements among and . Suppose that , then the second equality in (15) becomes . It follows that , a contradiction to for . Thus, . By the same procedure, the desired result follows. Thus, we have .
- 5.
Above all, we have
In the following, we consider the cases that there exists some , where to evaluate with as follows.
- 1.
-
2.
In this case, we consider the condition that there are exactly two variables taking the value in a solution. If , then the system (15) can be reduced to
Then we obtain the solutions in the form of with and the number of such solutions is . By the same token, the quadruples in the form of , and are all solutions and the number of each is . In short, .
-
3.
In this case, we consider the condition that there is exactly one variable taking the value 0 in a solution. If , then the system (15) can be reduced to
(16) For a solution of (16), let denote the number of solutions of the system of equations (16) when . Next, we examine the solutions of this system (16) in the following eight cases.
-
(a)
When , the system (16) can be reduced to
Let , we shall calculate the number of solutions of
with . Solving the equations above we get , which contradicts to . Therefore, .
-
(b)
Here we discuss that there is exactly one nonsquare element among .
-
i.
When , (16) can be reduced to
Solving the system of equations above we get , which is a contradiction. Therefore, . Similarly, we have .
- ii.
Thus, we have .
-
i.
-
(c)
Here we discuss that there are exactly two nonsquare elements among . When , the second equation of (16) becomes . It follows that , a contradiction to . Thus, and similarly, we can get .
-
(d)
When , (16) can be reduced to
Set , then and we shall consider the equation below for the first step
Therefore, is a desired solution if and only if
And the number of such solutions is
Therefore, .
Based on the analysis above, when , (15) has solutions containing exactly one zero. As and share the same status in (15), when , (15) has such solutions. When , the system (15) can be reduced to
This system is equivalent to
By a simple comparison, the number of solutions of (15) when equals that of (15) when . Given the equivalent role of and , the same conclusion holds when any solution features solely . In short, we have .
-
(a)
In conclusion, we have
∎
V-C The differential spectrum of
Based on the analysis in subsections V-A and V-B, we present the differential spectrum of as follows.
Theorem 4.
Let . The differential spectrum of over is
Proof.
By Theorem 1, we have the following system of equations pertaining to
(17) |
It is obvious that . By Theorem 2, we have , and for , . The value of was determined in Theorem 3. By substituting certain values, the system (17) can be rewritten as follows
The desired result follows by solving the above system. We finish the proof. ∎
Remark 1.
Note that is odd when . Thus, when , we have , then the differential spectrum of can be expressed without , which is
When , we have , then the differential spectrum of is
Remark 2.
In what follows, we give some examples to verify our results.
Example 3.
Let , . Then , , . By Theorem 4, the differential spectrum of is
which coincides with the result calculated directly by MAGMA.
Example 4.
Let , . Then , , . By Theorem 4, the differential spectrum of is
which coincides with the result calculated directly by MAGMA.
Example 5.
Let , . Then , , . By Theorem 4, the differential spectrum of is
which coincides with the result calculated directly by MAGMA.
VI Concluding remarks
In this paper, we conducted an in-depth investigation of the differential properties of the function for . We expressed the differential spectrum of in terms of quadratic character sums. This complemented the work on the differential properties of the family of the binomial in [8]. In the process of calculating the aimed spectrum, we solved several systems of equations that could be of use in future research or other contexts. Additionally, we extend the properties of the differential spectrum property of a power function to that of any cryptographic function, and it may be used in calculating the differential spectrum of any other polynomial.
References
- [1] F. Bao, Y. Xia, S. Chen, C. Li, and T. Helleseth, “The differential spectrum of a power permutation,” Adv. Math. Commun., 2023.
- [2] E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” J. Cryptol., vol. 4, no. 1, pp. 3–72, 1991.
- [3] A. Biryukov and C. D. Cannière, Encyclopedia of Cryptography and Security. Springer, 2005.
- [4] C. Blondeau, A. Canteaut, and P. Charpin, “Differential properties of power functions,” Int. J. Inf. Coding Theory, vol. 1, no. 2, pp. 149–170, 2010.
- [5] ——, “Differential properties of ,” IEEE Trans. Inform. Theory, vol. 57, no. 12, pp. 8127–8137, 2011.
- [6] C. Blondeau and L. Perrin, “More differentially 6-uniform power functions,” Des. Codes Cryptogr., vol. 73, no. 2, pp. 487–505, 2014.
- [7] L. Budaghyan, M. Calderini, C. Carlet, R. S. Coulter, , and I. Villa, “Constructing APN functions through isotopic shifts,” IEEE Trans. Inform. Theory, vol. 66, no. 8, pp. 5299–5309, 2020.
- [8] L. Budaghyan and M. Pal, “Arithmetization-oriented apn permutations,” Des. Codes Cryptogr., 2024.
- [9] C. Carlet, P. Charpin, and V. A. Zinoviev, “Codes bent functions and permutations suitable for DES-like cryptosystems,” Des. Codes Cryptogr., vol. 15, no. 2, pp. 125–156, 1998.
- [10] P. Charpin and J. Peng, “Differential uniformity and the associated codes of cryptographic functions,” Adv. Math. Commun., vol. 13, no. 4, pp. 579–600, 2019.
- [11] S.-T. Choi, S. Hong, J.-S. No, and H. Chung, “Differential spectrum of some power functions in odd prime characteristic,” Finite Fields Appl., vol. 21, pp. 11–29, 2013.
- [12] P. Dembowski and T. G. Ostrom, “Planes of order with collineation groups of order ,” Math. Z., vol. 103, no. 2, pp. 239–258, 1968.
- [13] H. Dobbertin, T. Helleseth, P. V. Kumar, and H. Martinsen, “Ternary m-sequences with three-valued cross-correlation function: new decimations of welch and niho type,” IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1473–1481, 2001.
- [14] H. Dobbertin, D. Mills, E. N. Müller, A. Pott, and W. Willems, “APN functions in odd characteristic,” Discrete Math., vol. 267, no. 1-3, pp. 95–112, 2003.
- [15] T. Helleseth, C. Rong, and D. Sandberg, “New families of almost perfect nonlinear power functions,” IEEE Trans. Inform. Theory, vol. 45, no. 2, pp. 475–485, 1999.
- [16] T. Helleseth and D. Sandberg, “Some power functions with low differential uniformity,” Appl. Algebra Engrg. Comm. Comput., vol. 8, no. 5, pp. 363–370, 1997.
- [17] Z. Hu, N. Li, L. Xu, X. Zeng, and X. Tang, “The differential spectrum and boomerang spectrum of a class of locally-APN functions,” Des. Codes Cryptogr., vol. 91, no. 5, pp. 1695–1711, 2023.
- [18] S. Jiang, K. Li, Y. Li, and L. Qu, “Differential spectrum of a class of power functions,” J. Cryptology, vol. 9, no. 3, pp. 484–495, 2021.
- [19] ——, “Differential and boomerang spectrums of some power permutations,” Cryptogr. Commun., vol. 14, pp. 371–393, 2022.
- [20] L. Lei, W. Ren, and C. Fan, “The differential spectrum of a class of power functions over finite fields,” Adv. Math. Commun., vol. 15, no. 3, pp. 525–537, 2021.
- [21] R. Lidl and H. Niederreiter, Finite Fields. Cambridge University Press, 1997.
- [22] G. Liu, S. Jiang, and K. Li, “On differential spectra of involutions with low differential uniformity over finite fields with even characteristic.” Appl. Algebra Engrg. Comm. Comput., 2024.
- [23] Y. Man, Y. Xia, C. Li, and T. Helleseth, “On the differential properties of the power function ,” Finite Fields Appl., vol. 84, no. 10, pp. 1–22, 2022.
- [24] G. J. Ness and T. Helleseth, “A new family of ternary almost perfect nonlinear mappings,” IEEE Trans. Inform. Theory, vol. 53, no. 7, pp. 2581–2586, 2007.
- [25] K. Nyberg, “Perfect nonlinear s-boxes,” Advances in Cryptology-EUROCRYPT 1991, vol. 547, pp. 378–386, 1991.
- [26] ——, “Differentially uniform mappings for cryptography,” Advances in Cryptology-EUROCRYPT 1994, vol. 765, pp. 55–64, 1994.
- [27] D. Panario, D. Santana, and Q. Wang, “Ambiguity, deficiency and differential spectrum of normalized permutation polynomials over finite fields,” Finite Fields Appl., vol. 47, pp. 330–350, 2017.
- [28] T. Pang, N. Li, and X. Zeng, “On the differential spectrum of a differentially 3-uniform power function,” Finite Fields Appl., vol. 87, 2023.
- [29] J. Peng, C. H. Tan, and Q. Wang, “A new family of differentially 4-uniform permutations over for odd ,” Sci. China Math., vol. 59, no. 6, pp. 1221–1234, 2016.
- [30] J. H. Silverman, The arithmetic of elliptic curves, 2nd ed., ser. Graduate Texts in Mathematics. Springer, Dordrecht, 2009, vol. 106.
- [31] X. Tan and H. Yan, “Differential spectrum of a class of APN power functions,” Des. Codes Cryptogr., vol. 91, pp. 2755–2768, 2023.
- [32] C. Tang, C. Ding, and M. Xiong, “Codes differentially -uniform functions and -designs,” IEEE Trans. Inform. Theory, vol. 66, no. 6, pp. 3691–3703, 2020.
- [33] Z. Tu, N. Li, Y. Wu, X. Zeng, X. Tang, and Y. Jiang, “On the differential spectrum and the apcn property of a class of power functions over finite fields,” IEEE Trans. Inform. Theory, vol. 69, no. 1, pp. 582–597, 2023.
- [34] Y. Xia, F. Bao, S. Chen, C. Li, and T. Helleseth, “More differential properties of the Ness-Helleseth function,” IEEE Trans. Inform. Theory, vol. 70, no. 8, pp. 6076–6090, 2024.
- [35] Y. Xia, X. Zhang, C. Li, and T. Helleseth, “The differential spectrum of a ternary power function,” Finite Fields Appl., vol. 64, pp. 1–16, 2020.
- [36] Y. Xia, C. Li, F. Bao, S. Chen, and T. Helleseth, “Further investigation on differential properties of the generalized ness-helleseth function,” Des. Codes Cryptogr., 2024.
- [37] X. Xie, S. Mesnager, N. Li, D. He, and X. Zeng, “On the niho type locally-APN power functions and their boomerang spectrum,” IEEE Trans. Inform. Theory, vol. 69, no. 6, pp. 4056–4064, 2023.
- [38] M. Xiong and H. Yan, “A note on the differential spectrum of a differentially 4-uniform power function,” Finite Fields Appl., vol. 48, pp. 117–125, 2017.
- [39] M. Xiong, H. Yan, and P. Yuan, “On a conjecture of differentially 8-uniform power functions,” Des. Codes Cryptogr., vol. 86, no. 8, pp. 1601–1621, 2018.
- [40] G. Xu, X. Cao, and S. Xu, “Constructing new APN functions and bent functions over finite fields of odd characteristic via the switching method,” Cryptogr. Commun., vol. 8, no. 1, pp. 155–171, 2016.
- [41] H. Yan and C. Li, “Differential spectra of a class of power permutations with characteristic 5,” Des. Codes Cryptogr., vol. 89, no. 6, pp. 1181–1191, 2021.
- [42] H. Yan and Z. Li, “A note on the differential spectrum of a class of power mappings with niho exponent,” Cryptogr. Commun., vol. 14, no. 5, pp. 1081–1089, 2022.
- [43] H. Yan, S. Mesnager, and X. Tan, “The complete differential spectrum of a class of power permutations over odd characteristic finite fields,” IEEE Trans. Inform. Theory, vol. 69, no. 11, pp. 7426–7438, 2023.
- [44] ——, “On a class of APN power functions over odd characteristic finite fields: Their differential spectrum and c-differential properties,” Discrete Math., vol. 347, no. 4, 2024.
- [45] H. Yan, Y. Xia, C. Li, T. Helleseth, M. Xiong, and J. Luo, “The differential spectrum of the power mapping ,” IEEE Trans. Inform. Theory, vol. 68, no. 8, pp. 5535–5547, 2022.
- [46] H. Yan, Z. Zhou, J. Weng, J. Wen, T. Helleseth, and Q. Wang, “Differential spectrum of kasami power permutations over odd characteristic finite fields,” IEEE Trans. Inform. Theory, vol. 65, no. 10, pp. 6819–6826, 2019.
- [47] Z. Zha, S. S. L. Hu, and Y. Sun, “New constructions of APN polynomial functions in odd characteristic,” Appl. Algebra Eng. Commun. Comput., vol. 25, no. 4, pp. 249–263, 2014.
- [48] Z. Zha and X. Wang, “Almost perfect nonlinear power functions in odd characteristic,” IEEE Trans. Inform. Theory, vol. 57, no. 7, pp. 4826–4832, 2011.