Information Technology Reference
In-Depth Information
and σ j ( x )isthe j th component of σ ( x ), so that σ ( x )=( σ 1 ( x ) ,...,σ n ( x )). Now
write w ( x ) in 2-adic expansion, viz w ( x )= l ( x )+2 q ( x )with
n
l ( x )=
( x j + σ j ( x ))
(mod 2)
j =1
n
q ( x )=
σ j ( x )+
[( x j x k + σ j ( x ) σ k ( x )] +
x j σ k ( x )(mod2 .
j =1
1 ≤j<k≤n
1 ≤j,k≤n
Then we have
( f )( u, v )) = 2 2 1
( ω −n i wt( v )
1) g ( x )+ q ( x )+ v·σ ( x )+ u·x [1 + (
1) l ( x ) ]
N
(
x∈V n
1
2 [
=
H
( h v )( u )+
H
( h v )( u )] ,
(5)
where h v ( x )= g ( x )+ q ( x )+ v
·
σ ( x )and u is the complement of u . Similarly we
obtain
1
2 [
( ω −n i wt( v )
N
( f )( u, v )) =
H
( h v )( u )
−H
( h v )( u )] .
(6)
By assumption,
|N
( f )( u, v )
|
= 1, and by Lemma 11, either the real part or the
imaginary part of
( f )( u, v ) must be zero. First suppose that n is even. Then
ω −n is a 4th root of unity and either (5) or (6) must be zero. Hence h v must
be bent for every v
N
V n , which implies that for n> 2 the degree of h v can
be at most n/ 2[1].Nowlet n be odd. Then ω −n is an 8th root of unity and
the absolute values of (5) and (6) must be equal. This can only happen if the
Hadamard spectrum of h v contains only the values 0 and
± 2 (such functions
are called almost-bent functions [2]). It is known [2, Thm. 1] that the degree of
such a function is at most ( n +1) / 2.
For either n
3 we conclude that the degree of h v ( x )isatmost
n/ 2
for
every v
V n . This implies that the degree of v
·
σ ( x ) is bounded by
n/ 2
for
every v
V n and n
3. Note that, since σ is a permutation, σ j ( x ) σ k ( x )=1has
exactly 2 n− 2
3eachoftheterms σ j ( x ) σ k ( x ) cannot
have degree equal to n (see, e.g., [6, Ch. 13, Thm. 1]). Therefore, the degree of
q is at most max
solutions in V n ,sofor n
. It follows that, if n> 3, the degree of q and,
therefore, the degree of g is bounded by n
{
n
1 ,
n/ 2
+1
}
1, which proves the theorem.
References
1. Rothaus, O.S.: On 'bent' functions. J. Comb. Theory (A) 20, 300-305 (1976)
2. Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suit-
able for DES-like cryptosystems. Designs, Codes and Cryptography 15(2), 125-156
(1998)
3. Parker, M.G., Pott, A.: On Boolean functions which are bent and negabent. In:
Golomb, S.W., Gong, G., Helleseth, T., Song, H.-Y. (eds.) SSC 2007. LNCS,
vol. 4893, pp. 9-23. Springer, Heidelberg (2007)
Search WWH ::




Custom Search