Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Deepak Kumar Dalai is active.

Publication


Featured researches published by Deepak Kumar Dalai.


Designs, Codes and Cryptography | 2006

Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity

Deepak Kumar Dalai; Subhamoy Maitra; Sumanta Sarkar

So far there is no systematic attempt to construct Boolean functions with maximum annihilator immunity. In this paper we present a construction keeping in mind the basic theory of annihilator immunity. This construction provides functions with the maximum possible annihilator immunity and the weight, nonlinearity and algebraic degree of the functions can be properly calculated under certain cases. The basic construction is that of symmetric Boolean functions and applying linear transformation on the input variables of these functions, one can get a large class of non-symmetric functions too. Moreover, we also study several other modifications on the basic symmetric functions to identify interesting non-symmetric functions with maximum annihilator immunity. In the process we also present an algorithm to compute the Walsh spectra of a symmetric Boolean function with O(n2) time and O(n) space complexity.


IEEE Transactions on Information Theory | 2006

Algebraic immunity for cryptographically significant Boolean functions: analysis and construction

Claude Carlet; Deepak Kumar Dalai; Kishan Chand Gupta; Subhamoy Maitra

Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained by multiplication with low degree nonzero functions. In this paper, we show that a Boolean function having low nonlinearity is (also) weak against algebraic attacks, and we extend this result to higher order nonlinearities. Next, we present enumeration results on linearly independent annihilators. We also study certain classes of highly nonlinear resilient Boolean functions for their algebraic immunity. We identify that functions having low-degree subfunctions are weak in terms of algebraic immunity, and we analyze some existing constructions from this viewpoint. Further, we present a construction method to generate Boolean functions on n variables with highest possible algebraic immunity /spl lceil/n/2/spl rceil/ (this construction, first presented at the 2005 Workshop on Fast Software Encryption (FSE 2005), has been the first one producing such functions). These functions are obtained through a doubly indexed recursive relation. We calculate their Hamming weights and deduce their nonlinearities; we show that they have very high algebraic degrees. We express them as the sums of two functions which can be obtained from simple symmetric functions by a transformation which can be implemented with an algorithm whose complexity is linear in the number of variables. We deduce a very fast way of computing the output to these functions, given their input.


fast software encryption | 2005

Cryptographically significant boolean functions: construction and analysis in terms of algebraic immunity

Deepak Kumar Dalai; Kishan Chand Gupta; Subhamoy Maitra

Algebraic attack has recently become an important tool in cryptanalysing different stream and block cipher systems. A Boolean function, when used in some cryptosystem, should be designed properly to resist this kind of attack. The cryptographic property of a Boolean function, that resists algebraic attack, is known as Algebraic Immunity (


international conference on cryptology in india | 2004

Results on algebraic immunity for cryptographically significant boolean functions

Deepak Kumar Dalai; Kishan Chand Gupta; Subhamoy Maitra

\mathcal{AI}


Discrete Mathematics | 2009

Results on rotation symmetric bent functions

Deepak Kumar Dalai; Subhamoy Maitra; Sumanta Sarkar

). So far, the attempt in designing Boolean functions with required algebraic immunity was only ad-hoc, i.e., the functions were designed keeping in mind the other cryptographic criteria, and then it has been checked whether it can provide good algebraic immunity too. For the first time, in this paper, we present a construction method to generate Boolean functions on n variables with highest possible algebraic immunity ⌈n / 2⌉ . Such a function can be used in conjunction with (using direct sum) functions having other cryptographic properties. In a different direction we identify that functions, having low degree subfunctions, are weak in terms of algebraic immunity and analyse some existing constructions from this viewpoint.


SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications | 2006

Reducing the number of homogeneous linear equations in finding annihilators

Deepak Kumar Dalai; Subhamoy Maitra

Recently algebraic attack has received a lot of attention in cryptographic literature. It has been observed that a Boolean function f, interpreted as a multivariate polynomial over GF(2), should not have low degree multiples when used as a cryptographic primitive. In this paper we show that high nonlinearity is a necessary condition to resist algebraic attack and explain how the Walsh spectra values are related to the algebraic immunity (resistance against algebraic attack) of a Boolean function. Next we present enumeration results on linearly independent annihilators. We also study certain classes of highly nonlinear resilient Boolean functions for their algebraic immunity.


international symposium on information theory | 2006

Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity

Claude Carlet; Deepak Kumar Dalai; Subhamoy Maitra

In this paper we analyze the combinatorial properties related to the Walsh spectra of rotation symmetric Boolean functions on even number of variables. These results are then applied in studying rotation symmetric bent functions. For the first time we could present an enumeration strategy for all the 10-variable rotation symmetric bent functions.


network and system security | 2017

A State Recovery Attack on ACORN-v1 and ACORN-v2

Deepak Kumar Dalai; Dibyendu Roy

Given a Boolean function f on n-variables, we find a reduced set of homogeneous linear equations by solving which one can decide whether there exist annihilators at degree d or not. Using our method the size of the associated matrix becomes


network and system security | 2017

Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet

Deepak Kumar Dalai; Pinaki Sarkar

\nu_f \times (\sum_{i=0}^{d} \binom{n}{i} -- \mu_f)


international conference on sensor networks | 2017

Sensornet - A Key Predistribution Scheme for Distributed Sensors using Nets.

Deepak Kumar Dalai; Pinaki Sarkar

, where, νf = |{x | wt(x) > d, f(x) = 1}| and μf = |{x | wt(x) ≤d, f(x) = 1}| and the time required to construct the matrix is same as the size of the matrix. This is a preprocessing step before the exact solution strategy (to decide on the existence of the annihilators) that requires to solve the set of homogeneous linear equations (basically to calculate the rank) and this can be improved when the number of variables and the number of equations are minimized. As the linear transformation on the input variables of the Boolean function keeps the degree of the annihilators invariant, our preprocessing step can be more efficiently applied if one can find an affine transformation over f(x) to get h(x) = f(Bx+b) such that μh = |{x | h(x) = 1, wt(x) ≤d}| is maximized (and in turn νh is minimized too). We present an efficient heuristic towards this. Our study also shows for what kind of Boolean functions the asymptotic reduction in the size of the matrix is possible and when the reduction is not asymptotic but constant.

Collaboration


Dive into the Deepak Kumar Dalai's collaboration.

Top Co-Authors

Avatar

Subhamoy Maitra

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Kishan Chand Gupta

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sumanta Sarkar

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dibyendu Roy

National Institute of Science Education and Research

View shared research outputs
Researchain Logo
Decentralizing Knowledge