Sugata Gangopadhyay
Indian Institute of Technology Roorkee
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sugata Gangopadhyay.
IEEE Transactions on Information Theory | 2012
Pantelimon Stanica; Sugata Gangopadhyay; Ankita Chaturvedi; Aditi Kar Gangopadhyay; Subhamoy Maitra
Parker considered a new type of discrete Fourier transform, called nega-Hadamard transform. We prove several results regarding its behavior on combinations of Boolean functions and use this theory to derive several results on negabentness (that is, flat nega-spectrum) of concatenations, and partially symmetric functions. We derive the upper bound ⌈n/2⌉ for the algebraic degree of a negabent function on n variables. Further, a characterization of bent-negabent functions is obtained within a subclass of the Maiorana-McFarland set. We develop a technique to construct bent-negabent Boolean functions by using complete mapping polynomials. Using this technique, we demonstrate that for each ℓ ≥ 2, there exist bent-negabent functions on n = 12ℓ variables with algebraic degree n/4 + 1 = 3ℓ + 1. It is also demonstrated that there exist bent-negabent functions on eight variables with algebraic degrees 2, 3, and 4. Simple proofs of several previously known facts are obtained as immediate consequences of our work.
Iet Information Security | 2012
Miodrag J. Mihaljevic; Sugata Gangopadhyay; Goutam Paul; Hideki Imai
A novel technique for cryptanalysis of the stream cipher Grain-v1 is given. In a particular setting, the algorithms proposed in this study provide recovery of an internal state of Grain-v1 with the expected time complexity of only 2 54 table look-up operations employing a memory of dimension ~2 70 , assuming availability of 2 34 keystream sequences each of length 2 38 generated for different initial values, and the pre-processing time complexity of ~2 88 . These figures appear as significantly better in comparison with the previously reported ones. The proposed approach for cryptanalysis primarily depends on the order of normality of the employed Boolean function in Grain-v1. Accordingly, in addition to the security evaluation insights of Grain-v1, the results of this study are also an evidence of the cryptographic significance of the normality criteria of Boolean functions.
Periodica Mathematica Hungarica | 2012
Miodrag J. Mihaljevic; Sugata Gangopadhyay; Goutam Paul; Hideki Imai
This paper considers security implications of k-normal Boolean functions when they are employed in certain stream ciphers. A generic algorithm is proposed for cryptanalysis of the considered class of stream ciphers based on a security weakness of k-normal Boolean functions. The proposed algorithm yields a framework for mounting cryptanalysis against particular stream ciphers within the considered class. Also, the proposed algorithm for cryptanalysis implies certain design guidelines for avoiding certain weak stream cipher constructions. A particular objective of this paper is security evaluation of stream cipher Grain-128 employing the developed generic algorithm. Contrary to the best known attacks against Grain-128 which provide complexity of a secret key recovery lower than exhaustive search only over a subset of secret keys which is just a fraction (up to 5%) of all possible secret keys, the cryptanalysis proposed in this paper provides significantly lower complexity than exhaustive search for any secret key. The proposed approach for cryptanalysis primarily depends on the order of normality of the employed Boolean function in Grain-128. Accordingly, in addition to the security evaluation insights of Grain-128, the results of this paper are also an evidence of the cryptographic significance of the normality criteria of Boolean functions.
SETA'10 Proceedings of the 6th international conference on Sequences and their applications | 2010
Pantelimon Stănică; Sugata Gangopadhyay; Ankita Chaturvedi; Aditi Kar Gangopadhyay; Subhamoy Maitra
In this paper we start developing a detailed theory of nega-Hadamard transforms. Consequently, we derive several results on ne-gabentness of concatenations, and partially-symmetric functions. We also obtain a characterization of bent-negabent functions in a subclass of Maiorana-McFarland set. As a by-product of our results we obtain simple proofs of several existing facts.
IEEE Transactions on Information Theory | 2013
Sugata Gangopadhyay; Enes Pasalic; Pantelimon Stanica
In this paper, we consider the spectra of Boolean functions with respect to the action of unitary transforms obtained by taking tensor products of the Hadamard kernel, denoted by <i>H</i>, and the nega-Hadamard kernel, denoted by <i>N</i>. The set of all such transforms is denoted by {<i>H</i>, <i>N</i>}<sup>n</sup>. A Boolean function is said to be bent<sub>4</sub> if its spectrum with respect to at least one unitary transform in {<i>H</i>, <i>N</i>}<sup>n</sup> is flat. We obtain a relationship between bent, semibent, and bent<sub>4</sub> functions, which is a generalization of the relationship between bent and negabent Boolean functions proved by Parker and Pott [cf., LNCS 4893 (2007), 9-23]. As a corollary to this result, we prove that the maximum possible algebraic degree of a bent<sub>4</sub> function on <i>n</i> variables is [<i>n</i>/2] and, hence, solve an open problem posed by Riera and Parker [cf., IEEE-TIT 52:9 (2006), 4142-4159].
Cryptography and Communications | 2010
Ruchi Gode; Sugata Gangopadhyay
The rth-order nonlinearity, where r ≥ 1, of an n-variable Boolean function f, denoted by nlr(f), is defined as the minimum Hamming distance of f from all n-variable Boolean functions of degrees at most r. In this paper we obtain a lower bound of the third-order nonlinearities of Kasami functions of the form
Discrete Mathematics | 2006
Sugata Gangopadhyay; Pradipkumar H. Keskar; Subhamoy Maitra
Tr_{1}^{n}(\mu x^{57})
Fundamenta Informaticae | 2011
Manish Garg; Sugata Gangopadhyay
. It is demonstrated that for large values of n the lower bound of the third-order nonlinearities of the functions of this form is larger than the general lower bound obtained by Carlet (IEEE Trans Inf Theory 54(3):1262–1272, 2008) for Kasami functions. Further we show that our result along with the computational results obtained by Fourquet and Tavernier (Designs Codes Cryptogr 49:323–340, 2008) provide us an estimate of the nonlinearity profiles of these functions for n = 7, 8, 10.
Fundamenta Informaticae | 2016
Bimal Mandal; Pantelimon Stănică; Sugata Gangopadhyay; Enes Pasalic
In 1983, Patterson and Wiedemann constructed Boolean functions on n=15 input variables having nonlinearity strictly greater than 2^n^-^1-2^(^n^-^1^)^/^2. Construction of Boolean functions on odd number of variables with such high nonlinearity was not known earlier and also till date no other construction method of such functions are known. We note that the Patterson-Wiedemann construction can be understood in terms of interleaved sequences as introduced by Gong in 1995 and subsequently these functions can be described as repetitions of a particular binary string. As example we elaborate the cases for n=15,21. Under this framework, we map the problem of finding Patterson-Wiedemann functions into a problem of solving a system of linear inequalities over the set of integers and provide proper reasoning about the choice of the orbits. This, in turn, reduces the search space. Similar analysis also reduces the complexity of calculating autocorrelation and generalized nonlinearity for such functions. In an attempt to understand the above construction from the group theoretic view point, we characterize the group of all GF(2)-linear transformations of GF(2^a^b) which acts on PG(2,2^a).
Discrete Applied Mathematics | 2013
Sugata Gangopadhyay
In this paper we find a lower bound of the second-order nonlinearities of Boolean bent functions of the form