Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The improved Levin’s algorithm for constrained probabilistic pseudo-Boolean functions

View through CrossRef
The problem of finding “highly probable” approximations of Boolean functions consists in generating a list of all linear Boolean functions that agree with a given Boolean function in at least a specified number of binary sets. If a Boolean function is given by its truth table, the most well-known algorithm for solving this problem is the Fast Hadamard Transform. However, this method is not optimal in terms of complexity, even among deterministic algorithms. If the Boolean function is given by an oracle and depends on hundreds or thousands of variables, the application of deterministic algorithms for finding its linear approximations becomes practically infeasible. In this case, polynomial probabilistic algorithms are used, such as the Goldreich–Levin algorithm and its modifications. One of the fastest among them currently is the improved Levin’s algorithm. In the language of coding theory, this algorithm performs list decoding of the Hadamard code, which involves the value vectors of all n-variable linear Boolean functions. This paper presents a generalization of the improved Levin’s algorithm to the case of constrained probabilistic pseudo-Boolean functions. The main result is a theorem establishing a lower bound on the probability that each sought approximation appears in a random list generated by the proposed algorithm. The consideration of such functions is necessary to extend the applicability of the improved Levin’s algorithm (in place of the original Goldreich–Levin algorithm) within the well-known framework for proving the security of stream ciphers. In particular, the results of this paper enable a more efficient reduction of problems in proofs of pseudo-randomness for certain well-known keystream generators, assuming high computational complexity of decoding random linear block codes or solving random systems of nonlinear Boolean equations. The obtained results can also be used for finding linear approximations of encryption transformations of block ciphers, which is important for constructing linear attacks against them.
Kharkiv National University of Radioelectronics
Title: The improved Levin’s algorithm for constrained probabilistic pseudo-Boolean functions
Description:
The problem of finding “highly probable” approximations of Boolean functions consists in generating a list of all linear Boolean functions that agree with a given Boolean function in at least a specified number of binary sets.
If a Boolean function is given by its truth table, the most well-known algorithm for solving this problem is the Fast Hadamard Transform.
However, this method is not optimal in terms of complexity, even among deterministic algorithms.
If the Boolean function is given by an oracle and depends on hundreds or thousands of variables, the application of deterministic algorithms for finding its linear approximations becomes practically infeasible.
In this case, polynomial probabilistic algorithms are used, such as the Goldreich–Levin algorithm and its modifications.
One of the fastest among them currently is the improved Levin’s algorithm.
In the language of coding theory, this algorithm performs list decoding of the Hadamard code, which involves the value vectors of all n-variable linear Boolean functions.
This paper presents a generalization of the improved Levin’s algorithm to the case of constrained probabilistic pseudo-Boolean functions.
The main result is a theorem establishing a lower bound on the probability that each sought approximation appears in a random list generated by the proposed algorithm.
The consideration of such functions is necessary to extend the applicability of the improved Levin’s algorithm (in place of the original Goldreich–Levin algorithm) within the well-known framework for proving the security of stream ciphers.
In particular, the results of this paper enable a more efficient reduction of problems in proofs of pseudo-randomness for certain well-known keystream generators, assuming high computational complexity of decoding random linear block codes or solving random systems of nonlinear Boolean equations.
The obtained results can also be used for finding linear approximations of encryption transformations of block ciphers, which is important for constructing linear attacks against them.

Related Results

Some Contributions to Boolean like near Rings
Some Contributions to Boolean like near Rings
In this paper we extend Foster’s Boolean-like ring to Near-rings. We introduce the concept of a Boolean like near-ring.  A near-ring N is said to be a Boolean-like near-ring if ...
Asymptotic Behavior of Linear Approximations of Pseudo-Boolean Functions
Asymptotic Behavior of Linear Approximations of Pseudo-Boolean Functions
We study the problem of approximating pseudo-Boolean functions by linear pseudo-Boolean functions. Pseudo-Boolean functions generalize ordinary Boolean functions by allowing the fu...
Inventory and pricing management in probabilistic selling
Inventory and pricing management in probabilistic selling
Context: Probabilistic selling is the strategy that the seller creates an additional probabilistic product using existing products. The exact information is unknown to customers u...
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable ...
A Note on Boolean Like Algebras
A Note on Boolean Like Algebras
In this paper we develop on abstract system: viz Boolean-like algebra and prove that every Boolean  algebra is a Boolean-like algebra.  A necessary and sufficient condition for a B...
On the sensitivity to noise of a Boolean function
On the sensitivity to noise of a Boolean function
In this paper we generate upper and lower bounds for the sensitivity to noise of a Boolean function using relaxed assumptions on input choices and noise. The robustness of a Boolea...
MV-algebras with pseudo MV-valuations
MV-algebras with pseudo MV-valuations
The concept of pseudo MV-valuations is proposed in the paper, and some related characterizations of pseudo MV-valuations are investigated. The relationships between the pseudo MV-v...
Ingres : from single-cell RNA-seq data to single-cell probabilistic Boolean networks
Ingres : from single-cell RNA-seq data to single-cell probabilistic Boolean networks
Abstract Motivation The current explosion of ’omics data has provided scientists with an unique opportunity to elucidate the in...

Back to Top