Cryptographically strong permutations from the butterfly structure
نویسندگان
چکیده
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, function desired have uniformity as low its differential uniformity. Based on generalized butterfly structures recently introduced by Canteaut, Duval and Perrin, this paper presents infinite families permutations $${\mathbb {F}}_{2^{2n}}$$ for positive odd integer n, which best known nonlinearity 4. Both open closed are considered. The butterflies, according experimental results, appear not produce with On other hand, from butterflies we derive condition coefficients $$\alpha , \beta \in {\mathbb {F}}_{2^n}$$ such that $$\begin{aligned} V_i(x,y) := (R_i(x,y), R_i(y,x)), \end{aligned}$$ where $$R_i(x,y)=(x+\alpha y)^{2^i+1}+\beta y^{2^i+1}$$ $$\gcd (i,n)=1$$ permute $${{\mathbb {F}}}_{2^n}^2$$ In addition, results $$n=3, 5$$ indicate proposed seems cover all $$V_i(x,y)$$
منابع مشابه
How To Generate Cryptographically Strong Sequences
Much effort has been devoted in the second half of this century to make precise the notion of Randomness. Let us informally recall one of these definitions due to Kolmogorov []. A sequence of bits A =all a2••.•• at is random if the length of the minimal program outputting A is at least k We remark that the above definition is highly non constructive and rules out the possibility of pseudo rando...
متن کاملOn the Generation of Cryptographically Strong Elliptic Curves
We discuss two methods for generating cryptographically strong elliptic curves deened over nite prime elds. The advantages and disadvantages of these algorithms are discussed and a practical comparison of the algorithms is given.
متن کاملOn the Difficulty of Constructing Cryptographically Strong Substitution Boxes
Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attack...
متن کاملCryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
"Undeniable" (or perhaps rather "invisible") signatures are digital signatures which the recipient cannot show round without the help of the signer. If forced to either acknowledge or deny a signature, however, the signer cannot deny it if it is authentic. We present the first undeniable signature scheme which is unconditionally secure for the signer (except for an exponentially small error pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Designs, Codes and Cryptography
سال: 2021
ISSN: ['0925-1022', '1573-7586']
DOI: https://doi.org/10.1007/s10623-020-00837-5