Cryptographically strong permutations from the butterfly structure

نویسندگان

چکیده

Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, function desired have uniformity as low its differential uniformity. Based on generalized butterfly structures recently introduced by Canteaut, Duval and Perrin, this paper presents infinite families permutations $${\mathbb {F}}_{2^{2n}}$$ for positive odd integer n, which best known nonlinearity 4. Both open closed are considered. The butterflies, according experimental results, appear not produce with On other hand, from butterflies we derive condition coefficients $$\alpha , \beta \in {\mathbb {F}}_{2^n}$$ such that $$\begin{aligned} V_i(x,y) := (R_i(x,y), R_i(y,x)), \end{aligned}$$ where $$R_i(x,y)=(x+\alpha y)^{2^i+1}+\beta y^{2^i+1}$$ $$\gcd (i,n)=1$$ permute $${{\mathbb {F}}}_{2^n}^2$$ In addition, results $$n=3, 5$$ indicate proposed seems cover all $$V_i(x,y)$$

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How To Generate Cryptographically Strong Sequences

Much effort has been devoted in the second half of this century to make precise the notion of Randomness. Let us informally recall one of these definitions due to Kolmogorov []. A sequence of bits A =all a2••.•• at is random if the length of the minimal program outputting A is at least k We remark that the above definition is highly non constructive and rules out the possibility of pseudo rando...

متن کامل

On the Generation of Cryptographically Strong Elliptic Curves

We discuss two methods for generating cryptographically strong elliptic curves deened over nite prime elds. The advantages and disadvantages of these algorithms are discussed and a practical comparison of the algorithms is given.

متن کامل

On the Difficulty of Constructing Cryptographically Strong Substitution Boxes

Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attack...

متن کامل

Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer

"Undeniable" (or perhaps rather "invisible") signatures are digital signatures which the recipient cannot show round without the help of the signer. If forced to either acknowledge or deny a signature, however, the signer cannot deny it if it is authentic. We present the first undeniable signature scheme which is unconditionally secure for the signer (except for an exponentially small error pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Designs, Codes and Cryptography

سال: 2021

ISSN: ['0925-1022', '1573-7586']

DOI: https://doi.org/10.1007/s10623-020-00837-5