Note on the integer geometry of bitwise XOR

نویسندگان

  • António Guedes de Oliveira
  • Diogo Oliveira e Silva
چکیده

We consider the set Z0 of non-negative integers endowed with a distance d defined as follows: given x, y ∈ Z0 , d(x, y) is, in binary notation, the result of performing, digit by digit, the “exlusive or” (in short, “XOR”) operation on (the binary notations of) x and y. Dawson, in [?], considers this geometry and suggests the following construction: given k different integers x1, . . . , xk ∈ Z0 , let Vi be the set of integers closer to xi than to any xj with j 6= i, for i, j = 1, . . . , k. Let V = (V1, . . . , Vk) and X = (x1, . . . , xk). V is a partition of {0, 2, . . . , 2n − 1} which, in general, does not determine X. Note that, by definition, V is the Voronoy diagram determined by X. In this paper, we characterize the convex sets of this geometry: they coincide with the line segments and correspond to set intervals through the set of non-zero digits. In particular, the sets of form Vi are convex. Given X and the partition V determined by X, we also characterize in the following terms the ordered sets Y = (y1, . . . , yk) that determine the same partition V: ∀ i = 1, 2, . . . , k, ∀j = 1, 2, . . . , k, j 6= i =⇒ d(yi, xj) , d(xi, yj) > d(yi, xi). This, in particular, extends one of the main results of [?].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Identities of Additive Binary Arithmetics

On the set of integers {0, 1, . . . , q − 1} = Zq, where q is a power of two, we consider two natural operation: addition modulo q and bitwise addition modulo 2. In computer literature, these operations are usually denoted by ADD and XOR; they are hardware implemented in all modern computers, as far as we know.* We consider two natural questions. 1. What function Zq → Zq can be expressed via th...

متن کامل

Note on side-channel attacks and their countermeasures

In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerability to cache attacks [15, 1, 13]. These attacks target the secret key by exploiting the variable time that an AES computation takes due to the storage of the large table in cache. From this one may conclude that algorithms that do not...

متن کامل

Uniformly distributed sequences of p-adic integers, II

The paper describes ergodic (with respect to the Haar measure) functions in the class of all functions that are defined on (and take values in) the ring Zp of p-adic integers, and satisfy (at least, locally) the Lipschitz condition with coefficient 1. Equiprobable (in particular, measure-preserving) functions of this class are described also. In some cases (and especially for p = 2) the descrip...

متن کامل

Deduction with XOR Constraints in Security API Modelling

We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols.

متن کامل

A Key Dependent Encryption Algorithm Based on Multiple Bitwise-Shuffling and XOR Variable-Length Partitions

Email: [email protected] Abstract: This new algorithm employs shuffling procedures combined with variable-length key-dependent XOR and S-box substitutions to perform lossless image encryption. This algorithm was implemented and tested by performing different permutations of shuffling, XOR encryption and S-box substitution. Empirical analysis using different types of test images of different s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Eur. J. Comb.

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2005