Statistical Properties of Multiplication mod 2

نویسندگان

  • S. M. Dehnavi
  • M. R. Mirzaee
  • Hamidreza Maimani
  • Einollah Pasha
چکیده

In this paper, we investigate some statistical properties of multiplication mod 2 for cryptographic use. For this purpose, we introduce a family of T-functions similar to modular multiplication, which we call M-functions. We obtain the probability distribution of M-functions as vectorial Boolean functions. At first, we determine the joint probability distribution of arbitrary number of the output of an M-function component bits. Then, we obtain the probability distribution of the component Boolean functions of combination of a linear transformation with an M-function. After that, using a new measure for computing the imbalance of maps, we show that the restriction of the output of an M-function to its upper bits is asymptotically balanced.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A practical “perfect” pseudo-random number generator

The “x2 mod N” generator, also known as the BBS generator [2], has a strong theoretical foundation from the computational complexity theory and the number theory. Proofs were given that, under certain reasonable assumptions on which modern cryptography heavily relies, the BBS pseudo-random sequences would pass any feasible statistical test. Unfortunately, the algorithm was found to be too slow ...

متن کامل

On a congruence property of elliptic curves

Let d, α ∈ Z with d > 1. In this paper, we proved the following results about congruence properties of elliptic curves: (1) For elliptic curve E over the rational number field Q, if ♯Ẽp(Fp) ≡ α (mod d) hold for almost all primes p, then almost all supersingular primes p of E satisfy p ≡ α − 1 (mod d). In particular, α−1 is prime to d. Moreover, if φ(d) > 2, then E does not have complex multipli...

متن کامل

SOME REMARKS CONCERNING MOD-n K-THEORY

The spectral sequence predicted by A. Beilinson relating motivic cohomology to algebraic K-theory has been established for smooth quasi-projective varieties over a field (cf. [FS], [L1]). Among other properties verified, this spectral sequence has the expected multiplicative behavior (involving cup product in motivic cohomology and product in algebraic K-theory) and a good multiplicative “mod-n...

متن کامل

Montgomery-Suitable Cryptosystems

Montgomery’s algorithm [8], hereafter denoted Mn(·, ·), is a process for computing Mn(A,B) = ABN mod n where N is a constant factor depending only on n. Usually, AB mod n is obtained by Mn(Mn(A,B), N −2 mod n) but in this article, we introduce an alternative approach consisting in pre-integrating N into cryptographic keys so that a single Mn(·, ·) will replace directly each modular multiplicati...

متن کامل

Gemplus' Corporate Product R&d Division 1. How to Improve an Exponentiation Black-box

In this paper we present a method for improving the performance of RSA-type exponentiations. The scheme is based on the observation that replacing the exponent d by d 0 = d + k'n has no arithmetic impact but results in signiicant speed-ups when k is properly chosen. Statistical analysis, veriied by extensive simulations, connrms a performance improvement of 9.3 for the square-and-multiply schem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015