In this paper, we study a new flexible method to extend linearly the graph of nonlinear, and usually not bijective, function so that resulting extension is bijection. Our motivation comes from cryptography. Examples symmetric cryptography are given as how was used implicitly in construction some well-known block ciphers. The heavily relies on ideas brought linear coding theory secret sharing. W...