Arithmetic of Finite Fields
6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers
- 2016
- Buch
- Herausgegeben von
- Sylvain Duquesne
- Svetla Petkova-Nikova
- Buchreihe
- Lecture Notes in Computer Science
- Verlag
- Springer International Publishing
insite
SUCHEN
Über dieses Buch
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on the Arithmetic of Finite Field, WAIFI 2016, held in Ghent, Belgium, in July 2016.
The 14 revised full papers and 3 invited talks presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited talks; elliptic curves; applications; irreducible polynomials; applications to cryptography; Boolean functions; cryptography; cryptography and Boolean functions.
Anzeige
Inhaltsverzeichnis
-
Frontmatter
-
Invited Talk I
-
Frontmatter
-
A Brief History of Pairings
Razvan BarbulescuAbstractPairings are a relatively new tool in cryptography. Recent progress on the attack algorithms have changed the security estimations. We make a list of pairing families and explain their advantages but also their weaknesses.
-
-
Elliptic Curves
-
Frontmatter
-
Differential Addition on Binary Elliptic Curves
Reza Rezaeian Farashahi, Seyed Gholamhossein HosseiniAbstractThis paper presents extremely fast differential addition (i.e., the addition of two points with the known difference) and doubling formulas, as the core step in Montgomery scalar multiplication, for various forms of elliptic curves over binary fields. The formulas are provided for binary Edwards, binary Hessian and binary Huff elliptic curves with cost of \(5\mathbf {M}+4\mathbf {S}+1\mathbf {D}\) when the given difference point is in affine form. Here, \(\mathbf {M},\ \mathbf {S},\ \mathbf {D}\) denote the costs of a field multiplication, a field squaring and a field multiplication by a constant, respectively. This paper also presents, new complete differential addition formulas for binary Edwards curves with cost of \(5\mathbf {M}+4\mathbf {S}+2\mathbf {D}\). -
Adequate Elliptic Curves for Computing the Product of n Pairings
Loubna Ghammam, Emmanuel FouotsaAbstractMany pairing-based protocols require the computation of the product and/or of a quotient of n pairings where \(n>1\) is a natural integer. Zhang et al. [1] recently showed that the Kachisa-Schafer and Scott family of elliptic curves with embedding degree 16 denoted KSS16 at the 192-bit security level is suitable for such protocols comparatively to the Baretto-Lynn and Scott family of elliptic curves of embedding degree 12 (BLS12). In this work, we provide important corrections and improvements to their work based on the computation of the optimal Ate pairing. We focus on the computation of the final exponentiation which represent an important part of the overall computation of this pairing. Our results improve by 864 multiplications in \(\mathbb {F}_p\) the computations of Zhang et al. [1]. We prove that for computing the product or the quotient of 2 pairings, BLS12 curves are the best solution. In other cases, especially when \(n>2\) as mentioned in [1], KSS16 curves are recommended for computing product of n pairings. Furthermore, we prove that the curve presented by Zhang et al. [1] is not resistant against small subgroup attacks. We provide an example of KSS16 curve protected against such attacks. -
On Pseudorandom Properties of Certain Sequences of Points on Elliptic Curve
László MéraiAbstractIn this paper we study the pseudorandom properties of sequences of points on elliptic curves. These sequences are constructed by taking linear combinations with small coefficients (e.g. \(-1,0,+1\)) of the orbit elements of a point with respect to a given endomorphism of the curve. We investigate the linear complexity and the distribution of these sequences. The result on the linear complexity answers a question of Igor Shparlinski.
-
-
Applications
-
Frontmatter
-
Linear Complexity and Expansion Complexity of Some Number Theoretic Sequences
Richard Hofer, Arne WinterhofAbstractWe study the predictability of some number theoretic sequences over finite fields and thus their suitability in cryptography. First we analyze the non-periodic binary sequence \(\mathcal {T}=(t_n)_{n\ge 0}\) with \(t_n=1\) whenever n is the sum of three integer squares. We show that it has a large Nth linear complexity, which is necessary but not sufficient for unpredictability. However, it also has a very small expansion complexity and thus is rather predictable.Next we prove that some linear combinations of p-periodic sequences of binomial coefficients modulo a prime p have a very small expansion complexity and are predictable despite of a high linear complexity.Finally, we consider the Legendre sequence and verify that it does not belong to this class of predictable sequences.
-
-
Irreducible Polynomials
-
Frontmatter
-
On Sets of Irreducible Polynomials Closed by Composition
Andrea Ferraguti, Giacomo Micheli, Reto SchnyderAbstractLet \(\mathcal {S}\) be a set of monic degree 2 polynomials over a finite field and let C be the compositional semigroup generated by \(\mathcal S\). In this paper we establish a necessary and sufficient condition for C to be consisting entirely of irreducible polynomials. The condition we deduce depends on the finite data encoded in a certain graph uniquely determined by the generating set \(\mathcal {S}\). Using this machinery we are able both to show examples of semigroups of irreducible polynomials generated by two degree 2 polynomials and to give some non-existence results for some of these sets in infinitely many prime fields satisfying certain arithmetic conditions. -
A Note on the Brawley-Carlitz Theorem on Irreducibility of Composed Products of Polynomials over Finite Fields
Akihiro Munemasa, Hiroko NakamuraAbstractWe give a new proof of the Brawley-Carlitz theorem on irreducibility of the composed products of irreducible polynomials. Our proof shows that associativity of the binary operation for the composed product is not necessary. We then investigate binary operations defined by polynomial functions, and give a sufficient condition in terms of degrees for the requirement in the Brawley-Carlitz theorem.
-
-
Invited Talk II
-
Frontmatter
-
On Arcs and Quadrics
Simeon BallAbstractAn arc is a set of points of the \((k-1)\)-dimensional projective space over the finite field with q elements \({\mathbb F}_q\), in which every k-subset spans the space. In this article, we firstly review Glynn’s construction of large arcs which are contained in the intersection of quadrics. Then, for q odd, we construct a series of matrices \(\mathrm {F}_n\), where n is a non-negative integer and \(n \leqslant |G|-k-1\), which depend on a small arc G. We prove that if G can be extended to a large arc S of size \(q+2k-|G|+n-2\) then, for each vector v of weight three in the column space of \(\mathrm {F}_n\), there is a quadric \(\psi _v\) containing \(S \setminus G\). This theorem is then used to deduce conditions for the existence of quadrics containing all the vectors of S.
-
-
Applications to Cryptography
-
Frontmatter
-
A Generalised Successive Resultants Algorithm
James H. Davenport, Christophe Petit, Benjamin PringAbstractThe Successive Resultants Algorithm (SRA) is a root-finding algorithm for polynomials over \(\mathbb {F}_{p^n}\) and was introduced at ANTS in 2014 [19]. The algorithm is efficient when the characteristic p is small and \(n > 1\). In this paper, we abstract the core SRA algorithm to arbitrary finite fields and present three instantiations of our general algorithm, one of which is novel and makes use of a series of isogenies derived from elliptic curves with sufficiently smooth order. -
Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function
Thierry Mefenza, Damien VergnaudAbstractWe give some theoretical support to the security of the cryptographic pseudo-random function proposed by Dodis and Yampolskiy in 2005. We study the distribution of the function values over general finite fields and over elliptic curves defined over prime finite fields. We also prove lower bounds on the degree of polynomials interpolating the values of these functions in these two settings.
-
-
Boolean Functions
-
Frontmatter
-
A Conjecture About Gauss Sums and Bentness of Binomial Boolean Functions
Jean-Pierre FloriAbstractIn this note, the polar decomposition of binary fields of even extension degree is used to reduce the evaluation of the Walsh transform of binomial Boolean functions to that of Gauss sums. In the case of extensions of degree four times an odd number, an explicit formula involving a Kloosterman sum is conjectured, proved with further restrictions, and supported by extensive experimental data in the general case. In particular, the validity of this formula is shown to be equivalent to a simple and efficient characterization for bentness previously conjectured by Mesnager. -
Generalized Bent Functions and Their Gray Images
Thor Martinsen, Wilfried Meidl, Pantelimon StănicăAbstractIn this paper we prove that generalized bent (gbent) functions defined on \(\mathbb {F}_2^n\) with values in \(\mathbb {Z}_{2^k}\) are regular, and show connections between the (generalized) Walsh spectrum of these functions and their components. Moreover we analyze generalized bent and semibent functions with values in \(\mathbb {Z}_{16}\) in detail, extending earlier results on gbent functions with values in \(\mathbb {Z}_4\) and \(\mathbb {Z}_8\).
-
-
Cryptography
-
Frontmatter
-
Enhanced Digital Signature Using RNS Digit Exponent Representation
Thomas Plantard, Jean-Marc RobertAbstractDigital Signature Algorithm (DSA) involves modular exponentiation, of a public and known base by a random one-time exponent. In order to speed-up this operation, well-known methods take advantage of the memorization of base powers. However, due to the cost of the memory, to its small size and to the latency of access, previous research sought for minimization of the storage. In this paper, taking into account the modern processor features and the growing size of the cache memory, we improve the storage/efficiency trade-off, by using a RNS Digit exponent representation. We then propose algorithms for modular exponentiation. The storage is lower for equivalent complexities for modular exponentiation computation. The implementation performances show significant memory saving, up to 3 times for the largest NIST standardized key sizes compared to state of the art approaches. -
Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography
Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid VerbauwhedeAbstractIsogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form \(p=2\cdot {2^a}3^b-1\) with b even, typically used in such cryptosystem. Our modular multiplication algorithm exploits the special structure present in such primes. We compare the efficiency of our technique with Barrett reduction and Montgomery multiplication. Our C implementation shows that our algorithm is approximately 3 times faster than the normal Barrett reduction. -
A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
Stjepan Picek, Bohan Yang, Nele MentensAbstractAffine transformations are an often used tool in symmetric key cryptography. They are mostly known as a way of removing fixed points in S-boxes, as for instance in the AES S-box. In general, affine transformations do not have an influence on most cryptographic properties, since those properties are affine invariant; affine transformations only change the representation of the S-box. Because of that, there is not much research on what would be the best affine transformation in terms of usability in practical scenarios. With this research, we try to close that gap; we concentrate on several cryptographic properties and one implementation property that are variable under various affine transformations. To provide experimental validations, we concentrate on affine transformations in S-boxes of three sizes, namely, \(4\times 4\), \(5\times 5\), and \(8\times 8\). Our results indicate that it is possible to optimize one or more of the considered properties. Finally, although we experiment with only a handful of properties, our methodology is of a general nature and could be used for other cryptographic properties that are affine variant.
-
-
Cryptography and Boolean Functions
-
Frontmatter
-
A Super-Set of Patterson-Wiedemann Functions – Upper Bounds and Possible Nonlinearities
Selçuk Kavut, Subhamoy Maitra, Ferruh ÖzbudakAbstractConstructing Boolean functions on odd number of variables with nonlinearity exceeding the bent concatenation bound is one of the most difficult combinatorial problems in the domain of Boolean functions and it has deep implications to coding theory and cryptology. After demonstration of such functions by Patterson and Wiedemann in 1983, for more than three decades the efforts have been channelized in obtaining the instances only. For the first time, in this paper, we try to explore non-trivial upper bounds on nonlinearity of such functions which are invariant under several group actions. In fact, we consider much larger sets of functions than what have been considered so far and obtain tight upper bounds on the nonlinearity in several cases. To support our claims, we present computational results for functions on n variables where n is an odd composite integer, \(9\le n\le 39\). In particular, our results for \(n = 15\) and 21 are of immediate interest given recent research results in this domain. Not only the upper bounds, we also identify what are the nonlinearities that can actually be achieved above the bent concatenation bound for such class of functions. -
A Correction and Improvements of Some Recent Results on Walsh Transforms of Gold Type and Kasami-Welch Type Functions
Ayhan Coşgun, Ferruh ÖzbudakAbstractWe give explicit evaluations of Walsh transforms of Gold type functions \(f(x)=\mathrm{Tr}_K\left( x^{2^a+1}+x^{2^b+1} \right) \), \(0 \le a < b\) when \(\gcd \left( b-a, k \right) =\gcd \left( b+a, k \right) \) and Kasami-Welch type functions \(f(x)=\mathrm{Tr}_K\left( x^{\frac{2^{ta}+1}{2^a+1}} \right) \), when t is odd, \(\gcd \left( 2^k -1, 2^a + 1\right) =1\), k is even. Therefore we correct a recent result of Roy’2012, we solve an open problem stated in Roy’2012 and we improve and generalize some results of Roy’2012 and Lahtonen-McGuire-Ward’2007. -
A Practical Group Signature Scheme Based on Rank Metric
Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe GaboritAbstractIn this work, we propose the first rank-based group signature. Our construction enjoys two major advantages compared to concurrent post-quantum schemes since it is both practicably instantiated with public key and signature sizes logarithmic in the number of group members, and dynamic in a relaxation of the reference BSZ model. For such a result, we introduce a new rank-based tool, referred as the Rank Concatenated Stern’s protocol, enabling to link different users to a common syndrome. This protocol, which could be of independent interest, can be seen as a Stern-like protocol with an additional property that permits a verifier to check the weight of each part of a split secret. Along with this work, we also define two rank-based adaptations of Hamming-based problems, referred as the One More Rank Syndrome Decoding and the Decision Rank Syndrome Decoding problems for which we discuss the security. Embedded into Fiat-Shamir paradigm, our authentication protocol leads to a group signature scheme secure in the Random Oracle Model assuming the security of rank-based systems (namely RankSign and LRPC codes) and the newly introduced problems. For a 100 bits security level, we give an example of parameters which lead to a signature size of 550 kB and 5 kB for the public key.
-
-
Backmatter
- Titel
- Arithmetic of Finite Fields
- Herausgegeben von
-
Sylvain Duquesne
Svetla Petkova-Nikova
- Copyright-Jahr
- 2016
- Electronic ISBN
- 978-3-319-55227-9
- Print ISBN
- 978-3-319-55226-2
- DOI
- https://doi.org/10.1007/978-3-319-55227-9
Informationen zur Barrierefreiheit für dieses Buch folgen in Kürze. Wir arbeiten daran, sie so schnell wie möglich verfügbar zu machen. Vielen Dank für Ihre Geduld.