Skip to main content
Top
Published in: Cryptography and Communications 6/2019

19-07-2019

Unicyclic strong permutations

Authors: Claude Gravel, Daniel Panario, David Thomson

Published in: Cryptography and Communications | Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we study some properties of a certain kind of permutation σ over \(\mathbb {F}_{2}^{n}\), where n is a positive integer. The desired properties for σ are: (1) the algebraic degree of each component function is n − 1; (2) the permutation is unicyclic; (3) the number of terms of the algebraic normal form of each component is at least 2n− 1. We call permutations that satisfy these three properties simultaneously unicyclic strong permutations. We prove that our permutations σ always have high algebraic degree and that the average number of terms of each component function tends to 2n− 1. We also give a condition on the cycle structure of σ. We observe empirically that for n even, our construction does not provide unicylic permutations. For n odd, n ≤ 11, we conduct an exhaustive search of all σ given our construction for specific examples of unicylic strong permutations. We also present some empirical results on the difference tables and linear approximation tables of σ.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Bacher, A., Bodini, O., Hwang, H.-K., Tsai, T.-H.: Generating random permutations by coin tossing: Classical algorithms, new analysis, and modern implementation. ACM Trans. Algor. 13(2), 1–43 (2017)MathSciNetCrossRef Bacher, A., Bodini, O., Hwang, H.-K., Tsai, T.-H.: Generating random permutations by coin tossing: Classical algorithms, new analysis, and modern implementation. ACM Trans. Algor. 13(2), 1–43 (2017)MathSciNetCrossRef
2.
3.
4.
go back to reference Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. monography’s chapter, pp 257–397. Cambridge University Press (2010) Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. monography’s chapter, pp 257–397. Cambridge University Press (2010)
5.
go back to reference Carlet, C.: Vectorial boolean functions for cryptography. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. monography’s chapter, pp 398–469. Cambridge University Press (2010) Carlet, C.: Vectorial boolean functions for cryptography. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. monography’s chapter, pp 398–469. Cambridge University Press (2010)
6.
go back to reference Daemen, J., Vincent, R.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media (2013) Daemen, J., Vincent, R.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media (2013)
7.
go back to reference Flajolet, P., Odlyzko, A.M.: Random mapping statistics. In: Quisquater, J.-J., Vandewalle, J. (eds.) Advances in Cryptology — EUROCRYPT ’89, vol. 434, pp 329–354. LNCS (1990) Flajolet, P., Odlyzko, A.M.: Random mapping statistics. In: Quisquater, J.-J., Vandewalle, J. (eds.) Advances in Cryptology — EUROCRYPT ’89, vol. 434, pp 329–354. LNCS (1990)
8.
go back to reference Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 1st edn. Cambridge University Press (2009) Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 1st edn. Cambridge University Press (2009)
9.
10.
go back to reference Xiao, G.-Z., Massey, L., James: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 34(3), 569–571 (1988)MathSciNetCrossRef Xiao, G.-Z., Massey, L., James: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 34(3), 569–571 (1988)MathSciNetCrossRef
11.
go back to reference Matsui, M.: Linear cryptanalysis method for DES cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp 386–397. Springer (1993) Matsui, M.: Linear cryptanalysis method for DES cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp 386–397. Springer (1993)
12.
go back to reference Mullen, G.L., Panario, D: Handbook of Finite Fields. Chapman & Hall/CRC (2013) Mullen, G.L., Panario, D: Handbook of Finite Fields. Chapman & Hall/CRC (2013)
13.
go back to reference Nyberg, K.: Statistical and linear independence of binary random variables. Cryptology ePrint Archive Report 2017/432 (2017) Nyberg, K.: Statistical and linear independence of binary random variables. Cryptology ePrint Archive Report 2017/432 (2017)
14.
go back to reference Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Info. Th. 30, 776–780 (1984)MathSciNetCrossRef Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Info. Th. 30, 776–780 (1984)MathSciNetCrossRef
15.
go back to reference Szpankowski, W.: Average Case Analysis of Algorithms on Sequences. Wiley (2001) Szpankowski, W.: Average Case Analysis of Algorithms on Sequences. Wiley (2001)
16.
Metadata
Title
Unicyclic strong permutations
Authors
Claude Gravel
Daniel Panario
David Thomson
Publication date
19-07-2019
Publisher
Springer US
Published in
Cryptography and Communications / Issue 6/2019
Print ISSN: 1936-2447
Electronic ISSN: 1936-2455
DOI
https://doi.org/10.1007/s12095-019-00384-4

Other articles of this Issue 6/2019

Cryptography and Communications 6/2019 Go to the issue

Premium Partner