期刊文献+

用牟比乌斯变换逼近有限域上的置换(英文)

Approximating a permutation over finite fields by Mbius transformations
下载PDF
导出
摘要 对称密码技术中使用的许多非线性函数是基于牟比乌斯变换构造的,因此很可能保有某些几何不变量.基于牟比乌斯变换,Courtois构造了能够抵抗线性密码分析和差分密码分析的不安全的密码体制.于是通过量化有限域上的映射被牟比乌斯变换逼近的程度,给出了牟比乌斯变换逼近有限域上线性函数的度量的下界,并将我们提出的量与有限域上置换的Carlitz秩进行了比较. Many nonlinear transformations and hence functions used in symmetric ciphers are may preserve some geometric lnvanants. based on MObius Based on MObius transformations Courtois devised insecure block ciphers which are nonetheless invulnerable against both linear cryptanalysis and differential cryptanalysis. The authors quantified how a mapping on a finite field is approximated by MObius transformations, gave a lower bound to measure how linear functions of a finite field were approximated by MObius transformations, and also compared the proposed quantity with the Carlitz rank of a permutation on a finite field.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2013年第7期569-573,共5页 JUSTC
基金 Supported by the Applied Basic Research Program of the Sichuan Province(2011JY0143)
关键词 置换多项式 Carlitz秩 牟比乌斯变换 permutation polynomial Carlitz rank MObius transformation
  • 相关文献

参考文献11

  • 1Daemen J, Rijmen V. The Design Of Rijndael AES - The Advanced Encryption Standard [M]. Berlin: Springer-Verlag, 2002.
  • 2Liu F, Ji W, Hu L, et al. Analysis of the SMS,4 block cipher [C]// Proceedings of the 12th Australasian conference on Information security and privacy. Townsville, Australia: Springer, 2007: 158-170.
  • 3Courtois N T. The inverse S-box, non-linear polynomial relations and cryptanalysis of block ciphers [C]// Proceedings of the 4th international conference on Advanced Encryption Standard Bonn, Germany: Springer, 2004: 170-188.
  • 4Carlitz L. Permutations in a finite field [J]. Proceedings of the American Mathematical Society, 1953, 4- 538.
  • 5Chou W S. On inversive maximal period polynomials over finite fields [ J ]. Applicable Algebra in Engineering, Communication and Computing, 1995, 6(4-5) : 245-250.
  • 6Chou W S. The period lengths of inversive pseudorandom vector generations[J]. Finite Fields and Their Applications, 1995, 1(1): 126-132.
  • 7Aksoy E, Cesmelioglu A, Meidl W, et al. On the Carlitz rank of permutation polynomials [J]. Finite Fields and Their Applications, 2009, 15(4): 428-440.
  • 8Cesmelioglu A, Meidl W, Topuzoglu A. On the cycle structure of permutation polynomials[J]. Finite Fields and Their Applications, 2008, 14(3):593-614.
  • 9Matsui M. Linear cryptanalysis method for DES cipher [C]// Workshops on the Theory and Application of Cryptographyie Techniques on Advances in Cryptology. Lofthus, Norway: Springer, 1994 : 386-397.
  • 10Biham E, Shamir A. Differential cryptanalysis of DES- like cryptosystems[J]. Journal of Cryptology, 1991, 4(1) : 3-72.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部