Non-linearity of exponent permutations
Josef Pieprzyk
- pp 80-92
TLDR
The paper deals with an examination of exponent permutations with respect to their non-linearity and examines the interrelation between non- linearity and Walsh transform.Abstract:
The paper deals with an examination of exponent permutations with respect to their non-linearity. The first part gives the necessary background to be able to determine permutation non-linearity. The second examines the interrelation between non-linearity and Walsh transform. The next part summarizes results gathered while experimenting with different binary fields. In the last part of the work, we discuss the results obtained and questions which are still open.read more
Citations
More filters
Book ChapterDOI
On almost perfect nonlinear permutations
Thomas Beth,Cunsheng Ding +1 more
TL;DR: Basic properties of APN permutations, which can be used in an iterated secret-key block cipher as a round function to protect it from a differential cryptanalysis, are investigated.
Book ChapterDOI
LOKI—a cryptographic primitive for authentication and secrecy applications
TL;DR: The LOKI primitive may be used in any mode of operation currently defined for ISO DEA-1, with which it is interface compatible, and two modes of operation which compute a 64-bit and 128-bit, Message Authentication Code (or hash value).
Book ChapterDOI
How to Improve the Nonlinearity of Bijective S-Boxes
TL;DR: Experimental results show that highly nonlinear bijective substitutions can be obtained by this method that are difficult to obtain by random generation.
Book ChapterDOI
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
TL;DR: It is shown that an XOR profile with carefully placed zeroes is required in order to avoid some variant forms of differential cryptanalysis, and permutation P needs to be chosen to prevent easy propagation of a constant XOR value back into the same S-box.
Journal ArticleDOI
Literature survey on nonlinear components and chaotic nonlinear components of block ciphers
Iqtadar Hussain,Tariq Shah +1 more
TL;DR: This work presents the details of the S-box synthesis process and issues pertaining to creating resistance against various types of attacks, and highlights the consequences of a particular design methodology.
References
More filters
Book
Algebraic Coding Theory
TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Proceedings Article
The strict avalanche criterion: spectral properties of boolean functions and an extended definition
TL;DR: A necessary and sufficient condition on the Walsh-spectrum of a boolean function is given, which implies that this function fulfills the Strict Avalanche Criterion and this condition is shown to be fulfilled for a class of functions exhibiting simple spectral symmetries.
Book
Cryptography: An Introduction to Computer Security
Jennifer Seberry,Josef Pieprzyk +1 more
TL;DR: Reading cryptography an introduction to computer security as soon as possible will lead you to always think more and more and this book will be always right for you.
Journal ArticleDOI
Preliminary comments on the m.i.t. public-key cryptosystem
TL;DR: In this paper, the authors discuss the M.I.T. public-key cryptography system and its role in the development of the modern cryptosystem, and make some preliminary comments.