scispace - formally typeset
Open AccessBook ChapterDOI

Non-linearity of exponent permutations

TLDR
The paper deals with an examination of exponent permutations with respect to their non-linearity and examines the interrelation between non- linearity and Walsh transform.
Abstract
The paper deals with an examination of exponent permutations with respect to their non-linearity. The first part gives the necessary background to be able to determine permutation non-linearity. The second examines the interrelation between non-linearity and Walsh transform. The next part summarizes results gathered while experimenting with different binary fields. In the last part of the work, we discuss the results obtained and questions which are still open.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

On almost perfect nonlinear permutations

TL;DR: Basic properties of APN permutations, which can be used in an iterated secret-key block cipher as a round function to protect it from a differential cryptanalysis, are investigated.
Book ChapterDOI

LOKI—a cryptographic primitive for authentication and secrecy applications

TL;DR: The LOKI primitive may be used in any mode of operation currently defined for ISO DEA-1, with which it is interface compatible, and two modes of operation which compute a 64-bit and 128-bit, Message Authentication Code (or hash value).
Book ChapterDOI

How to Improve the Nonlinearity of Bijective S-Boxes

TL;DR: Experimental results show that highly nonlinear bijective substitutions can be obtained by this method that are difficult to obtain by random generation.
Book ChapterDOI

Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI

TL;DR: It is shown that an XOR profile with carefully placed zeroes is required in order to avoid some variant forms of differential cryptanalysis, and permutation P needs to be chosen to prevent easy propagation of a constant XOR value back into the same S-box.
Journal ArticleDOI

Literature survey on nonlinear components and chaotic nonlinear components of block ciphers

TL;DR: This work presents the details of the S-box synthesis process and issues pertaining to creating resistance against various types of attacks, and highlights the consequences of a particular design methodology.
References
More filters
Book

Algebraic Coding Theory

TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Proceedings Article

The strict avalanche criterion: spectral properties of boolean functions and an extended definition

TL;DR: A necessary and sufficient condition on the Walsh-spectrum of a boolean function is given, which implies that this function fulfills the Strict Avalanche Criterion and this condition is shown to be fulfilled for a class of functions exhibiting simple spectral symmetries.
Book

Cryptography: An Introduction to Computer Security

TL;DR: Reading cryptography an introduction to computer security as soon as possible will lead you to always think more and more and this book will be always right for you.
Journal ArticleDOI

Preliminary comments on the m.i.t. public-key cryptosystem

TL;DR: In this paper, the authors discuss the M.I.T. public-key cryptography system and its role in the development of the modern cryptosystem, and make some preliminary comments.