The state diagram of $$\chi $$

Author:

Schoone JanORCID,Daemen Joan

Abstract

AbstractIn symmetric cryptography, block ciphers, stream ciphers and permutations often make use of a round function and many round functions consist of a linear and a non-linear layer. One that is often used is based on the cellular automaton that is denoted by $$\chi $$ χ as a Boolean map on bi-infinite sequences, $${\mathbb {F}}_2^{{\mathbb {Z}}}$$ F 2 Z . It is defined by $$\sigma \mapsto \nu $$ σ ν where each $$\nu _i = \sigma _i + (\sigma _{i+1}+1)\sigma _{i+2}$$ ν i = σ i + ( σ i + 1 + 1 ) σ i + 2 . A map $$\chi _n$$ χ n is a map that operates on n-bit arrays with periodic boundary conditions. This corresponds with $$\chi $$ χ restricted to periodic infinite sequences with period that divides n. This map $$\chi _n$$ χ n is used in various permutations, e.g., Keccak-f (the permutation in SHA-3), ASCON (the NIST standard for lightweight cryptography), Xoodoo, Rasta and Subterranean (2.0). In this paper, we characterize the graph of $$\chi $$ χ on periodic sequences. It turns out that $$\chi $$ χ is surjective on the set of all periodic sequences. We will show what sequences will give collisions after one application of $$\chi $$ χ . We prove that, for odd n, the order of $$\chi _n$$ χ n (in the group of bijective maps on $${\mathbb {F}}_2^n$$ F 2 n ) is $$2^{\lceil {\text {lg}}(\frac{n+1}{2})\rceil }$$ 2 lg ( n + 1 2 ) . A given periodic sequence lies on a cycle in the graph of $$\chi $$ χ , or it can be represented as a polynomial. By regarding the divisors of such a polynomial one can see whether it lies in a cycle, or after how many iterations of $$\chi $$ χ it will. Furthermore, we can see, for a given $$\sigma $$ σ , the length of the cycle in its component in the state diagram. Finally, we extend the surjectivity of $$\chi $$ χ to $${\mathbb {F}}_2^{{\mathbb {Z}}}$$ F 2 Z , thus to include non-periodic sequences.

Funder

H2020 European Research Council

Publisher

Springer Science and Business Media LLC

Subject

Applied Mathematics,Computer Science Applications

Reference20 articles.

1. Ahmad S.: Cycle structure of automorphisms of finite cyclic groups. J. Comb. Theory 6(4), 370–374 (1969).

2. Bertoni G., Daemen J., Peeters M., Van Assche G.: KECCAK specifications, NIST SHA-3 Submission (2008). http://keccak.noekeon.org/.

3. Çeşmelioğlu A., Meidl W., Topuzoğlu A.: On the cycle structure of permutation polynomials. Finite Fields Appl. 14, 593–614 (2008).

4. Claesen L., Daemen J., Genoe M., Peeters G.: Subterranean: a 600 mbit/sec cryptographic vlsi chip, pp. 610–613 (1993).

5. Daemen J.: Cipher and Hash Function Design Strategies based on linear and differential cryptanalysis. Ph.D. thesis, Katholieke Universiteit Leuven (1995).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3