Author:
Daemen Joan,Kuijsters Daniël,Mella Silvia,Verbakel Denise
Abstract
AbstractMany modern cryptographic primitives for hashing and (authenticated) encryption make use of constructions that are instantiated with an iterated cryptographic permutation that operates on a fixed-width state consisting of an array of bits. Often, such permutations are the repeated application of a relatively simple round function consisting of a linear layer and a non-linear layer. These constructions do not require that the underlying function is a permutation and they can plausibly be based on a non-invertible transformation. Recently, Grassi proposed the use of non-invertible mappings operating on arrays of digits that are elements of a finite field of odd characteristic for so-called MPC-/FHE-/ZK-friendly symmetric cryptographic primitives. In this work, we consider a mapping that we call $$\gamma $$
γ
that has a simple expression and is based on squaring. We discuss, for the first time, the differential and linear propagation properties of $$\gamma $$
γ
and observe that these follow the same rules up to a relabeling of the digits. This is an intriguing property that, as far as we know, only exists for $$\gamma $$
γ
and the binary mapping $$\chi _{_{3}}$$
χ
3
that is used in the cryptographic permutation Xoodoo. Moreover, we study the implications of its non-invertibility on differentials with zero output difference and on biases at the output of the $$\gamma $$
γ
mapping and show that they are as small as they can possibly be.
Funder
European Research Council
European Commission
Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Duplexing the sponge: singlepass authenticated encryption and other applications. Cryptology ePrint archive, paper 2011/499. (2011) https://eprint.iacr.org/2011/499
2. Bertoni, G., Daemen, J., Hoffert, S., Peeters, M., Assche, G.V., Keer, R.V.: Farfalle: parallel permutation-based cryptography. IACR Trans. Symmetric Cryptol. 2017(4), 1–38 (2017)
3. Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151–162 (1997). https://doi.org/10.1007/S001459900025
4. Kölbl, S., Tischhauser, E., Derbez, P., Bogdanov, A.: Troika: a ternary cryptographic hash function. Des. Codes Crypt. 88(1), 91–117 (2019). https://doi.org/10.1007/s10623-019-00673-2
5. Albrecht, M.R., Grassi, L., Rechberger, C., Roy, A., Tiessen, T.: MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity. Advances in cryptology - ASIACRYPT (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献