A New Class of Invertible Mappings

作者: Alexander Klimov , Adi Shamir

DOI: 10.1007/3-540-36400-5_34

关键词:

摘要: Invertible transformations over n-bit words are essential ingredients in many cryptographic constructions. When n is small (e.g., = 8) we can compactly represent any such transformation as a lookup table, but when large 64) usually have to it composition of simpler operations linear mappings, S-P networks, Feistel structures, etc. Since these constructions often implemented software on standard microprocessors, particularly interested invertible univariate or multivariate which be compositions basic machine instructions 32 64 bit words. In this paper introduce new class provably mappings mix arithmetic (negation, addition, subtraction, multiplication) and boolean (not, xor, and, or), highly efficient, desirable properties. particular, show that for the mapping x ? + (x2 C) (mod 2n) permutation with single cycle length 2n iff both least significant third constant C 1.

参考文章(12)
Eli Biham, A Fast New DES Implementation in Software fast software encryption. pp. 260- 272 ,(1997) , 10.1007/BFB0052352
Spatial Data Types for Database Systems Springer Berlin Heidelberg. ,(1997) , 10.1007/BFB0028319
Bruce Schneier, John Kelsey, Unbalanced Feistel Networks and Block Cipher Design fast software encryption. pp. 121- 144 ,(1996) , 10.1007/3-540-60865-6_49
Ronald L. Rivest, Permutation Polynomials Modulo 2w Finite Fields and Their Applications. ,vol. 7, pp. 287- 292 ,(2001) , 10.1006/FFTA.2000.0282
Adi Shamir, Efficient Signature Schemes Based on Birational Permutations international cryptology conference. pp. 1- 12 ,(1993) , 10.1007/3-540-48329-2_1
Horst Feistel, Cryptography and Computer Privacy Scientific American. ,vol. 228, pp. 15- 23 ,(1973) , 10.1038/SCIENTIFICAMERICAN0573-15
Ralph Howard, Data encryption standard Information Age archive. ,vol. 9, pp. 204- 210 ,(1987)
Helger Lipmaa, Shiho Moriai, Efficient algorithms for computing differential properties of addition Lecture Notes in Computer Science. pp. 336- 350 ,(2002)
Vladimir Furman, Differential cryptanalysis of nimbus Lecture Notes in Computer Science. pp. 187- 195 ,(2002)