Pub Date : 2024-09-17DOI: 10.1007/s12095-024-00738-7
Xinyu Tian, Hongyu Han, Udaya Parampalli
The low-hit-zone (LHZ) frequency-hopping sequence (FHS) sets are commonly applied in quasi-synchronous (QS) frequency-hopping multiple access (FHMA) systems to reduce MA interference. In addition, due to the short synchronization time or sophisticated hardware, the correlation window is typically less than the period of the selected FHS set. In this paper, we construct a class of LHZ FHS sets with strictly optimal partial Hamming correlation (PHC) based on the Chinese Remainder Theorem (CRT) and analyze the PHC of our constructed LHZ FHS sets. It turns out that the new LHZ FHS sets are optimal with respect to the Niu-Peng-Fan bound.
{"title":"Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem","authors":"Xinyu Tian, Hongyu Han, Udaya Parampalli","doi":"10.1007/s12095-024-00738-7","DOIUrl":"https://doi.org/10.1007/s12095-024-00738-7","url":null,"abstract":"<p>The low-hit-zone (LHZ) frequency-hopping sequence (FHS) sets are commonly applied in quasi-synchronous (QS) frequency-hopping multiple access (FHMA) systems to reduce MA interference. In addition, due to the short synchronization time or sophisticated hardware, the correlation window is typically less than the period of the selected FHS set. In this paper, we construct a class of LHZ FHS sets with strictly optimal partial Hamming correlation (PHC) based on the Chinese Remainder Theorem (CRT) and analyze the PHC of our constructed LHZ FHS sets. It turns out that the new LHZ FHS sets are optimal with respect to the Niu-Peng-Fan bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142263833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-04DOI: 10.1007/s12095-024-00740-z
Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng
Boukerrou et al. (IACR Trans. Symm. Cryptol. 2020(1), 331–362, 2020) introduced the notion of the Feistel Boomerang Connectivity Table (FBCT), the Feistel counterpart of the Boomerang Connectivity Table (BCT), and the Feistel boomerang uniformity (which is the same as the second-order zero differential uniformity in even characteristic fields). The FBCT is a crucial table for the analysis of the resistance of block ciphers to power attacks such as differential and boomerang attacks. It is worth noting that the coefficients of the FBCT are related to the second-order zero differential spectra of functions and the FBCT of functions can be extended as their second-order zero differential spectra. In this paper, by carrying out certain finer manipulations consisting of solving some specific equations over finite fields, we explicitly determine the second-order zero differential spectra of some power functions with low differential uniformity, and show that these functions also have low second-order zero differential uniformity. Our study further pushes previous investigations on second-order zero differential uniformity and Feistel boomerang uniformity for a power function F.
Boukerrou 等人(IACR Trans.Symm.Cryptol.2020(1),331-362,2020)提出了费斯特回旋镖连接表(FBCT)的概念,即回旋镖连接表(BCT)的费斯特对应表,以及费斯特回旋镖均匀性(与偶数特征域中的二阶零微分均匀性相同)。FBCT 是分析块密码对差分攻击和回旋镖攻击等强力攻击的抵抗能力的重要表格。值得注意的是,FBCT 的系数与函数的二阶零微分谱相关,函数的 FBCT 可以扩展为函数的二阶零微分谱。在本文中,我们通过求解有限域上的一些特定方程等精细操作,明确确定了一些具有低微分均匀性的幂函数的二阶零微分谱,并证明这些函数也具有低二阶零微分均匀性。我们的研究进一步推动了之前关于幂函数 F 的二阶零微分均匀性和费氏回旋镖均匀性的研究。
{"title":"On the second-order zero differential spectra of some power functions over finite fields","authors":"Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng","doi":"10.1007/s12095-024-00740-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00740-z","url":null,"abstract":"<p>Boukerrou et al. (IACR Trans. Symm. Cryptol. <b>2020</b>(1), 331–362, 2020) introduced the notion of the Feistel Boomerang Connectivity Table (FBCT), the Feistel counterpart of the Boomerang Connectivity Table (BCT), and the Feistel boomerang uniformity (which is the same as the second-order zero differential uniformity in even characteristic fields). The FBCT is a crucial table for the analysis of the resistance of block ciphers to power attacks such as differential and boomerang attacks. It is worth noting that the coefficients of the FBCT are related to the second-order zero differential spectra of functions and the FBCT of functions can be extended as their second-order zero differential spectra. In this paper, by carrying out certain finer manipulations consisting of solving some specific equations over finite fields, we explicitly determine the second-order zero differential spectra of some power functions with low differential uniformity, and show that these functions also have low second-order zero differential uniformity. Our study further pushes previous investigations on second-order zero differential uniformity and Feistel boomerang uniformity for a power function <i>F</i>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-02DOI: 10.1007/s12095-024-00742-x
Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild
We describe new, simple, recursive methods of construction for orientable sequences over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of n consecutive elements occurs at most once in a period in either direction. In particular we establish how two variants of a generalised Lempel homomorphism can be used to recursively construct such sequences, generalising previous work on the binary case. We also derive an upper bound on the period of an orientable sequence.
{"title":"Orientable sequences over non-binary alphabets","authors":"Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild","doi":"10.1007/s12095-024-00742-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00742-x","url":null,"abstract":"<p>We describe new, simple, recursive methods of construction for <i>orientable sequences</i> over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of <i>n</i> consecutive elements occurs at most once in a period in either direction. In particular we establish how two variants of a generalised Lempel homomorphism can be used to recursively construct such sequences, generalising previous work on the binary case. We also derive an upper bound on the period of an orientable sequence.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-29DOI: 10.1007/s12095-024-00741-y
Gyanendra K. Verma, R. K. Sharma
In (Shi et al. Finite Fields Appl.80, 102087 2022) studied additive cyclic complementary dual codes with respect to trace Euclidean and trace Hermitian inner products over the finite field (mathbb {F}_4). In this article, we extend their results over (mathbb {F}_{q^2},) where q is an odd prime power. We describe the algebraic structure of additive cyclic codes and obtain the dual of a class of these codes with respect to the trace inner products. We also use generating polynomials to construct several examples of additive cyclic codes over (mathbb {F}_9.) These codes are better than linear codes of the same length and size. Furthermore, we describe the subfield codes and the trace codes of these codes as linear cyclic codes over (mathbb {F}_q).
{"title":"Trace dual of additive cyclic codes over finite fields","authors":"Gyanendra K. Verma, R. K. Sharma","doi":"10.1007/s12095-024-00741-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00741-y","url":null,"abstract":"<p>In (Shi et al. <i>Finite Fields Appl.</i> <b>80</b>, 102087 2022) studied additive cyclic complementary dual codes with respect to trace Euclidean and trace Hermitian inner products over the finite field <span>(mathbb {F}_4)</span>. In this article, we extend their results over <span>(mathbb {F}_{q^2},)</span> where <i>q</i> is an odd prime power. We describe the algebraic structure of additive cyclic codes and obtain the dual of a class of these codes with respect to the trace inner products. We also use generating polynomials to construct several examples of additive cyclic codes over <span>(mathbb {F}_9.)</span> These codes are better than linear codes of the same length and size. Furthermore, we describe the subfield codes and the trace codes of these codes as linear cyclic codes over <span>(mathbb {F}_q)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-27DOI: 10.1007/s12095-024-00736-9
Jiayuan Zhang, Xiaoshan Kai, Ping Li
Constacyclic BCH codes are an interesting subclass of constacyclic codes because of their important theoretical and practical value. The purpose of this paper is to study the parameters of cyclic BCH codes of length (varvec{n = q^{m} - 1}) and negacyclic BCH codes of length (varvec{n = frac{q^{m} - 1}{2}}). We settle completely their dimensions. We also determine the minimum distances of a class of cyclic BCH codes of length (varvec{n = q^m - 1}) and give a lower bound on the minimum distances of other classes of constacyclic BCH codes. As seen by the code examples in this paper, the lower bound on the minimum distances of constacyclic BCH codes we gave is very close to the true minimum distances. These (varvec{q})-ary codes have good parameters in general.
{"title":"Two classes of q-ary constacyclic BCH codes","authors":"Jiayuan Zhang, Xiaoshan Kai, Ping Li","doi":"10.1007/s12095-024-00736-9","DOIUrl":"https://doi.org/10.1007/s12095-024-00736-9","url":null,"abstract":"<p>Constacyclic BCH codes are an interesting subclass of constacyclic codes because of their important theoretical and practical value. The purpose of this paper is to study the parameters of cyclic BCH codes of length <span>(varvec{n = q^{m} - 1})</span> and negacyclic BCH codes of length <span>(varvec{n = frac{q^{m} - 1}{2}})</span>. We settle completely their dimensions. We also determine the minimum distances of a class of cyclic BCH codes of length <span>(varvec{n = q^m - 1})</span> and give a lower bound on the minimum distances of other classes of constacyclic BCH codes. As seen by the code examples in this paper, the lower bound on the minimum distances of constacyclic BCH codes we gave is very close to the true minimum distances. These <span>(varvec{q})</span>-ary codes have good parameters in general.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-26DOI: 10.1007/s12095-024-00737-8
Mousumi Ghosh, Sachin Pathak, Dipendu Maity
In this paper, we construct a class of (mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-additive cyclic codes generated by 3-tuples of polynomials, where p is a prime number and (1 le r le s le t). We investigate the algebraic structure of these codes and establish that it is possible to determine generator matrices for a subfamily of codes within this class. We employ a probabilistic approach to analyze the asymptotic properties of these codes. For any positive real number (delta ) satisfying (0< delta < 1) such that the asymptotic Gilbert-Varshamov bound at (left( frac{k+l+n}{3p^{r-1}}delta right) ) is greater than (frac{1}{2}), we demonstrate that the relative distance of the random code converges to (delta ), while the rate of the random code converges to (frac{1}{k+l+n}). Finally, we conclude that the (mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-additive cyclic codes exhibit asymptotically good properties.
在本文中,我们构建了一类由 3 组多项式生成的 (mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-附加循环码,其中 p 是素数且 (1 le r le s le t)。我们研究了这些编码的代数结构,并确定有可能确定该类编码中一个子族的生成矩阵。我们采用概率方法来分析这些编码的渐近特性。对于满足 (0< delta <;1),使得在 (left( frac{k+l+n}{3p^{r-1}}delta right) )处的渐近吉尔伯特-瓦尔沙莫夫边界大于 (frac{1}{2}),我们证明随机码的相对距离收敛于 (delta),而随机码的速率收敛于 (frac{1}{k+l+n})。最后,我们得出结论:(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-附加循环码表现出渐进的良好特性。
{"title":"On $$mathbb {Z}_{p^r} mathbb {Z}_{p^s} mathbb {Z}_{p^t}$$ -additive cyclic codes exhibit asymptotically good properties","authors":"Mousumi Ghosh, Sachin Pathak, Dipendu Maity","doi":"10.1007/s12095-024-00737-8","DOIUrl":"https://doi.org/10.1007/s12095-024-00737-8","url":null,"abstract":"<p>In this paper, we construct a class of <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes generated by 3-tuples of polynomials, where <i>p</i> is a prime number and <span>(1 le r le s le t)</span>. We investigate the algebraic structure of these codes and establish that it is possible to determine generator matrices for a subfamily of codes within this class. We employ a probabilistic approach to analyze the asymptotic properties of these codes. For any positive real number <span>(delta )</span> satisfying <span>(0< delta < 1)</span> such that the asymptotic Gilbert-Varshamov bound at <span>(left( frac{k+l+n}{3p^{r-1}}delta right) )</span> is greater than <span>(frac{1}{2})</span>, we demonstrate that the relative distance of the random code converges to <span>(delta )</span>, while the rate of the random code converges to <span>(frac{1}{k+l+n})</span>. Finally, we conclude that the <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes exhibit asymptotically good properties.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-20DOI: 10.1007/s12095-024-00733-y
Makoto Araya, Masaaki Harada
We study the largest minimum weights among quaternary Hermitian LCD codes. We determine the largest minimum weights among quaternary Hermitian LCD codes of length n and dimension k for (k le n le 17). A quaternary Hermitian LCD [21, 5, 13] code and a quaternary Hermitian LCD [21, 9, 9] code are also constructed for the first time. An updated table of the largest minimum weights among quaternary Hermitian LCD [n, k] codes is also given for (k le n le 30).
我们研究了四元赫米提液晶编码中的最大最小权值。我们确定了长度为 n、维数为 k 的四元赫米提液晶码中 (k le n le 17) 的最大最小权值。我们还首次构造了四元赫米提液晶[21, 5, 13]码和四元赫米提液晶[21, 9, 9]码。还给出了(k le n le 30) 的四元赫米提液晶[n, k]码中最大最小权值的更新表。
{"title":"On the minimum weights of quaternary Hermitian LCD codes","authors":"Makoto Araya, Masaaki Harada","doi":"10.1007/s12095-024-00733-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00733-y","url":null,"abstract":"<p>We study the largest minimum weights among quaternary Hermitian LCD codes. We determine the largest minimum weights among quaternary Hermitian LCD codes of length <i>n</i> and dimension <i>k</i> for <span>(k le n le 17)</span>. A quaternary Hermitian LCD [21, 5, 13] code and a quaternary Hermitian LCD [21, 9, 9] code are also constructed for the first time. An updated table of the largest minimum weights among quaternary Hermitian LCD [<i>n</i>, <i>k</i>] codes is also given for <span>(k le n le 30)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-13DOI: 10.1007/s12095-024-00735-w
Yuqing Han, Xiwang Cao
Subspace codes have attracted a lot of attention in the last few decades due to their applications in noncoherent linear network coding, in particular cyclic subspace codes can be encoded and decoded more efficiently because of their special algebraic structure. In this paper, we present a family of cyclic subspace codes with minimum distance (varvec{2k-2}) and size (varvec{seq^{k}(q^k-1)^{s-1}(q^n-1)+frac{q^n-1}{q^k-1}}), where (varvec{k|n}), (varvec{frac{n}{k}ge 2s+1}), (varvec{sge 1, e=lceil frac{n}{2sk} rceil -1}). In the case of (varvec{n=(2s+1)k}) with (varvec{2le s <q^k}), our cyclic subspace codes have larger size than the known ones in the literature.
{"title":"A new construction of cyclic subspace codes","authors":"Yuqing Han, Xiwang Cao","doi":"10.1007/s12095-024-00735-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00735-w","url":null,"abstract":"<p>Subspace codes have attracted a lot of attention in the last few decades due to their applications in noncoherent linear network coding, in particular cyclic subspace codes can be encoded and decoded more efficiently because of their special algebraic structure. In this paper, we present a family of cyclic subspace codes with minimum distance <span>(varvec{2k-2})</span> and size <span>(varvec{seq^{k}(q^k-1)^{s-1}(q^n-1)+frac{q^n-1}{q^k-1}})</span>, where <span>(varvec{k|n})</span>, <span>(varvec{frac{n}{k}ge 2s+1})</span>, <span>(varvec{sge 1, e=lceil frac{n}{2sk} rceil -1})</span>. In the case of <span>(varvec{n=(2s+1)k})</span> with <span>(varvec{2le s <q^k})</span>, our cyclic subspace codes have larger size than the known ones in the literature.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-12DOI: 10.1007/s12095-024-00734-x
Zebin Wang, Chenhui Jin, Ting Cui
The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an (varvec{n})-bit width function, the time complexity (varvec{O}(textbf{2}^{varvec{3n}})) is needed to find its all nonlinear invariants. In this paper, for the positive integer (varvec{m}), we consider the power function (varvec{x}^{varvec{m}}) over the finite field (varvec{GF}(varvec{2}^{varvec{n}})), which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of (varvec{x}^{varvec{m}}) is studied and we provide two mathematical toolboxes named (varvec{sim }_{varvec{m}})periodical point and (varvec{sim }_{varvec{m}})equivalence class. Second, we present an algorithm to get all the nonlinear invariants of (varvec{x}^{varvec{m}}) over (varvec{GF}(varvec{2}^{varvec{n}})) at the cost of time complexity (varvec{O}(frac{{varvec{2}}^{varvec{n}}varvec{-1}}{varvec{gcd (2}^{varvec{n}}varvec{-1,m)}})). If the growth of n exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of (varvec{x}^{varvec{m}}). Finally, we consider the nonlinear invariants of (varvec{x}^textbf{3}) over (varvec{GF(2}^{varvec{129}})) as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.
{"title":"Research on nonlinear invariants of a power function over a binary field","authors":"Zebin Wang, Chenhui Jin, Ting Cui","doi":"10.1007/s12095-024-00734-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00734-x","url":null,"abstract":"<p>The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an <span>(varvec{n})</span>-bit width function, the time complexity <span>(varvec{O}(textbf{2}^{varvec{3n}}))</span> is needed to find its all nonlinear invariants. In this paper, for the positive integer <span>(varvec{m})</span>, we consider the power function <span>(varvec{x}^{varvec{m}})</span> over the finite field <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span>, which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> is studied and we provide two mathematical toolboxes named <span>(varvec{sim }_{varvec{m}})</span> <i>periodical point</i> and <span>(varvec{sim }_{varvec{m}})</span> <i>equivalence class</i>. Second, we present an algorithm to get all the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> over <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span> at the cost of time complexity <span>(varvec{O}(frac{{varvec{2}}^{varvec{n}}varvec{-1}}{varvec{gcd (2}^{varvec{n}}varvec{-1,m)}}))</span>. If the growth of <i>n</i> exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span>. Finally, we consider the nonlinear invariants of <span>(varvec{x}^textbf{3})</span> over <span>(varvec{GF(2}^{varvec{129}}))</span> as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-05DOI: 10.1007/s12095-024-00732-z
Ayoub Mounir, Abdelfattah Haily
In this paper, our main objective is to examine the properties and characteristics of 1-generator ((2 + u))-quasi-twisted (QT) codes and ((2 + u))-generalized quasi-twisted (GQT) codes over the ring (mathbb {Z}_4 +umathbb {Z}_4 ), with (u^2=1). We determine the structure of the generators and minimal generating sets for both 1-generator ((2 + u))-QT and ((2 + u))-GQT codes. Additionally, we establish a lower bound for the minimum distance of free 1-generator ((2 + u))-QT and ((2 + u))-GQT codes over R. Furthermore, we present some numerical examples that illustrate the construction of some optimal (mathbb {Z}_4)-linear codes using the Gray map.
{"title":"On quasi-twisted codes and generalized quasi-twisted codes over $$mathbb {Z}_{4} +umathbb {Z}_{4}$$","authors":"Ayoub Mounir, Abdelfattah Haily","doi":"10.1007/s12095-024-00732-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00732-z","url":null,"abstract":"<p>In this paper, our main objective is to examine the properties and characteristics of 1-generator <span>((2 + u))</span>-quasi-twisted (QT) codes and <span>((2 + u))</span>-generalized quasi-twisted (GQT) codes over the ring <span>(mathbb {Z}_4 +umathbb {Z}_4 )</span>, with <span>(u^2=1)</span>. We determine the structure of the generators and minimal generating sets for both 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes. Additionally, we establish a lower bound for the minimum distance of free 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes over <i>R</i>. Furthermore, we present some numerical examples that illustrate the construction of some optimal <span>(mathbb {Z}_4)</span>-linear codes using the Gray map.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}