首页 > 最新文献

Cryptography and Communications最新文献

英文 中文
$$mathcal {S}_0$$ -equivalence classes, a new direction to find better weightwise perfectly balanced functions, and more $$mathcal {S}_0$$ -等价类,寻找更好的加权完全平衡函数的新方向,以及更多内容
Pub Date : 2024-05-14 DOI: 10.1007/s12095-024-00719-w
Agnese Gini, Pierrick Méaux

This article introduces the concept of (mathcal {S}_0)-equivalence class, i.e. , n-variable Boolean functions up to the addition of a symmetric function null in (0_n) and (1_n), and investigates its application to study weightwise perfectly balanced functions. On the one hand, we show that weightwise properties, such as being weightwise perfectly balanced, the weightwise nonlinearity and weightwise algebraic immunity, are invariants of these equivalence classes. On the other hand, we analyze the variation of global parameters inside the same class, and prove, for example, that there is always a function with high degree, algebraic immunity, or nonlinearity in the (mathcal {S}_0)-equivalence class of a function. Finally, we discuss how these results can be extended to other equivalence relations and their applications in cryptography.

本文介绍了等价类(mathcal {S}_0)的概念,即,n变量布尔函数在(0_n)和(1_n)中的加法对称函数为空,并研究了其在研究权重完全平衡函数中的应用。一方面,我们证明了加权性质,如加权完全平衡、加权非线性和加权代数免疫,是这些等价类的不变式。另一方面,我们分析了等价类内部全局参数的变化,并证明,例如,在函数的等价类中,总有一个函数具有高度、代数豁免性或非线性。最后,我们讨论了如何将这些结果扩展到其他等价关系及其在密码学中的应用。
{"title":"$$mathcal {S}_0$$ -equivalence classes, a new direction to find better weightwise perfectly balanced functions, and more","authors":"Agnese Gini, Pierrick Méaux","doi":"10.1007/s12095-024-00719-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00719-w","url":null,"abstract":"<p>This article introduces the concept of <span>(mathcal {S}_0)</span>-equivalence class, <i>i.e.</i> , <i>n</i>-variable Boolean functions up to the addition of a symmetric function null in <span>(0_n)</span> and <span>(1_n)</span>, and investigates its application to study weightwise perfectly balanced functions. On the one hand, we show that weightwise properties, such as being weightwise perfectly balanced, the weightwise nonlinearity and weightwise algebraic immunity, are invariants of these equivalence classes. On the other hand, we analyze the variation of global parameters inside the same class, and prove, for example, that there is always a function with high degree, algebraic immunity, or nonlinearity in the <span>(mathcal {S}_0)</span>-equivalence class of a function. Finally, we discuss how these results can be extended to other equivalence relations and their applications in cryptography.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of DNA codes with multiple constrained properties 构建具有多重约束特性的 DNA 代码
Pub Date : 2024-05-14 DOI: 10.1007/s12095-024-00718-x
Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh

DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization of its nucleotides. The formation of large stem-length secondary structures makes the sequences chemically inactive towards synthesis and sequencing processes. Furthermore, in DNA computing, other constraints like homopolymer run length also introduce complications. In this paper, our goal is to tackle the problems due to the creation of secondary structures in DNA sequences along with constraints such as not having a large homopolymer run length. This paper presents families of DNA codes with secondary structures of stem length at most two and homopolymer run length at most four. We identified (mathbb {Z}_{11}) as an ideal structure to construct DNA codes to avoid the above problems. By mapping the error-correcting codes over (mathbb {Z}_{11}) to DNA nucleotides, we obtained DNA codes with rates 0.5765 times the corresponding code rate over (mathbb {Z}_{11}), including some new secondary structure-free and better-performing codes for DNA-based data storage and DNA computing purposes.

DNA 序列容易因核苷酸的非特异性杂交而折叠成二级结构。大茎长二级结构的形成使序列在合成和测序过程中失去化学活性。此外,在 DNA 计算中,同源多聚物运行长度等其他限制因素也会带来复杂性。在本文中,我们的目标是解决由于 DNA 序列中二级结构的产生以及没有大的同源多聚物运行长度等限制条件所带来的问题。本文提出了DNA编码族,其二级结构的茎长度最多为2,同源共聚物的运行长度最多为4。我们发现 (mathbb {Z}_{11}) 是构建 DNA 编码以避免上述问题的理想结构。通过将 (mathbb {Z}_{11}) 上的纠错码映射到 DNA 核苷酸上,我们得到的 DNA 码的速率是 (mathbb {Z}_{11}) 上相应码速率的 0.5765 倍,其中包括一些新的无二级结构和性能更好的码,可用于基于 DNA 的数据存储和 DNA 计算。
{"title":"Construction of DNA codes with multiple constrained properties","authors":"Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh","doi":"10.1007/s12095-024-00718-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00718-x","url":null,"abstract":"<p>DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization of its nucleotides. The formation of large stem-length secondary structures makes the sequences chemically inactive towards synthesis and sequencing processes. Furthermore, in DNA computing, other constraints like homopolymer run length also introduce complications. In this paper, our goal is to tackle the problems due to the creation of secondary structures in DNA sequences along with constraints such as not having a large homopolymer run length. This paper presents families of DNA codes with secondary structures of stem length at most two and homopolymer run length at most four. We identified <span>(mathbb {Z}_{11})</span> as an ideal structure to construct DNA codes to avoid the above problems. By mapping the error-correcting codes over <span>(mathbb {Z}_{11})</span> to DNA nucleotides, we obtained DNA codes with rates 0.5765 times the corresponding code rate over <span>(mathbb {Z}_{11})</span>, including some new secondary structure-free and better-performing codes for DNA-based data storage and DNA computing purposes.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"304 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integer syndrome decoding in the presence of noise 存在噪声时的整数综合征解码
Pub Date : 2024-05-10 DOI: 10.1007/s12095-024-00712-3
Vlad-Florin Drăgoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso

Code-based cryptography received attention after the NIST started the post-quantum cryptography standardization process in 2016. A central NP-hard problem is the binary syndrome decoding problem, on which the security of many code-based cryptosystems lies. The best known methods to solve this problem all stem from the information-set decoding strategy, first introduced by Prange in 1962. A recent line of work considers augmented versions of this strategy, with hints typically provided by side-channel information. In this work, we consider the integer syndrome decoding problem, where the integer syndrome is available but might be noisy. We study how the performance of the decoder is affected by the noise. First we identify the noise model as being close to a centered in zero binomial distribution. Second we model the probability of success of the ISD-score decoder in presence of a binomial noise. Third, we demonstrate that with high probability our algorithm finds the solution as long as the noise parameter d is linear in t (the Hamming weight of the solution) and t is sub-linear in the code-length. We provide experimental results on cryptographic parameters for the BIKE and Classic McEliece cryptosystems, which are both candidates for the fourth round of the NIST standardization process.

美国国家标准与技术研究院(NIST)于 2016 年启动后量子密码学标准化进程后,基于密码的密码学受到了关注。一个核心的 NP 难问题是二进制综合征解码问题,许多基于密码的密码系统的安全性都取决于此。解决这一问题的最著名方法都源于信息集解码策略,该策略由 Prange 于 1962 年首次提出。最近的一项研究考虑了这一策略的增强版本,通常由侧信道信息提供提示。在这项工作中,我们考虑的是整数综合征解码问题,其中整数综合征是可用的,但可能是有噪声的。我们研究了解码器的性能如何受到噪声的影响。首先,我们确定噪声模型接近于以零为中心的二项分布。其次,我们对二项分布噪声下 ISD 评分解码器的成功概率进行建模。第三,我们证明,只要噪声参数 d 与 t(解的汉明权重)成线性关系,且 t 与码长成亚线性关系,我们的算法就能高概率地找到解。我们提供了 BIKE 和经典 McEliece 密码系统密码参数的实验结果,这两个系统都是第四轮 NIST 标准化进程的候选系统。
{"title":"Integer syndrome decoding in the presence of noise","authors":"Vlad-Florin Drăgoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso","doi":"10.1007/s12095-024-00712-3","DOIUrl":"https://doi.org/10.1007/s12095-024-00712-3","url":null,"abstract":"<p>Code-based cryptography received attention after the NIST started the post-quantum cryptography standardization process in 2016. A central NP-hard problem is the binary syndrome decoding problem, on which the security of many code-based cryptosystems lies. The best known methods to solve this problem all stem from the information-set decoding strategy, first introduced by Prange in 1962. A recent line of work considers augmented versions of this strategy, with hints typically provided by side-channel information. In this work, we consider the integer syndrome decoding problem, where the integer syndrome is available but might be noisy. We study how the performance of the decoder is affected by the noise. First we identify the noise model as being close to a centered in zero binomial distribution. Second we model the probability of success of the ISD-score decoder in presence of a binomial noise. Third, we demonstrate that with high probability our algorithm finds the solution as long as the noise parameter <i>d</i> is linear in <i>t</i> (the Hamming weight of the solution) and <i>t</i> is sub-linear in the code-length. We provide experimental results on cryptographic parameters for the BIKE and <i>Classic McEliece</i> cryptosystems, which are both candidates for the fourth round of the NIST standardization process.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"191 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additive codes with few weights 权重少的加法代码
Pub Date : 2024-05-09 DOI: 10.1007/s12095-024-00720-3
Daniel Panario, Murat Sahin, Qiang Wang

Additive codes have a wide range of applications. A classical nice and generic way to construct linear codes is via trace functions. In this paper, first, we generalize this method to construct additive codes. Then, we use this method to get some explicit additive codes. Computing Weil-like sums, we obtain parameters of these codes such as the length and weight distribution. We show that our codes have few weights.

加法编码应用广泛。通过迹函数构造线性编码是一种经典的通用方法。在本文中,我们首先将这种方法推广到构造加法码中。然后,我们用这种方法得到一些显式加法码。通过计算类韦尔和,我们得到了这些编码的参数,如长度和权重分布。我们的研究表明,我们的编码只有很少的权值。
{"title":"Additive codes with few weights","authors":"Daniel Panario, Murat Sahin, Qiang Wang","doi":"10.1007/s12095-024-00720-3","DOIUrl":"https://doi.org/10.1007/s12095-024-00720-3","url":null,"abstract":"<p>Additive codes have a wide range of applications. A classical nice and generic way to construct linear codes is via trace functions. In this paper, first, we generalize this method to construct additive codes. Then, we use this method to get some explicit additive codes. Computing Weil-like sums, we obtain parameters of these codes such as the length and weight distribution. We show that our codes have few weights.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support 构建具有灵活支持的谱空约束零相关区序列
Pub Date : 2024-05-02 DOI: 10.1007/s12095-024-00715-0
Nishant Kumar, Palash Sarkar, Sudhan Majhi

In recent years, zero-correlation zone (ZCZ) sequences have been studied due to their significant applications in quasi-synchronous code division multiple access (QS-CDMA) systems and other wireless communication domains. However, in a cognitive radio (CR) network, it is desirable to design ZCZ sequences having spectrally-null-constrained (SNC) property to achieve a low spectral density profile. This paper focuses on the construction of SNC-ZCZ sequences having flexible support, where support refers to a collection of indices corresponding to non-zero entries in the sequence. The proposed SNC-ZCZ sequences are reduced to traditional ZCZ sequences when the support size is equal to the length of the sequence. To obtain ZCZ sequences, we first propose a construction of traditional/SNC-complete complementary codes (SNC-CCCs) using a class of extended Boolean functions (EBFs). With the help of this class, we propose another class of EBFs that generates asymptotically optimal traditional/SNC-ZCZ sequences of prime-power lengths with respect to Tang-Fan-Matsufuzi bound. Furthermore, a relation between the second-order cosets of first-order generalized Reed-Muller (GRM) code and the proposed traditional ZCZ sequences is also established. The enumeration of traditional ZCZ sequences within a GRM code is also established. This enumeration is achieved by tallying the distinct second-order cosets of the first-order GRM code and quantifying the number of ZCZ sequences residing within a particular coset. Moreover, the Hamming distance of the proposed traditional ZCZ sequences is also computed.

近年来,由于零相关区(ZCZ)序列在准同步码分多址(QS-CDMA)系统和其他无线通信领域的重要应用,人们对其进行了研究。然而,在认知无线电(CR)网络中,设计具有频谱空受限(SNC)特性的 ZCZ 序列以实现低频谱密度曲线是可取的。本文的重点是构建具有灵活支持的 SNC-ZCZ 序列,其中支持指的是序列中与非零条目相对应的索引集合。当支持度大小等于序列长度时,所提出的 SNC-ZCZ 序列将简化为传统的 ZCZ 序列。为了获得 ZCZ 序列,我们首先利用一类扩展布尔函数(EBF)提出了传统/SNC-完整互补码(SNC-CCC)的构造。在该类函数的帮助下,我们提出了另一类 EBFs,该类 EBFs 可生成关于 Tang-Fan-Matsufuzi 约束的质幂长度渐近最优的传统/SNC-ZCZ 序列。此外,还建立了一阶广义里德-穆勒(GRM)码的二阶余集与所提出的传统 ZCZ 序列之间的关系。还建立了 GRM 码中传统 ZCZ 序列的枚举。这种枚举是通过统计一阶 GRM 码的不同二阶余集并量化特定余集中的 ZCZ 序列数量来实现的。此外,还计算了所提出的传统 ZCZ 序列的汉明距离。
{"title":"Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support","authors":"Nishant Kumar, Palash Sarkar, Sudhan Majhi","doi":"10.1007/s12095-024-00715-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00715-0","url":null,"abstract":"<p>In recent years, zero-correlation zone (ZCZ) sequences have been studied due to their significant applications in quasi-synchronous code division multiple access (QS-CDMA) systems and other wireless communication domains. However, in a cognitive radio (CR) network, it is desirable to design ZCZ sequences having spectrally-null-constrained (SNC) property to achieve a low spectral density profile. This paper focuses on the construction of SNC-ZCZ sequences having flexible support, where support refers to a collection of indices corresponding to non-zero entries in the sequence. The proposed SNC-ZCZ sequences are reduced to traditional ZCZ sequences when the support size is equal to the length of the sequence. To obtain ZCZ sequences, we first propose a construction of traditional/SNC-complete complementary codes (SNC-CCCs) using a class of extended Boolean functions (EBFs). With the help of this class, we propose another class of EBFs that generates asymptotically optimal traditional/SNC-ZCZ sequences of prime-power lengths with respect to Tang-Fan-Matsufuzi bound. Furthermore, a relation between the second-order cosets of first-order generalized Reed-Muller (GRM) code and the proposed traditional ZCZ sequences is also established. The enumeration of traditional ZCZ sequences within a GRM code is also established. This enumeration is achieved by tallying the distinct second-order cosets of the first-order GRM code and quantifying the number of ZCZ sequences residing within a particular coset. Moreover, the Hamming distance of the proposed traditional ZCZ sequences is also computed.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140840192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The sequence reconstruction problem for permutations with the Hamming distance 具有汉明距离的排列序列重构问题
Pub Date : 2024-05-02 DOI: 10.1007/s12095-024-00717-y
Xiang Wang, Elena V. Konstantinova

V. Levenshtein first proposed the sequence reconstruction problem in 2001. This problem studies the same sequence from some set is transmitted over multiple channels, and the decoder receives the different outputs. Assume that the transmitted sequence is at distance d from some code and there are at most r errors in every channel. Then the sequence reconstruction problem is to find the minimum number of channels required to recover exactly the transmitted sequence that has to be greater than the maximum intersection between two metric balls of radius r, where the distance between their centers is at least d. In this paper, we study the sequence reconstruction problem of permutations under the Hamming distance. In this model we define a Cayley graph over the symmetric group, study its properties and find the exact value of the largest intersection of its two metric balls for (d=2r). Moreover, we give a lower bound on the largest intersection of two metric balls for (d=2r-1).

V.Levenshtein 于 2001 年首次提出序列重建问题。这个问题研究的是在多个信道上传输来自某个集合的相同序列,解码器接收不同的输出。假设传输的序列与某个编码的距离为 d,且每个信道中最多有 r 个错误。那么,序列重构问题就是找到精确恢复传输序列所需的最小信道数,该信道数必须大于两个半径为 r 的度量球之间的最大交集,而这两个度量球的中心距离至少为 d。在这个模型中,我们定义了一个对称群上的 Cayley 图,研究了它的性质,并找到了 (d=2r) 时两个度量球最大交点的精确值。此外,我们还给出了 (d=2r-1) 时两个度量球最大交点的下限。
{"title":"The sequence reconstruction problem for permutations with the Hamming distance","authors":"Xiang Wang, Elena V. Konstantinova","doi":"10.1007/s12095-024-00717-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00717-y","url":null,"abstract":"<p>V. Levenshtein first proposed the sequence reconstruction problem in 2001. This problem studies the same sequence from some set is transmitted over multiple channels, and the decoder receives the different outputs. Assume that the transmitted sequence is at distance <i>d</i> from some code and there are at most <i>r</i> errors in every channel. Then the sequence reconstruction problem is to find the minimum number of channels required to recover exactly the transmitted sequence that has to be greater than the maximum intersection between two metric balls of radius <i>r</i>, where the distance between their centers is at least <i>d</i>. In this paper, we study the sequence reconstruction problem of permutations under the Hamming distance. In this model we define a Cayley graph over the symmetric group, study its properties and find the exact value of the largest intersection of its two metric balls for <span>(d=2r)</span>. Moreover, we give a lower bound on the largest intersection of two metric balls for <span>(d=2r-1)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140839938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACD codes over skew-symmetric dualities 倾斜对称对偶上的 ACD 编码
Pub Date : 2024-04-29 DOI: 10.1007/s12095-024-00709-y
Astha Agrawal, R. K. Sharma

Additive codes have gained importance in algebraic coding theory due to their applications in quantum error correction and quantum computing. The article begins by developing some properties of Additive Complementary Dual (ACD) codes with respect to arbitrary dualities over finite abelian groups. Further, we introduce a subclass of non-symmetric dualities referred to as the skew-symmetric dualities. Then, we precisely count symmetric and skew-symmetric dualities over finite fields. Two conditions have been obtained: one is a necessary and sufficient condition, and the other is a necessary condition. The necessary and sufficient condition is for an additive code to be an ACD code over arbitrary dualities. The necessary condition is on a generator matrix of an ACD code over skew-symmetric dualities. We provide bounds for the highest possible minimum distance of ACD codes over skew-symmetric dualities. Finally, we find some new quaternary ACD codes over non-symmetric dualities with better parameters than the symmetric ones.

由于在量子纠错和量子计算中的应用,加法码在代数编码理论中变得越来越重要。文章首先介绍了加法互补对偶(ACD)码在有限无性群上任意对偶方面的一些特性。此外,我们还介绍了一种非对称对偶性子类,称为偏斜对称对偶性。然后,我们精确计算了有限域上的对称和偏斜对称对偶性。我们得到了两个条件:一个是必要充分条件,另一个是必要条件。必要和充分条件是在任意对偶性上加法码是 ACD 码。必要条件是在偏斜对称对偶性上的 ACD 码的生成矩阵。我们提供了斜对称对偶性上 ACD 码的最大可能最小距离的边界。最后,我们发现了一些新的非对称对偶上的四元 ACD 码,其参数优于对称码。
{"title":"ACD codes over skew-symmetric dualities","authors":"Astha Agrawal, R. K. Sharma","doi":"10.1007/s12095-024-00709-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00709-y","url":null,"abstract":"<p>Additive codes have gained importance in algebraic coding theory due to their applications in quantum error correction and quantum computing. The article begins by developing some properties of Additive Complementary Dual (ACD) codes with respect to arbitrary dualities over finite abelian groups. Further, we introduce a subclass of non-symmetric dualities referred to as the skew-symmetric dualities. Then, we precisely count symmetric and skew-symmetric dualities over finite fields. Two conditions have been obtained: one is a necessary and sufficient condition, and the other is a necessary condition. The necessary and sufficient condition is for an additive code to be an ACD code over arbitrary dualities. The necessary condition is on a generator matrix of an ACD code over skew-symmetric dualities. We provide bounds for the highest possible minimum distance of ACD codes over skew-symmetric dualities. Finally, we find some new quaternary ACD codes over non-symmetric dualities with better parameters than the symmetric ones.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140812952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propagation properties of a non-linear mapping based on squaring in odd characteristic 基于奇数特征平方的非线性映射的传播特性
Pub Date : 2024-04-26 DOI: 10.1007/s12095-024-00711-4
Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel

Many modern cryptographic primitives for hashing and (authenticated) encryption make use of constructions that are instantiated with an iterated cryptographic permutation that operates on a fixed-width state consisting of an array of bits. Often, such permutations are the repeated application of a relatively simple round function consisting of a linear layer and a non-linear layer. These constructions do not require that the underlying function is a permutation and they can plausibly be based on a non-invertible transformation. Recently, Grassi proposed the use of non-invertible mappings operating on arrays of digits that are elements of a finite field of odd characteristic for so-called MPC-/FHE-/ZK-friendly symmetric cryptographic primitives. In this work, we consider a mapping that we call (gamma ) that has a simple expression and is based on squaring. We discuss, for the first time, the differential and linear propagation properties of (gamma ) and observe that these follow the same rules up to a relabeling of the digits. This is an intriguing property that, as far as we know, only exists for (gamma ) and the binary mapping (chi _{_{3}}) that is used in the cryptographic permutation Xoodoo. Moreover, we study the implications of its non-invertibility on differentials with zero output difference and on biases at the output of the (gamma ) mapping and show that they are as small as they can possibly be.

许多用于散列和(验证)加密的现代加密原语都使用了迭代加密排列的实例化结构,这种排列对由比特数组组成的固定宽度状态进行操作。通常,这种置换是重复应用一个相对简单的圆函数,该函数由一个线性层和一个非线性层组成。这些构造并不要求底层函数是一种排列,而且它们可以基于非可逆变换。最近,格拉西(Grassi)提出了使用非可逆映射对奇数特征有限域元素的数字数组进行操作,以实现所谓的 MPC-FHE-/ZK-friendly 对称加密原语。在这项工作中,我们考虑了一种我们称之为 (gamma )的映射,它有一个简单的表达式并基于平方。我们首次讨论了 (gamma )的差分和线性传播特性,并观察到这些特性在重新标注数字之前遵循相同的规则。这是一个有趣的性质,据我们所知,只有 (gamma ) 和二进制映射 (chi _{_{3}}) 才存在这个性质,而二进制映射被用于密码排列 Xoodoo。此外,我们还研究了它的不可逆性对输出差值为零的微分和 (gamma ) 映射输出端的偏差的影响,并证明它们是尽可能小的。
{"title":"Propagation properties of a non-linear mapping based on squaring in odd characteristic","authors":"Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel","doi":"10.1007/s12095-024-00711-4","DOIUrl":"https://doi.org/10.1007/s12095-024-00711-4","url":null,"abstract":"<p>Many modern cryptographic primitives for hashing and (authenticated) encryption make use of constructions that are instantiated with an iterated cryptographic permutation that operates on a fixed-width state consisting of an array of bits. Often, such permutations are the repeated application of a relatively simple round function consisting of a linear layer and a non-linear layer. These constructions do not require that the underlying function is a permutation and they can plausibly be based on a non-invertible transformation. Recently, Grassi proposed the use of non-invertible mappings operating on arrays of digits that are elements of a finite field of odd characteristic for so-called MPC-/FHE-/ZK-friendly symmetric cryptographic primitives. In this work, we consider a mapping that we call <span>(gamma )</span> that has a simple expression and is based on squaring. We discuss, for the first time, the differential and linear propagation properties of <span>(gamma )</span> and observe that these follow the same rules up to a relabeling of the digits. This is an intriguing property that, as far as we know, only exists for <span>(gamma )</span> and the binary mapping <span>(chi _{_{3}})</span> that is used in the cryptographic permutation <span>Xoodoo</span>. Moreover, we study the implications of its non-invertibility on differentials with zero output difference and on biases at the output of the <span>(gamma )</span> mapping and show that they are as small as they can possibly be.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140799498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Equitable [[2, 10], [6, 6]]-partitions of the 12-cube 12 立方体的等分 [[2,10],[6,6]]分区
Pub Date : 2024-04-26 DOI: 10.1007/s12095-024-00716-z
Denis S. Krotov

We describe the computer-aided classification of equitable partitions of the 12-cube with quotient matrix [[2, 10], [6, 6]], or, equivalently, simple orthogonal arrays OA(1536, 12, 2, 7), or order-7 correlation-immune Boolean functions in 12 arguments with 1536 ones (which completes the classification of unbalanced order-7 correlation-immune Boolean functions in 12 arguments and, as derived objects, unbalanced order-6 correlation-immune Boolean functions in 11 arguments). We find that there are 103 equivalence classes of the considered objects, and there are only two almost-OA(1536, 12, 2, 8) among them. Additionally, we find that there are 40 equivalence classes of pairs of disjoint simple OA(1536, 12, 2, 7) (equivalently, equitable partitions of the 12-cube with quotient matrix [[2, 6, 4], [6, 2, 4], [6, 6, 0]]) and discuss the existence of a non-simple OA(1536, 12, 2, 7).

我们描述了计算机辅助的 12 立方体等价分割分类,其商数矩阵为[[2, 10],[6, 6]],或等价于简单正交数组 OA(1536, 12, 2, 7),或 12 个参数中的 7 阶相关免疫布尔函数与 1536 个相关免疫布尔函数(完成了 12 个参数中的不平衡 7 阶相关免疫布尔函数以及作为派生对象的 11 个参数中的不平衡 6 阶相关免疫布尔函数的分类)。我们发现所考虑的对象有 103 个等价类,其中只有两个近似-OA(1536, 12, 2, 8)。此外,我们还发现有 40 个不相交的简单 OA(1536, 12, 2, 7) 对等价类(等价于 12 立方体的等分,其商数矩阵为[[2, 6, 4], [6, 2, 4], [6, 6, 0]]),并讨论了非简单 OA(1536, 12, 2, 7) 的存在。
{"title":"Equitable [[2, 10], [6, 6]]-partitions of the 12-cube","authors":"Denis S. Krotov","doi":"10.1007/s12095-024-00716-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00716-z","url":null,"abstract":"<p>We describe the computer-aided classification of equitable partitions of the 12-cube with quotient matrix [[2, 10], [6, 6]], or, equivalently, simple orthogonal arrays OA(1536, 12, 2, 7), or order-7 correlation-immune Boolean functions in 12 arguments with 1536 ones (which completes the classification of unbalanced order-7 correlation-immune Boolean functions in 12 arguments and, as derived objects, unbalanced order-6 correlation-immune Boolean functions in 11 arguments). We find that there are 103 equivalence classes of the considered objects, and there are only two almost-OA(1536, 12, 2, 8) among them. Additionally, we find that there are 40 equivalence classes of pairs of disjoint simple OA(1536, 12, 2, 7) (equivalently, equitable partitions of the 12-cube with quotient matrix [[2, 6, 4], [6, 2, 4], [6, 6, 0]]) and discuss the existence of a non-simple OA(1536, 12, 2, 7).</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140799499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integer codes correcting burst errors within one byte and single errors within two bytes 整数码纠正一个字节内的突发错误和两个字节内的单个错误
Pub Date : 2024-04-19 DOI: 10.1007/s12095-023-00687-7
Aleksandar Radonjic, Pankaj Kumar Das, Vladimir Vujicic

This paper presents a class of integer codes that are suitable for use in various optical networks. The presented codes are generated with the help of a computer and have the ability to correct l-bit burst errors corrupting one b-bit byte (1 ≤ l < b) and single errors corrupting two b-bit bytes. To evaluate the performance of the presented codes, we analyze their probabilities of incorrect decoding for two types of channels. In addition, the paper shows that the proposed codes can be interleaved without using an interleaver, which allows the decoder to correct all l-bit burst errors as well as many random errors.

本文介绍了一类适用于各种光网络的整数编码。所介绍的编码是在计算机的帮助下生成的,能够纠正破坏一个 b 位字节(1 ≤ l <b)的 l 位突发错误和破坏两个 b 位字节的单个错误。为了评估所介绍编码的性能,我们分析了它们在两种信道下的错误解码概率。此外,本文还表明,所提出的编码可以在不使用交织器的情况下进行交织,从而使解码器能够纠正所有 l 位突发错误以及许多随机错误。
{"title":"Integer codes correcting burst errors within one byte and single errors within two bytes","authors":"Aleksandar Radonjic, Pankaj Kumar Das, Vladimir Vujicic","doi":"10.1007/s12095-023-00687-7","DOIUrl":"https://doi.org/10.1007/s12095-023-00687-7","url":null,"abstract":"<p>This paper presents a class of integer codes that are suitable for use in various optical networks. The presented codes are generated with the help of a computer and have the ability to correct <i>l</i>-bit burst errors corrupting one <i>b</i>-bit byte (1 ≤ <i>l</i> &lt; <i>b</i>) and single errors corrupting two <i>b</i>-bit bytes. To evaluate the performance of the presented codes, we analyze their probabilities of incorrect decoding for two types of channels. In addition, the paper shows that the proposed codes can be interleaved without using an interleaver, which allows the decoder to correct all <i>l</i>-bit burst errors as well as many random errors.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"87 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140627638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptography and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1