Pub Date : 2025-03-27DOI: 10.1007/s10623-025-01609-9
William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu
A De Bruijn cycle is a cyclic sequence in which every word of length n over an alphabet (mathcal {A}) appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely many of them using one-dimensional variants of universal cycles, including a new variant called a universal partial family.
{"title":"Universal partial tori","authors":"William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu","doi":"10.1007/s10623-025-01609-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01609-9","url":null,"abstract":"<p>A De Bruijn cycle is a cyclic sequence in which every word of length <i>n</i> over an alphabet <span>(mathcal {A})</span> appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely many of them using one-dimensional variants of universal cycles, including a new variant called a universal partial family.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-27DOI: 10.1007/s10623-025-01622-y
Jingtao Xiong, Jianghua Zhong, Dongdai Lin
Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually, the equivalence problem of NFSRs with same bit number can be transformed to their isomorphism problem. The latter can be solved if the bijection between their states and its inverse can be explicitly expressed, which are quite hard to get in general. This paper studies the isomorphism of NFSRs by building a general framework for bijections. It first gives basic bijections. It then presents a unified formula for bijections, and discloses that any bijection can be expressed as a composite of finite basic bijections, setting up a general framework for bijections. Based on the general framework, the paper discloses in theory how to obtain all Galois NFSRs that are isomorphic to a given NFSR, and then reveals the bijections between the states of the previous types of Galois NFSRs and their own equivalent Fibonacci NFSRs. Finally, it proposes a new type of Galois NFSRs that are isomorphic and further equivalent to Fibonacci NFSRs, covering and improving most previous types of Galois NFSRs known to be equivalent to Fibonacci NFSRs.
{"title":"Studying the isomorphism of NFSRs via a general framework of bijections","authors":"Jingtao Xiong, Jianghua Zhong, Dongdai Lin","doi":"10.1007/s10623-025-01622-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01622-y","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually, the equivalence problem of NFSRs with same bit number can be transformed to their isomorphism problem. The latter can be solved if the bijection between their states and its inverse can be explicitly expressed, which are quite hard to get in general. This paper studies the isomorphism of NFSRs by building a general framework for bijections. It first gives basic bijections. It then presents a unified formula for bijections, and discloses that any bijection can be expressed as a composite of finite basic bijections, setting up a general framework for bijections. Based on the general framework, the paper discloses in theory how to obtain all Galois NFSRs that are isomorphic to a given NFSR, and then reveals the bijections between the states of the previous types of Galois NFSRs and their own equivalent Fibonacci NFSRs. Finally, it proposes a new type of Galois NFSRs that are isomorphic and further equivalent to Fibonacci NFSRs, covering and improving most previous types of Galois NFSRs known to be equivalent to Fibonacci NFSRs.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"183 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1007/s10623-025-01620-0
Canze Zhu
In this paper, for an odd prime power q and an integer (mge 2), let (mathcal {C}(q,m)) be a one-weight irreducible cyclic code with parameters ([q^m-1,m,(q-1)q^{m-1}]), we consider the complete weight enumerator and the weight distribution of the square (big (mathcal {C}(q,m)big )^2), whose dual has (lfloor frac{m}{2}rfloor +1) zeros. Using the character sums method and the known result of counting (mtimes m) symmetric matrices over (mathbb {F}_q) with given rank, we explicitly determine the complete weight enumerator of (left( mathcal {C}(q,m)right) ^2) and show that (left( mathcal {C}(q,m)right) ^2) is a ((2lfloor frac{m}{2}rfloor +1))-weight cyclic code with parameters ([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})]). Moreover, we get the weight distribution of the square of the simplex code by puncturing the last (frac{(q-2)(q^m-1)}{q-1}) coordinates of (left( mathcal {C}(q,m)right) ^2).
{"title":"The complete weight enumerator of the square of one-weight irreducible cyclic codes","authors":"Canze Zhu","doi":"10.1007/s10623-025-01620-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01620-0","url":null,"abstract":"<p>In this paper, for an odd prime power <i>q</i> and an integer <span>(mge 2)</span>, let <span>(mathcal {C}(q,m))</span> be a one-weight irreducible cyclic code with parameters <span>([q^m-1,m,(q-1)q^{m-1}])</span>, we consider the complete weight enumerator and the weight distribution of the square <span>(big (mathcal {C}(q,m)big )^2)</span>, whose dual has <span>(lfloor frac{m}{2}rfloor +1)</span> zeros. Using the character sums method and the known result of counting <span>(mtimes m)</span> symmetric matrices over <span>(mathbb {F}_q)</span> with given rank, we explicitly determine the complete weight enumerator of <span>(left( mathcal {C}(q,m)right) ^2)</span> and show that <span>(left( mathcal {C}(q,m)right) ^2)</span> is a <span>((2lfloor frac{m}{2}rfloor +1))</span>-weight cyclic code with parameters <span>([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})])</span>. Moreover, we get the weight distribution of the square of the simplex code by puncturing the last <span>(frac{(q-2)(q^m-1)}{q-1})</span> coordinates of <span>(left( mathcal {C}(q,m)right) ^2)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"56 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1007/s10623-025-01617-9
Madhura Pathegama, Alexander Barg
The learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This has left open the question of attaining a reduction with positive-rate codes. Addressing this case, we characterize the efficiency of the reduction in terms of the parameters of the decoding and LPN problems. As a conclusion, we isolate the parameter regimes for which a meaningful reduction is possible and the regimes for which its existence is unlikely.
{"title":"Limitations of the decoding-to-LPN reduction via code smoothing","authors":"Madhura Pathegama, Alexander Barg","doi":"10.1007/s10623-025-01617-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01617-9","url":null,"abstract":"<p>The learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This has left open the question of attaining a reduction with positive-rate codes. Addressing this case, we characterize the efficiency of the reduction in terms of the parameters of the decoding and LPN problems. As a conclusion, we isolate the parameter regimes for which a meaningful reduction is possible and the regimes for which its existence is unlikely.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-21DOI: 10.1007/s10623-025-01608-w
Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab
In this paper, we introduce and study the problem of binary stretch embedding of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph G is to find a mapping from the vertex set of G, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence the name binary stretch embedding. The minimum dimension of a hypercube for which such a stretch embedding exists is called the binary addressing number of G. We show that the binary addressing number of weighted graphs is the optimum value of an integer program. The optimum value for the corresponding linear relaxation problem is called the fractional binary addressing number of G. This embedding type problem is closely related to the well-known addressing problem of Graham and Pollak and isometric hypercube embedding problem of Firsov. Using tools and techniques such as Hadamard codes and the linear programming theory help us to find upper and lower bounds, approximations, or exact values of the binary addressing number and the fractional variant of graphs. As an application of our results, we derive improved upper bounds or exact values of the maximum size of Lee metric codes of certain parameters.
{"title":"Binary stretch embedding of weighted graphs","authors":"Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab","doi":"10.1007/s10623-025-01608-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01608-w","url":null,"abstract":"<p>In this paper, we introduce and study the problem of <i>binary stretch embedding</i> of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph <i>G</i> is to find a mapping from the vertex set of <i>G</i>, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence the name binary stretch embedding. The minimum dimension of a hypercube for which such a stretch embedding exists is called the binary addressing number of <i>G</i>. We show that the binary addressing number of weighted graphs is the optimum value of an integer program. The optimum value for the corresponding linear relaxation problem is called the fractional binary addressing number of <i>G</i>. This embedding type problem is closely related to the well-known <i>addressing problem</i> of Graham and Pollak and <i>isometric hypercube embedding problem</i> of Firsov. Using tools and techniques such as Hadamard codes and the linear programming theory help us to find upper and lower bounds, approximations, or exact values of the binary addressing number and the fractional variant of graphs. As an application of our results, we derive improved upper bounds or exact values of the maximum size of Lee metric codes of certain parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143666542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-20DOI: 10.1007/s10623-025-01594-z
Marco Buratti, Francesca Merola, Anamari Nakić
A (2-(v, k, lambda )) design is additive if, up to isomorphism, the point set is a subset of an abelian group G and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures seem quite hard to construct in general, particularly when we look for additive Steiner 2-designs. One might generalize additive Steiner 2-designs in a natural way to graph decompositions as follows: given a simple graph (Gamma ), an additive ((K_v,Gamma ))-design is a decomposition of the graph (K_v) into subgraphs (blocks) (B_1,dots ,B_t) all isomorphic to (Gamma ), such that the vertex set (V(K_v)) is a subset of an abelian group G, and the sets (V(B_1), dots , V(B_t)) are zero-sum in G. In this work we begin the study of additive ((K_v,Gamma ))-designs: we develop different tools instrumental in constructing these structures, and apply them to obtain some infinite classes of designs and many sporadic examples. We will consider decompositions into various graphs (Gamma ), for instance cycles, paths, and k-matchings. Similar ideas will also allow us to present here a sporadic additive 2-(124, 4, 1) design.
{"title":"Additive combinatorial designs","authors":"Marco Buratti, Francesca Merola, Anamari Nakić","doi":"10.1007/s10623-025-01594-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01594-z","url":null,"abstract":"<p>A <span>(2-(v, k, lambda ))</span> design is additive if, up to isomorphism, the point set is a subset of an abelian group <i>G</i> and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures seem quite hard to construct in general, particularly when we look for additive Steiner 2-designs. One might generalize additive Steiner 2-designs in a natural way to graph decompositions as follows: given a simple graph <span>(Gamma )</span>, an <i>additive </i><span>((K_v,Gamma ))</span><i>-design</i> is a decomposition of the graph <span>(K_v)</span> into subgraphs (<i>blocks</i>) <span>(B_1,dots ,B_t)</span> all isomorphic to <span>(Gamma )</span>, such that the vertex set <span>(V(K_v))</span> is a subset of an abelian group <i>G</i>, and the sets <span>(V(B_1), dots , V(B_t))</span> are zero-sum in <i>G</i>. In this work we begin the study of additive <span>((K_v,Gamma ))</span>-designs: we develop different tools instrumental in constructing these structures, and apply them to obtain some infinite classes of designs and many sporadic examples. We will consider decompositions into various graphs <span>(Gamma )</span>, for instance cycles, paths, and <i>k</i>-matchings. Similar ideas will also allow us to present here a sporadic additive 2-(124, 4, 1) design.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"34 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143661406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-18DOI: 10.1007/s10623-025-01618-8
Chi Zhang
Lattices have many significant applications in cryptography. In 2021, the p-adic signature scheme and public-key encryption cryptosystem were introduced. They are based on the Longest Vector Problem (LVP) and the Closest Vector Problem (CVP) in p-adic lattices. These problems are considered to be challenging and there are no known deterministic polynomial time algorithms to solve them. In this paper, we improve the LVP algorithm in local fields. The modified LVP algorithm is a deterministic polynomial time algorithm when the field is totally ramified and p is a polynomial in the rank of the input lattice. We utilize this algorithm to attack the above schemes so that we are able to forge a valid signature of any message and decrypt any ciphertext. Although these schemes are broken, this work does not mean that p-adic lattices are not suitable in constructing cryptographic primitives. We propose some possible modifications to avoid our attack at the end of this paper.
{"title":"An attack on p-adic lattice public-key encryption cryptosystems and signature schemes","authors":"Chi Zhang","doi":"10.1007/s10623-025-01618-8","DOIUrl":"https://doi.org/10.1007/s10623-025-01618-8","url":null,"abstract":"<p>Lattices have many significant applications in cryptography. In 2021, the <i>p</i>-adic signature scheme and public-key encryption cryptosystem were introduced. They are based on the Longest Vector Problem (LVP) and the Closest Vector Problem (CVP) in <i>p</i>-adic lattices. These problems are considered to be challenging and there are no known deterministic polynomial time algorithms to solve them. In this paper, we improve the LVP algorithm in local fields. The modified LVP algorithm is a deterministic polynomial time algorithm when the field is totally ramified and <i>p</i> is a polynomial in the rank of the input lattice. We utilize this algorithm to attack the above schemes so that we are able to forge a valid signature of any message and decrypt any ciphertext. Although these schemes are broken, this work does not mean that <i>p</i>-adic lattices are not suitable in constructing cryptographic primitives. We propose some possible modifications to avoid our attack at the end of this paper.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"69 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143640437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-15DOI: 10.1007/s10623-025-01614-y
Xiaopeng Zheng, Hongbo Li, Dingkang Wang
Homomorphic encryption (HE) is one of the mainstream cryptographic tools used to enable secure outsourced computation. A typical task is secure matrix computation, which is a fundamental operation used in various outsourced computing applications such as statistical analysis and machine learning. In this paper, we present a new framework for secure multiplication of two matrices with size (r times s) and (s times t) respectively, which requires only (O(log n)) basic homomorphic operations if (rst le n), where n is dimension of the polynomial ring used in RLWE encryption. Our method was implemented in HElib using the BGV scheme. Experimental results show that the new framework has significant advantage in efficiency when (rst le n). In this case, the new framework is 1.2 to 106.8 times faster than exiting algorithms in experiments.
同态加密(HE)是用于实现安全外包计算的主流加密工具之一。一个典型的任务是安全矩阵计算,这是各种外包计算应用程序(如统计分析和机器学习)中使用的基本操作。本文给出了两个具有大小的矩阵的安全乘法的一个新框架 (r times s) 和 (s times t) 分别,其中只要求 (O(log n)) 基本同态运算 (rst le n),其中n为RLWE加密中使用的多项式环的维数。我们的方法在HElib中使用BGV方案实现。实验结果表明,该框架具有显著的效率优势 (rst le n). 在这种情况下,新框架比实验中的现有算法快1.2到106.8倍。
{"title":"A new framework for fast homomorphic matrix multiplication","authors":"Xiaopeng Zheng, Hongbo Li, Dingkang Wang","doi":"10.1007/s10623-025-01614-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01614-y","url":null,"abstract":"<p>Homomorphic encryption (HE) is one of the mainstream cryptographic tools used to enable secure outsourced computation. A typical task is secure matrix computation, which is a fundamental operation used in various outsourced computing applications such as statistical analysis and machine learning. In this paper, we present a new framework for secure multiplication of two matrices with size <span>(r times s)</span> and <span>(s times t)</span> respectively, which requires only <span>(O(log n))</span> basic homomorphic operations if <span>(rst le n)</span>, where <i>n</i> is dimension of the polynomial ring used in RLWE encryption. Our method was implemented in HElib using the BGV scheme. Experimental results show that the new framework has significant advantage in efficiency when <span>(rst le n)</span>. In this case, the new framework is 1.2 to 106.8 times faster than exiting algorithms in experiments.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143627620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-14DOI: 10.1007/s10623-025-01607-x
Carlos Agrinsoni, Heeralal Janwa, Moises Delgado
A function (f: {mathbb {F}}_q rightarrow {mathbb {F}}_q), is called an almost perfect nonlinear (APN) if (f(X+a)-f(X) =b) has at most 2 solutions for every (b,a in {mathbb {F}}_q), with a nonzero. Furthermore, it is called an exceptional APN if it is an APN on infinitely many extensions of ({mathbb {F}}_q). These problems are equivalent to finding rational points on the corresponding variety ({mathcal {X}}_f:=phi _f(X,Y,Z)=0). The Lang–Weil, Deligne, and Ghorpade–Lachaud bounds help solve these problems when (phi _f) contains an absolutely irreducible factor in the defining field. The exceptional monomial APN functions had been classified up to CCZ equivalence by Hernando and McGuire (J Algebra 343:78–92, 2011), proving the conjecture of Janwa, Wilson, and McGuire (JMW) (1993, 1995). The main tools used were the computation and classification of the singularities of ({mathcal {X}}_f) and the algorithm of JMW for the absolute irreducibility testing using Bezout’s Theorem. Aubry et al. (2010) conjectured that the only exceptional APN functions of odd degree up to CCZ equivalence are the Gold ((2^k+1)) and the Kasami-Welch ((2^{2k}-2^k+1)) monomial functions. Here, we settle the first case (Theorem 20). We also prove a part of a conjecture on exceptional crooked functions. One of the main tools in our proofs is our new absolute irreducibility criterion (Theorem 9).
{"title":"Resolution of the exceptional APN conjecture in the Gold degree case","authors":"Carlos Agrinsoni, Heeralal Janwa, Moises Delgado","doi":"10.1007/s10623-025-01607-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01607-x","url":null,"abstract":"<p>A function <span>(f: {mathbb {F}}_q rightarrow {mathbb {F}}_q)</span>, is called an <i>almost perfect nonlinear </i> (APN) if <span>(f(X+a)-f(X) =b)</span> has at most 2 solutions for every <span>(b,a in {mathbb {F}}_q)</span>, with <i>a</i> nonzero. Furthermore, it is called an exceptional APN if it is an APN on infinitely many extensions of <span>({mathbb {F}}_q)</span>. These problems are equivalent to finding rational points on the corresponding variety <span>({mathcal {X}}_f:=phi _f(X,Y,Z)=0)</span>. The Lang–Weil, Deligne, and Ghorpade–Lachaud bounds help solve these problems when <span>(phi _f)</span> contains an absolutely irreducible factor in the defining field. The exceptional monomial APN functions had been classified up to CCZ equivalence by Hernando and McGuire (J Algebra 343:78–92, 2011), proving the conjecture of Janwa, Wilson, and McGuire (JMW) (1993, 1995). The main tools used were the computation and classification of the singularities of <span>({mathcal {X}}_f)</span> and the algorithm of JMW for the absolute irreducibility testing using Bezout’s Theorem. Aubry et al. (2010) conjectured that the only exceptional APN functions of odd degree up to CCZ equivalence are the Gold <span>((2^k+1))</span> and the Kasami-Welch <span>((2^{2k}-2^k+1))</span> monomial functions. Here, we settle the first case (Theorem 20). We also prove a part of a conjecture on exceptional crooked functions. One of the main tools in our proofs is our new absolute irreducibility criterion (Theorem 9).</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143618460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-14DOI: 10.1007/s10623-025-01611-1
Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei Hu
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the guess-and-filtering method. At CRYPTO 2023, Boura et al. first proposed a new key recovery technique—the differential meet-in-the-middle attack, which recovers the key in a meet-in-the-middle manner. Inspired by this technique, we incorporate the meet-in-the-middle technique into impossible cryptanalysis and propose a generic impossible differential meet-in-the-middle attack (IDMA) framework. We apply IDMA to block ciphers SKINNY, SKINNYe-v2, and ForkSKINNY and achieve remarkably efficient attacks. We improve the impossible differential attack on SKINNY-n-3n by 2 rounds in the single-tweakey setting and 1 round in the related-tweakey setting. For SKINNYe-v2, the impossible differential attacks now can cover 2 more rounds in the related-tweakey setting and the first 23/24/25-round attacks in the single-tweakey model are given. For ForkSKINNY-n-3n, we improve the attacks by 2 rounds in the limited setting specified by the designers and 1 round in relaxed settings. These results confirm that the meet-in-the-middle technique can result in more efficient key recovery, reaching beyond what traditional methods can achieve on certain ciphers.
{"title":"Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY","authors":"Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei Hu","doi":"10.1007/s10623-025-01611-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01611-1","url":null,"abstract":"<p>Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the guess-and-filtering method. At CRYPTO 2023, Boura <i>et al.</i> first proposed a new key recovery technique—the differential meet-in-the-middle attack, which recovers the key in a meet-in-the-middle manner. Inspired by this technique, we incorporate the meet-in-the-middle technique into impossible cryptanalysis and propose a generic impossible differential meet-in-the-middle attack (<span>IDMA</span>) framework. We apply <span>IDMA</span> to block ciphers <span>SKINNY</span>, <span>SKINNYe</span>-v2, and <span>ForkSKINNY</span> and achieve remarkably efficient attacks. We improve the impossible differential attack on <span>SKINNY</span>-<i>n</i>-3<i>n</i> by 2 rounds in the single-tweakey setting and 1 round in the related-tweakey setting. For <span>SKINNYe</span>-v2, the impossible differential attacks now can cover 2 more rounds in the related-tweakey setting and the first 23/24/25-round attacks in the single-tweakey model are given. For <span>ForkSKINNY</span>-<i>n</i>-3<i>n</i>, we improve the attacks by 2 rounds in the limited setting specified by the designers and 1 round in relaxed settings. These results confirm that the meet-in-the-middle technique can result in more efficient key recovery, reaching beyond what traditional methods can achieve on certain ciphers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"183 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143618461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}