{"title":"基于旋转和移位的扩散函数分析","authors":"Arvind Kumar, P. Mishra, O. Ojjela","doi":"10.1080/01611194.2022.2046660","DOIUrl":null,"url":null,"abstract":"Abstract ‘Rotation and shift’ based diffusion functions are used in modern ciphers especially in ARX (Addition, Rotation, and XOR) based designs. They are preferred over other alternatives as they are efficient and lightweight. Usually, such diffusion functions map an n-bit block to another n-bit block. One of the requirements for an n-bit to n-bit diffusion function is that, it should be invertible. In this paper, we present mathematical models for different classes of ‘rotation and shift’ based diffusion functions and explore their invertibility. We derive sufficient conditions under which diffusion functions of these classes are invertible.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"419 - 435"},"PeriodicalIF":0.3000,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of rotation and shift based diffusion functions\",\"authors\":\"Arvind Kumar, P. Mishra, O. Ojjela\",\"doi\":\"10.1080/01611194.2022.2046660\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract ‘Rotation and shift’ based diffusion functions are used in modern ciphers especially in ARX (Addition, Rotation, and XOR) based designs. They are preferred over other alternatives as they are efficient and lightweight. Usually, such diffusion functions map an n-bit block to another n-bit block. One of the requirements for an n-bit to n-bit diffusion function is that, it should be invertible. In this paper, we present mathematical models for different classes of ‘rotation and shift’ based diffusion functions and explore their invertibility. We derive sufficient conditions under which diffusion functions of these classes are invertible.\",\"PeriodicalId\":55202,\"journal\":{\"name\":\"Cryptologia\",\"volume\":\"47 1\",\"pages\":\"419 - 435\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2022-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cryptologia\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.1080/01611194.2022.2046660\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptologia","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1080/01611194.2022.2046660","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Analysis of rotation and shift based diffusion functions
Abstract ‘Rotation and shift’ based diffusion functions are used in modern ciphers especially in ARX (Addition, Rotation, and XOR) based designs. They are preferred over other alternatives as they are efficient and lightweight. Usually, such diffusion functions map an n-bit block to another n-bit block. One of the requirements for an n-bit to n-bit diffusion function is that, it should be invertible. In this paper, we present mathematical models for different classes of ‘rotation and shift’ based diffusion functions and explore their invertibility. We derive sufficient conditions under which diffusion functions of these classes are invertible.
期刊介绍:
Cryptologia is the only scholarly journal in the world dealing with the history, the technology, and the effect of the most important form of intelligence in the world today - communications intelligence. It fosters the study of all aspects of cryptology -- technical as well as historical and cultural. The journal"s articles have broken many new paths in intelligence history. They have told for the first time how a special agency prepared information from codebreaking for President Roosevelt, have described the ciphers of Lewis Carroll, revealed details of Hermann Goering"s wiretapping agency, published memoirs - written for it -- of some World War II American codebreakers, disclosed how American codebreaking affected the structure of the United Nations.