基于chi的矢量布尔函数的微分和线性性质

IF 1.2 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-01-01 Epub Date: 2023-04-26 DOI:10.1007/s12095-023-00639-1
Silvia Mella, Alireza Mehrdad, Joan Daemen
{"title":"基于chi的矢量布尔函数的微分和线性性质","authors":"Silvia Mella,&nbsp;Alireza Mehrdad,&nbsp;Joan Daemen","doi":"10.1007/s12095-023-00639-1","DOIUrl":null,"url":null,"abstract":"<p><p>To evaluate the security of a cryptographic primitive, investigating its resistance against differential and linear cryptanalysis is required. Many modern cryptographic primitives repeatedly apply similar round functions alternated with the addition of round keys or constants. A round function usually consists of a non-linear mapping and a number of linear mappings. The non-linear mapping <math><mi>χ</mi></math> is used in different cryptographic primitives such as Keccak and Subterranean. An alternative version of <math><mi>χ</mi></math> is used in Ascon and the non-linear layer of Simon has the same differential and linear properties of <math><mi>χ</mi></math>. The mapping <math><mi>χ</mi></math> can be applied to strings with different lengths. For instance, it can be parallelly applied to small-length strings as in Keccak, where it works on 5-bit strings, or it can be applied to big-length strings as in Subterranean, where it works on a string of length 257. Investigating the differential and linear properties of <math><mi>χ</mi></math> working on alternative lengths of strings, provides useful information to designers to make a better choice for the non-linear layer. Some differential properties of <math><mi>χ</mi></math> have been analyzed in [8] and in this work we provide a revised presentation of them. We then extend this study and we analyze linear propagation properties of <math><mi>χ</mi></math>. Thanks to these additional results, we extend the comparison between the application of parallel instances of <math><mi>χ</mi></math> on small-length strings and the application of a single instance of <math><mi>χ</mi></math> on a big-length string. We show how we can apply the results of this study also to the non-linear layers of Ascon and Simon thanks to their affine-equivalence with <math><mi>χ</mi></math>.</p>","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10624758/pdf/","citationCount":"1","resultStr":"{\"title\":\"Differential and Linear properties of vectorial boolean functions based on chi.\",\"authors\":\"Silvia Mella,&nbsp;Alireza Mehrdad,&nbsp;Joan Daemen\",\"doi\":\"10.1007/s12095-023-00639-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>To evaluate the security of a cryptographic primitive, investigating its resistance against differential and linear cryptanalysis is required. Many modern cryptographic primitives repeatedly apply similar round functions alternated with the addition of round keys or constants. A round function usually consists of a non-linear mapping and a number of linear mappings. The non-linear mapping <math><mi>χ</mi></math> is used in different cryptographic primitives such as Keccak and Subterranean. An alternative version of <math><mi>χ</mi></math> is used in Ascon and the non-linear layer of Simon has the same differential and linear properties of <math><mi>χ</mi></math>. The mapping <math><mi>χ</mi></math> can be applied to strings with different lengths. For instance, it can be parallelly applied to small-length strings as in Keccak, where it works on 5-bit strings, or it can be applied to big-length strings as in Subterranean, where it works on a string of length 257. Investigating the differential and linear properties of <math><mi>χ</mi></math> working on alternative lengths of strings, provides useful information to designers to make a better choice for the non-linear layer. Some differential properties of <math><mi>χ</mi></math> have been analyzed in [8] and in this work we provide a revised presentation of them. We then extend this study and we analyze linear propagation properties of <math><mi>χ</mi></math>. Thanks to these additional results, we extend the comparison between the application of parallel instances of <math><mi>χ</mi></math> on small-length strings and the application of a single instance of <math><mi>χ</mi></math> on a big-length string. We show how we can apply the results of this study also to the non-linear layers of Ascon and Simon thanks to their affine-equivalence with <math><mi>χ</mi></math>.</p>\",\"PeriodicalId\":48936,\"journal\":{\"name\":\"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10624758/pdf/\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12095-023-00639-1\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"2023/4/26 0:00:00\",\"PubModel\":\"Epub\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12095-023-00639-1","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2023/4/26 0:00:00","PubModel":"Epub","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 1

摘要

为了评估密码原语的安全性,需要研究其对差分和线性密码分析的抵抗力。许多现代密码原语重复应用类似的循环函数,交替添加循环密钥或常量。圆函数通常由一个非线性映射和若干线性映射组成。非线性映射χ用于不同的密码原语,如Keccak和Subterranean。在Ascon中使用了χ的替代版本,Simon的非线性层具有与χ相同的微分和线性性质。映射χ可以应用于具有不同长度的字符串。例如,它可以并行应用于小长度字符串,如Keccak中的5位字符串,也可以应用于大长度字符串,例如Subterranean中的257长度字符串。研究χ在不同长度字符串上的微分和线性特性,为设计者更好地选择非线性层提供了有用的信息。[8]中已经分析了χ的一些微分性质,在这项工作中,我们提供了它们的修正表示。然后,我们扩展了这项研究,并分析了χ的线性传播特性。由于这些额外的结果,我们扩展了在小长度字符串上应用χ的并行实例和在大长度字符串上使用χ的单个实例之间的比较。我们展示了如何将这项研究的结果也应用于Ascon和Simon的非线性层,这要归功于它们与χ的仿射等价性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Differential and Linear properties of vectorial boolean functions based on chi.

To evaluate the security of a cryptographic primitive, investigating its resistance against differential and linear cryptanalysis is required. Many modern cryptographic primitives repeatedly apply similar round functions alternated with the addition of round keys or constants. A round function usually consists of a non-linear mapping and a number of linear mappings. The non-linear mapping χ is used in different cryptographic primitives such as Keccak and Subterranean. An alternative version of χ is used in Ascon and the non-linear layer of Simon has the same differential and linear properties of χ. The mapping χ can be applied to strings with different lengths. For instance, it can be parallelly applied to small-length strings as in Keccak, where it works on 5-bit strings, or it can be applied to big-length strings as in Subterranean, where it works on a string of length 257. Investigating the differential and linear properties of χ working on alternative lengths of strings, provides useful information to designers to make a better choice for the non-linear layer. Some differential properties of χ have been analyzed in [8] and in this work we provide a revised presentation of them. We then extend this study and we analyze linear propagation properties of χ. Thanks to these additional results, we extend the comparison between the application of parallel instances of χ on small-length strings and the application of a single instance of χ on a big-length string. We show how we can apply the results of this study also to the non-linear layers of Ascon and Simon thanks to their affine-equivalence with χ.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences COMPUTER SCIENCE, THEORY & METHODS-MATHEMATICS, APPLIED
CiteScore
2.50
自引率
7.10%
发文量
66
期刊介绍: The scope of the journal focuses on discrete structures used in stream and block ciphers in symmetric cryptography; code division multiple access in communications; and random number generation for statistics, cryptography and numerical methods. In particular, papers covering Boolean functions and sequences, without excluding any other discrete structure used in cryptography and communications, such as finite fields and other algebraic structures, are strongly encouraged.
期刊最新文献
Three classes of permutation quadrinomials in odd characteristic The cross-correlation spectrum of ternary perfect sequences and their decimations Further Results on Affine Sub-Families of NFSR Sequences A lower bound for differential uniformity by multiplicative complexity & bijective functions of multiplicative complexity 1 over finite fields Lower bounds on the maximum cross-correlations of 2-D quasi-complementary array sets
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1