{"title":"Research on nonlinear invariants of a power function over a binary field","authors":"Zebin Wang, Chenhui Jin, Ting Cui","doi":"10.1007/s12095-024-00734-x","DOIUrl":null,"url":null,"abstract":"<p>The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an <span>\\(\\varvec{n}\\)</span>-bit width function, the time complexity <span>\\(\\varvec{O}(\\textbf{2}^{\\varvec{3n}})\\)</span> is needed to find its all nonlinear invariants. In this paper, for the positive integer <span>\\(\\varvec{m}\\)</span>, we consider the power function <span>\\(\\varvec{x}^{\\varvec{m}}\\)</span> over the finite field <span>\\(\\varvec{GF}(\\varvec{2}^{\\varvec{n}})\\)</span>, which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of <span>\\(\\varvec{x}^{\\varvec{m}}\\)</span> is studied and we provide two mathematical toolboxes named <span>\\(\\varvec{\\sim }_{\\varvec{m}}\\)</span> <i>periodical point</i> and <span>\\(\\varvec{\\sim }_{\\varvec{m}}\\)</span> <i>equivalence class</i>. Second, we present an algorithm to get all the nonlinear invariants of <span>\\(\\varvec{x}^{\\varvec{m}}\\)</span> over <span>\\(\\varvec{GF}(\\varvec{2}^{\\varvec{n}})\\)</span> at the cost of time complexity <span>\\(\\varvec{O}(\\frac{{\\varvec{2}}^{\\varvec{n}}\\varvec{-1}}{\\varvec{\\gcd (2}^{\\varvec{n}}\\varvec{-1,m)}})\\)</span>. If the growth of <i>n</i> exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of <span>\\(\\varvec{x}^{\\varvec{m}}\\)</span>. Finally, we consider the nonlinear invariants of <span>\\(\\varvec{x}^\\textbf{3}\\)</span> over <span>\\(\\varvec{GF(2}^{\\varvec{129}})\\)</span> as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"30 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptography and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s12095-024-00734-x","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an \(\varvec{n}\)-bit width function, the time complexity \(\varvec{O}(\textbf{2}^{\varvec{3n}})\) is needed to find its all nonlinear invariants. In this paper, for the positive integer \(\varvec{m}\), we consider the power function \(\varvec{x}^{\varvec{m}}\) over the finite field \(\varvec{GF}(\varvec{2}^{\varvec{n}})\), which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of \(\varvec{x}^{\varvec{m}}\) is studied and we provide two mathematical toolboxes named \(\varvec{\sim }_{\varvec{m}}\)periodical point and \(\varvec{\sim }_{\varvec{m}}\)equivalence class. Second, we present an algorithm to get all the nonlinear invariants of \(\varvec{x}^{\varvec{m}}\) over \(\varvec{GF}(\varvec{2}^{\varvec{n}})\) at the cost of time complexity \(\varvec{O}(\frac{{\varvec{2}}^{\varvec{n}}\varvec{-1}}{\varvec{\gcd (2}^{\varvec{n}}\varvec{-1,m)}})\). If the growth of n exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of \(\varvec{x}^{\varvec{m}}\). Finally, we consider the nonlinear invariants of \(\varvec{x}^\textbf{3}\) over \(\varvec{GF(2}^{\varvec{129}})\) as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.