{"title":"Optimal quinary cyclic codes with three zeros","authors":"Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li","doi":"10.1007/s12095-024-00703-4","DOIUrl":"https://doi.org/10.1007/s12095-024-00703-4","url":null,"abstract":"<p>Cyclic codes are an important subclass of linear codes, they not only have good algebraic structure, but also are easy to be encoded and decoded. At present, researchers have constructed many optimal ternary cyclic codes, but the study on quinary cyclic codes is less developed. In this paper, by analyzing the solutions of certain equations over <span>(mathbb {F}_{5^m})</span>, we construct some optimal quinary cyclic codes with three zeros and with parameters <span>([5^m-1, 5^m-2-2m, 4])</span>, <span>([5^m-1, 5^m-2-frac{3m}{2}, 4])</span>. Moreover, the weight distributions of two classes of their duals are also provided.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A direct construction of cross z-complementary sequence sets with large set size","authors":"Praveen Kumar, Sudhan Majhi, Subhabrata Paul","doi":"10.1007/s12095-024-00700-7","DOIUrl":"https://doi.org/10.1007/s12095-024-00700-7","url":null,"abstract":"<p>This paper presents a direct construction of novel type cross Z-complementary sequence sets (CZCSSs), whose aperiodic correlation sums exhibit zero correlation zones at both the front-end and tail-end shifts. CZCSS can be regarded as an extension of the symmetrical Z-complementary code set (SZCCS). The available construction of SZCCS has a limitation on the set size, with a maximum set size of 8. The proposed generalized Boolean function-based construction can generate CZCSS/SZCCS of length in the form of a non-power-of-two with variable set size <span>(2^{n+1})</span>, where each code has <span>(2^{n+1})</span> constituent sequences. The proposed construction also yields cross Z-complementary pairs and cross Z-complementary sets with a larger number of constituent sequences compared to the existing work.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"157 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139764284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Several constructions of optimal LCD codes over small finite fields","authors":"Shitao Li, Minjia Shi, Huizhou Liu","doi":"10.1007/s12095-024-00699-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00699-x","url":null,"abstract":"<p>Linear complementary dual (LCD) codes are linear codes which intersect their dual codes trivially, which have been of interest and extensively studied due to their practical applications in computational complexity and information protection. In this paper, we give some methods for constructing LCD codes over small finite fields by modifying some typical methods for constructing linear codes. We show that all odd-like binary Euclidean LCD codes, ternary Euclidean LCD codes and quaternary Hermitian LCD codes can be constructed using the modified methods. Our results improve the known lower bounds on the largest minimum distances of LCD codes. Furthermore, we give two counterexamples to disprove the conjecture proposed by Bouyuklieva (Des. Codes Cryptogr. <b>89</b>(11), 2445–2461 2021).</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139764282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the parameters of some LCD BCH codes over $$mathbb {F}_q$$ with length $$(q^m+1)/lambda $$","authors":"","doi":"10.1007/s12095-024-00697-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00697-z","url":null,"abstract":"<h3>Abstract</h3> <p>As a particular subclass of cyclic codes, BCH codes have wide applications in storage devices, communication systems, consumer electronics and other fields. However, parameters of BCH codes are unknown in general. In this paper, we investigate parameters of BCH codes of length <span> <span>(frac{q^m+1}{lambda })</span> </span> where <span> <span>(lambda mid q+1)</span> </span>.Some new techniques are employed to study the coset leaders. For any odd prime power <em>q</em> and <span> <span>(m=4,8)</span> </span>, or <span> <span>(mge 12)</span> </span> and <span> <span>(mequiv 4~ (textrm{mod}~ 8))</span> </span>, the second, the third and the fourth largest coset leaders modulo <span> <span>(q^m+1)</span> </span> are determined, and the dimensions of some BCH codes of length <span> <span>(q^m+1)</span> </span> with large designed distances are given. For <span> <span>(1<lambda <q+1)</span> </span>, the first few largest coset leaders and the coset leaders modulo <span> <span>(frac{q^m+1}{lambda })</span> </span> in the range 1 to <span> <span>( frac{ q^{lfloor (m+1)/2rfloor }}{lambda })</span> </span> are studied, and the dimensions of some BCH codes of length <span> <span>(frac{q^m+1}{lambda })</span> </span> are given as well. The BCH codes presented in this paper are LCD codes and have a sharper lower bound on the minimum distance than the well-known BCH bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theoretical differential fault attacks on FLIP and FiLIP","authors":"Pierrick Méaux, Dibyendu Roy","doi":"10.1007/s12095-024-00698-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00698-y","url":null,"abstract":"<p>In this article, we examine Differential Fault Attacks (DFA) targeting two stream ciphers, FLIP and FiLIP. We explore the fault model where an adversary flips a single bit of the key at an unknown position. Our analysis involves establishing complexity bounds for these attacks, contingent upon the cryptographic parameters of the Boolean functions employed as filters and the key size. Initially, we demonstrate how the concept of sensitivity enables the detection of the fault position using only a few keystream bits. This represents an enhancement over previous DFA methodologies applied to these ciphers. Subsequently, we leverage the properties of the filter’s derivatives to execute attacks. This approach is universally applicable to any filter, and we delineate specific attack strategies for the two function families previously implemented in these ciphers.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GL-S-NFSR: A new NFSR structure and its period properties","authors":"Xiao-Juan Wang, Tian Tian, Wen-Feng Qi","doi":"10.1007/s12095-024-00694-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00694-2","url":null,"abstract":"<p>Recently nonlinear feedback shift registers (NFSRs) have frequently been used as basic building blocks for stream ciphers. A major problem concerning NFSRs is to construct NFSRs with large periods. In this paper, a new NFSR structure whose period could be theoretically analyzed is proposed and studied, called GL-S-NFSR. A GL-S-NFSR is a selective cascade connection of a primitive Galois LFSR into a standard Galois NFSR with a linear simplified feedback function, where standard Galois NFSRs with linear simplified feedback functions are very useful in stream ciphers, e.g., Trivium. It is proved that the periods of the output sequences of a GL-S-NFSR are lower bounded by the product of all the Zsigmondy primes of <span>( 2^n-1 )</span> with a probability close to 1 under a weak assumption, and particularly, if <i>n</i> is a prime, then <span>(2^n-1)</span> divides the periods of the output sequences with a high probability, where <i>n</i> is the stage of the Galois LFSR. Besides, it is also proved that there are several registers satisfying that the periods are multiples of Zsigmondy primes without any assumption. Note that the main building block of Kreyvium consists of a standard Galois NFSR with a linear simplified feedback function and two pure cycling registers (PCRs). Periodic results on GL-S-NFSR are applied to Kreyvium by modifying one PCR to a primitive LFSR and the modified building block of Kreyvium is called M-Kreyvium. It is shown that the sequences involved in M-Kreyvium could have large periods with high probabilities.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combinatorial constructions of repairable ramp schemes","authors":"Jinghui Zhao, Xiuling Shan, Zihong Tian","doi":"10.1007/s12095-024-00695-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00695-1","url":null,"abstract":"<p>A repairable ramp scheme is a ramp scheme in which a player can securely reconstruct a lost share with the help from a subset of players. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the security of the ramp scheme. Distribution designs were introduced by Stinson and Wei (Des. Codes Cryptogr. 86, 195–210 2018) and can be used to construct repairable ramp schemes. In this paper, we first give the definitions of a <span>(varvec{(tau _{1},tau _{2},l_{1},l_{2})})</span>-distribution design and a repairable ramp scheme. And we use anti-Pasch Steiner triple systems as distribution designs to construct repairable ramp schemes. We determine the existence of an anti-Pasch Steiner triple system (QFSTS<span>(varvec{(v)})</span>) with a minimum basic repairing set for <span>(varvec{vequiv 1,3pmod 6})</span>, <span>(varvec{vgeqslant 9})</span> and <span>(varvec{vne 13})</span>. Then we obtain a <span>(varvec{(2,4,n,3)})</span>-repairable ramp scheme containing <span>(varvec{n})</span> players with <span>(varvec{lceil frac{2v}{3}rceil leqslant nleqslant frac{v(v-1)}{6}})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Re-keying analysis in group key management of wireless sensor networks","authors":"Prity Kumari, Karam Ratan Singh","doi":"10.1007/s12095-023-00693-9","DOIUrl":"https://doi.org/10.1007/s12095-023-00693-9","url":null,"abstract":"<p>The exclusion basis system is a combinatorial formulation of group key management that provides long-term and flexible protection for wireless sensor networks while allowing for reasonable adjustment of the number of keys per node and the number of re-key messages. In this paper, we extend the work of Karst and Wicker to near-resolvable design, symmetric balanced incomplete block designs, and balanced incomplete block designs with the repetition count of a distinct pair of elements equal to one, and it is observed that near-resolvable design provides minimal re-keying compared to symmetric balanced incomplete block designs and balanced incomplete block designs. Also, near-resolvable design and exclusion basis system have the same re-keying size when the number of keys is <span>(n-1)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139374108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum","authors":"Shuhui Shen, Xiaojun Zhang","doi":"10.1007/s12095-023-00692-w","DOIUrl":"https://doi.org/10.1007/s12095-023-00692-w","url":null,"abstract":"<p>In this paper, we study a class of binary sequences with two-valued non-zero periodic autocorrelation sum and good periodic crosscorrelation sum as well as balanced properties. We make use of the sequences obtained in (No, J. et al., IEEE Trans. Inform. Theory 44(3), 1278-1282 2001) and adopt the extraction method similar to (Lüke, H. IEEE Trans. Inform. Theory 43(1) 1997). The new sequences are proven to be balanced or almost balanced. Based on these correlation and balanced properties, an important application is to construct Hadamard matrices of order <span>(p+1)</span> for <span>(pequiv 3~()</span>mod 4) and <span>(2p+2)</span> for <span>(pequiv 1~()</span>mod 4). Some examples are shown to verify the theoretical results.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139093770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}