Designs, Codes and Cryptography最新文献

筛选
英文 中文
Efficient generation of odd order de Bruijn sequence with the same complement and reverse sequences
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-01 DOI: 10.1007/s10623-025-01580-5
Zuling Chang, Qiang Wang
{"title":"Efficient generation of odd order de Bruijn sequence with the same complement and reverse sequences","authors":"Zuling Chang, Qiang Wang","doi":"10.1007/s10623-025-01580-5","DOIUrl":"https://doi.org/10.1007/s10623-025-01580-5","url":null,"abstract":"<p>Experimental results show that, when the order <i>n</i> is odd, there are de Bruijn sequences such that the corresponding complement sequence and the reverse sequence are the same. In this paper, we propose one efficient method to generate such de Bruijn sequences. This solves an open problem asked by Fredricksen forty years ago for showing the existence of such de Bruijn sequences when the odd order <span>(n &gt;1)</span>. Moreover, we refine a characterization of de Bruijn sequences with the same complement and reverse sequences and study the number of these de Bruijn sequences, as well as the distribution of de Bruijn sequences of the maximum linear complexity.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"33 4 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The revised boomerang connectivity tables and their connection to the difference distribution table
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-01 DOI: 10.1007/s10623-025-01582-3
Kirpa Garg, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stănică
{"title":"The revised boomerang connectivity tables and their connection to the difference distribution table","authors":"Kirpa Garg, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stănică","doi":"10.1007/s10623-025-01582-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01582-3","url":null,"abstract":"<p>It is well-known that functions over finite fields play a crucial role in designing substitution boxes (S-boxes) in modern block ciphers. In order to analyze the security of an S-box, recently, three new tables have been introduced: the Extended Boomerang Connectivity Table (EBCT), the Lower Boomerang Connectivity Table (LBCT), and the Upper Boomerang Connectivity Table (UBCT). In fact, these tables offer improved methods over the usual Boomerang Connectivity Table (BCT) for analyzing the security of S-boxes against boomerang-style attacks. Here, we put in context these new EBCT, LBCT, and UBCT concepts by connecting them to the DDT for a differentially <span>(delta )</span>-uniform function and also determine the EBCT, LBCT, and UBCT entries of three classes of differentially 4-uniform power permutations, namely, Gold, Kasami and Bracken–Leander. We also determine the Double Boomerang Connectivity Table (DBCT) entries of the Gold function. As byproducts of our approach, we obtain some previously published results quite easily.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-01 DOI: 10.1007/s10623-025-01579-y
Soumya Sahoo, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar, Chester Rebeiro
{"title":"Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a","authors":"Soumya Sahoo, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar, Chester Rebeiro","doi":"10.1007/s10623-025-01579-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01579-y","url":null,"abstract":"<p>Side Channel Attacks (SCA) exploit physical information leakage from devices performing cryptographic operations, posing significant security threats. While SCA has been extensively studied in the context of block ciphers, similar analyses on stream ciphers and constructions like authenticated encryption are less explored. In this paper, we present a novel enhancement to existing SCA techniques based on the hamming weight model for stream ciphers. We have identified critical oversights in previous SCA attack models, allowing us to introduce additional inequalities that enhance the model’s effectiveness. For TRIVIUM and GRAIN-128-AEAD, we demonstrate that a practical state recovery attack can be achieved in significantly less time than existing attacks on the HW/32 model. Furthermore, we show that our improved model is capable of handling the HW/64 model and can recover the state even with noisy traces within a few hours. Additionally, we extend our model to the authenticated encryption schemes ACORN-128 v3 and ASCON-128a, demonstrating its broader applicability.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"50 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perturbation-resilient sets for dynamic service balancing
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-01-31 DOI: 10.1007/s10623-025-01565-4
Jin Sima, Chao Pan, Olgica Milenkovic
{"title":"Perturbation-resilient sets for dynamic service balancing","authors":"Jin Sima, Chao Pan, Olgica Milenkovic","doi":"10.1007/s10623-025-01565-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01565-4","url":null,"abstract":"<p>A combinatorial trade is a pair of sets of blocks of elements that can be exchanged while preserving relevant subset intersection constraints. The class of balanced and swap-robust minimal trades was proposed in Pan et al. (in: 2022 IEEE International Symposium on Information Theory (ISIT), IEEE, pp 2385–2390, 2022) for exchanging blocks of data chunks stored on distributed storage systems in an access- and load-balanced manner. More precisely, data chunks in the trades of interest are labeled by popularity ranks and the blocks are required to have both balanced overall popularity and stability properties with respect to swaps in chunk popularities. The original construction of such trades relied on computer search and paired balanced sets obtained through iterative combining of smaller sets that have provable stability guarantees. To reduce the substantial gap between the results of prior approaches and the known theoretical lower bound, we present new analytical upper and lower bounds on the minimal disbalance of blocks introduced by limited-magnitude popularity ranking swaps. Our constructive and near-optimal approach relies on pairs of graphs whose vertices are two balanced sets with edges/arcs that capture the balance and potential balance changes induced by limited-magnitude popularity swaps. In particular, we show that if we start with carefully selected balanced trades and limit the magnitude of rank swaps to one, the new upper and lower bound on the maximum block disbalance caused by a swap only differ by a factor of 1.07. We also extend these results for larger popularity swap magnitudes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"63 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear complementary pairs of skew constacyclic codes
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-01-31 DOI: 10.1007/s10623-025-01568-1
F. J. Lobillo, José Manuel Muñoz
{"title":"Linear complementary pairs of skew constacyclic codes","authors":"F. J. Lobillo, José Manuel Muñoz","doi":"10.1007/s10623-025-01568-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01568-1","url":null,"abstract":"<p>Linear complementary pairs (LCPs) of codes have been studied since they were introduced in the context of discussing mitigation measures against possible hardware attacks to integrated circuits. In this situation, the security parameters for LCPs of codes are defined as the (Hamming) distance and the dual distance of the codes in the pair. We study the properties of LCPs of skew constacyclic codes, since their algebraic structure provides tools for studying their duals and their distances. As a result, we give a characterization for those pairs, as well as multiple results that lead to constructing pairs with designed security parameters. We extend skew BCH codes to a constacyclic context and show that an LCP of codes can be immediately constructed from a skew BCH constacyclic code. Additionally, we describe a Hamming weight-preserving automorphism group in the set of skew constacyclic codes, which can be used for constructing LCPs of codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143071705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On vectorial functions with maximal number of bent components
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-01-31 DOI: 10.1007/s10623-025-01569-0
Xianhong Xie, Yi Ouyang, Honggang Hu
{"title":"On vectorial functions with maximal number of bent components","authors":"Xianhong Xie, Yi Ouyang, Honggang Hu","doi":"10.1007/s10623-025-01569-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01569-0","url":null,"abstract":"<p>We study vectorial functions with maximal number of bent components in this paper. We first study the Walsh transform and nonlinearity of <span>(F(x)=x^{2^e}h(textrm{Tr}_{2^{2m}/2^m}(x)))</span>, where <span>(ege 0)</span> and <i>h</i>(<i>x</i>) is a permutation over <span>({mathbb {F}}_{2^m})</span>. If <i>h</i>(<i>x</i>) is monomial, the nonlinearity of <i>F</i>(<i>x</i>) is shown to be at most <span>( 2^{2,m-1}-2^{lfloor frac{3,m}{2}rfloor })</span> and some non-plateaued and plateaued functions attaining the upper bound are found. If <i>h</i>(<i>x</i>) is linear, the exact nonlinearity of <i>F</i>(<i>x</i>) is determined. Secondly, we give a construction of vectorial functions with maximal number of bent components from known ones, thus obtain two new classes from the Niho class and the Maiorana-McFarland class. Our construction gives a quadratic vectorial function that is not equivalent to the known functions of the form <i>xh</i>(<i>x</i>), and also contains vectorial functions outside the completed Maiorana-McFarland class. Finally, we show that the vectorial function <span>(F: {mathbb {F}}_{2^{2m}}rightarrow {mathbb {F}}_{2^{2m}})</span>, <span>(xmapsto x^{2^m+1}+x^{2^i+1})</span> has maximal number of bent components if and only if <span>(i=0)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"63 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143071707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-01-30 DOI: 10.1007/s10623-025-01574-3
Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang
{"title":"A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial","authors":"Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang","doi":"10.1007/s10623-025-01574-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01574-3","url":null,"abstract":"<p>Due to the operational efficiency and lower computational costs of the Chebyshev polynomial compared to ECC, this chaotic system has attracted widespread attention in public key cryptography. However, the single recurrence coefficient limitation and inherent short-period flaw, often render the Chebyshev polynomials cryptosystem ineffective against various attacks, such as Exhaustive Attacks and Ciphertext-Only Attacks. To address these vulnerabilities, the Multi-Dimensional General Chebyshev Polynomials (MDGCP) is developed in this study by parameterizing the coefficient of the Chebyshev polynomial over finite fields and converting its variable from one dimension to multiple dimensions. The MDGCP preserves the semigroup property and significantly reduces the likelihood of short periods by imposing a simple and explicit restriction on the initial state matrix. This enhancement improves the complexity and pluralism of the Chebyshev polynomial, thereby increasing its applicability in the design of public key cryptosystems. Consequently, a novel public key encryption algorithm based on MDGCP is proposed. Theoretical analyses and experimental results reveal that the proposed algorithm possesses better abilities than existing public key encryption algorithms based on Chebyshev polynomial in resisting exhaustive attacks and Ciphertext-only attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"45 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143071706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On polynomials over finite fields that are free of binomials
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-01-29 DOI: 10.1007/s10623-025-01573-4
Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas
{"title":"On polynomials over finite fields that are free of binomials","authors":"Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas","doi":"10.1007/s10623-025-01573-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01573-4","url":null,"abstract":"<p>Let <span>(mathbb {F}_q)</span> be the finite field with <i>q</i> elements, where <i>q</i> is a power of a prime <i>p</i>. Given a monic polynomial <span>(f in mathbb {F}_q[x])</span> that is not divisible by <i>x</i>, there exists a positive integer <span>(e=e(f))</span> such that <i>f</i>(<i>x</i>) divides the binomial <span>(x^e-1)</span> and <i>e</i> is minimal with this property. The integer <i>e</i> is commonly known as the order of <i>f</i> and we write <span>(textrm{ord}(f)=e)</span>. Motivated by a recent work of the second author on primitive <i>k</i>-normal elements over finite fields, in this paper we introduce the concept of polynomials free of binomials. These are the polynomials <span>(f in mathbb {F}_q[x])</span>, not divisible by <i>x</i>, such that <i>f</i>(<i>x</i>) does not divide any binomial <span>(x^d-delta in mathbb {F}_q[x])</span> with <span>(1le d&lt;textrm{ord}(f))</span>. We obtain some general results on polynomials free of binomials and we focus on the problem of describing the set of degrees of the polynomials that are free of binomials and whose order is fixed. In particular, we completely describe such set when the order equals a positive integer <span>(n&gt;1)</span> whose prime factors divide <span>(p(q-1))</span>. Moreover, we also provide a correspondence between the polynomials that are free of binomials and cyclic codes that cannot be submerged into smaller constacyclic codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"23 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143055042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polynomial reduction from syndrome decoding problem to regular decoding problem
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-01-28 DOI: 10.1007/s10623-025-01567-2
Pavol Zajac
{"title":"Polynomial reduction from syndrome decoding problem to regular decoding problem","authors":"Pavol Zajac","doi":"10.1007/s10623-025-01567-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01567-2","url":null,"abstract":"<p>The regular decoding problem asks for (the existence of) regular solutions to a syndrome decoding problem (SDP). This problem has increased applications in post-quantum cryptography and cryptanalysis. Recently, Esser and Santini explored in depth the connection between the regular (RSD) and classical syndrome decoding problems. They have observed that while RSD to SDP reductions are known (in any parametric regime), a similar generic reduction from SDP to RSD is not known. In our contribution, we examine two different generic polynomial reductions from a syndrome decoding problem to a regular decoding problem instance. The first reduction is based on constructing a special parity check matrix that encodes weight counter progression inside the parity check matrix, which is then the input of the regular decoding oracle. The target regular decoding problem has a significantly longer code length, that depends linearly on the weight parameter of the original SDP. The second reduction is based on translating the SDP to a non-linear system of equations in the Multiple Right-Hand Sides form, and then applying RSD oracle to solve this system. The second reduction has better code length. The ratio between RSD and SDP code length of the second reduction can be bounded by a constant (less than 8).</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"114 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143049911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-01-24 DOI: 10.1007/s10623-025-01570-7
Mark Pankov, Krzysztof Petelczyc, Mariusz Żynel
{"title":"Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4","authors":"Mark Pankov, Krzysztof Petelczyc, Mariusz Żynel","doi":"10.1007/s10623-025-01570-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01570-7","url":null,"abstract":"<p>Let <span>(n=2^k-1)</span> and <span>(m=2^{k-2})</span> for a certain <span>(kge 3)</span>. Consider the point-line geometry of 2<i>m</i>-element subsets of an <i>n</i>-element set. Maximal singular subspaces of this geometry correspond to binary simplex codes of dimension <i>k</i>. For <span>(kge 4)</span> the associated collinearity graph contains maximal cliques different from maximal singular subspaces. We investigate maximal cliques corresponding to symmetric (<i>n</i>, 2<i>m</i>, <i>m</i>)-designs. The main results concern the case <span>(k=4)</span> and give a geometric interpretation of the five well-known symmetric (15, 8, 4)-designs.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"206 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143026657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信