Two Galois Fields Cryptographic Applications

Author(s):  
Antonio Lloris Ruiz ◽  
Encarnación Castillo Morales ◽  
Luis Parrilla Roure ◽  
Antonio García Ríos ◽  
María José Lloris Meseguer
Keyword(s):  
Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 702
Author(s):  
Aixian Zhang ◽  
Keqin Feng

Normal bases are widely used in applications of Galois fields and Galois rings in areas such as coding, encryption symmetric algorithms (block cipher), signal processing, and so on. In this paper, we study the normal bases for Galois ring extension R / Z p r , where R = GR ( p r , n ) . We present a criterion on the normal basis for R / Z p r and reduce this problem to one of finite field extension R ¯ / Z ¯ p r = F q / F p ( q = p n ) by Theorem 1. We determine all optimal normal bases for Galois ring extension.


2021 ◽  
Vol 13 (2) ◽  
pp. 84-86
Author(s):  
Z.L. Dahiru ◽  
A.M. Lawan

In this paper, a class of permutation polynomial known as o-polynomial over Galois fields of characteristic 2 was studied. A necessary and sufficients condition for a monomial 𝑥2k to be an o-polynomial over F2t  is given and two results obtained by Gupta and Sharma (2016) were deduced.


2018 ◽  
Vol 18 (3) ◽  
pp. 339-348
Author(s):  
V. M. Deundyak ◽  
N. S. Mogilevskaya

Introduction. Polynomials in several variables over Galois fields provide the basis for the Reed-Muller coding theory, and are also used  in a number of cryptographic problems. The properties of such polynomials specified over the derived Galois fields of fuzzy cardinality are studied. For the results obtained,  two  real-world  applications  are  proposed: partitioning scheme and Reed-Muller code decoder.Materials and Methods. Using linear algebra, theory of Galois fields, and general theory of polynomials in several variables, we have obtained results related to the differentiation and integration  of polynomials  in  several  variables  over  Galois fields of fuzzy cardinality. An analog of the differentiation operator is constructed and studied for vectors.Research Results. On the basis of the obtained results on the differentiation and integration of polynomials, a new decoder for Reed-Muller codes of the second order is given, and a scheme for organizing the partitioned transfer of confidential data is proposed. This is a communication system in which the source data on the sender is divided into several parts and, independently of one  another,  transmitted  through  different communication channels, and then, on the receiver, the initial data is restored of the parts retrieved. The proposed scheme feature is that it enables to protect data, both from the nonlegitimate access, and from unintentional errors; herewith, one  and  the  same  mathematical  apparatus  is  used  in  both cases. The developed decoder for the second-order Reed-Muller codes prescribed over the derived odd Galois field may have a constraint to the recoverable error level; however, its use is advisable for a number of the communication channels.Discussion    and    Conclusions.    The    proposed    practical applications   of   the   results   obtained   are   useful   for   the organization of reliable communication systems. In future, it is planned  to  study  the  restoration  process  of  the  original polynomial by its derivatives, in case of their partial distortion, and the development of appropriate applications.


Author(s):  
Jose Torres-Jimenez ◽  
Nelson Rangel-Valdez ◽  
Ana Loreto Gonzalez-Hernandez ◽  
Himer Avila-George
Keyword(s):  

2014 ◽  
Vol 96 ◽  
pp. 153-163 ◽  
Author(s):  
Daniel G. Silva ◽  
Everton Z. Nadalin ◽  
Guilherme P. Coelho ◽  
Leonardo T. Duarte ◽  
Ricardo Suyama ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document