scholarly journals Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices

Author(s):  
Chaoyun Li ◽  
Qingju Wang

Near-MDS matrices provide better trade-offs between security and efficiency compared to constructions based on MDS matrices, which are favored for hardwareoriented designs. We present new designs of lightweight linear diffusion layers by constructing lightweight near-MDS matrices. Firstly generic n×n near-MDS circulant matrices are found for 5 ≤ n ≤9. Secondly, the implementation cost of instantiations of the generic near-MDS matrices is examined. Surprisingly, for n = 7, 8, it turns out that some proposed near-MDS circulant matrices of order n have the lowest XOR count among all near-MDS matrices of the same order. Further, for n = 5, 6, we present near-MDS matrices of order n having the lowest XOR count as well. The proposed matrices, together with previous construction of order less than five, lead to solutions of n×n near-MDS matrices with the lowest XOR count over finite fields F2m for 2 ≤ n ≤ 8 and 4 ≤ m ≤ 2048. Moreover, we present some involutory near-MDS matrices of order 8 constructed from Hadamard matrices. Lastly, the security of the proposed linear layers is studied by calculating lower bounds on the number of active S-boxes. It is shown that our linear layers with a well-chosen nonlinear layer can provide sufficient security against differential and linear cryptanalysis.

2019 ◽  
Vol 2019 (4) ◽  
pp. 132-151 ◽  
Author(s):  
Raphael Bost ◽  
Pierre-Alain Fouque

Abstract Besides their security, the efficiency of searchable encryption schemes is a major criteria when it comes to their adoption: in order to replace an unencrypted database by a more secure construction, it must scale to the systems which rely on it. Unfortunately, the relationship between the efficiency and the security of searchable encryption has not been widely studied, and the minimum cost of some crucial security properties is still unclear. In this paper, we present new lower bounds on the trade-offs between the size of the client state, the efficiency and the security for searchable encryption schemes. These lower bounds target two kinds of schemes: schemes hiding the repetition of search queries, and forward-private dynamic schemes, for which updates are oblivious. We also show that these lower bounds are tight, by either constructing schemes matching them, or by showing that even a small increase in the amount of leaked information allows for constructing schemes breaking the lower bounds.


2021 ◽  
Vol 58 (3) ◽  
pp. 319-334
Author(s):  
Huaning Liu ◽  
Yinyin Yang

In cryptography one needs pseudorandom sequences whose short subsequences are also pseudorandom. To handle this problem, Dartyge, Gyarmati and Sárközy introduced weighted measures of pseudorandomness of binary sequences. In this paper we continue the research in this direction. We introduce weighted pseudorandom measure for multidimensional binary lattices and estimate weighted pseudorandom measure for truly random binary lattices. We also give lower bounds for weighted measures of even order and present an example by using the quadratic character of finite fields.


Author(s):  
Somphong Jitman ◽  
Aunyarut Bunyawat ◽  
Supanut Meesawat ◽  
Arithat Thanakulitthirat ◽  
Napat Thumwanit

A family of good punctured polynomials is introduced. The complete characterization and enumeration of such polynomials are given over the binary fieldF2. Over a nonbinary finite fieldFq, the set of good punctured polynomials of degree less than or equal to2are completely determined. Forn≥3, constructive lower bounds of the number of good punctured polynomials of degreenoverFqare given.


2015 ◽  
Vol 7 (2) ◽  
pp. 18
Author(s):  
Ali H. Hakami

Let $m$ be a positive integer with $m < p/2$ and $p$ is a prime. Let $\mathbb{F}_q$ be the finite field in $q = p^f$ elements, $Q({\mathbf{x}})$ be a nonsinqular quadratic form over $\mathbb{F}_q$ with $q$ odd, $V$ be the set of points in $\mathbb{F}_q^n$ satisfying the equation $Q({\mathbf{x}}) = 0$ in which the variables are restricted to a box of points of the type\[\mathcal{B}(m) = \left\{ {{\mathbf{x}} \in \mathbb{F}_q^n \left| {x_i  = \sum\limits_{j = 1}^f {x_{ij} \xi _j } ,\;\left| {x_{ij} } \right| < m,\;1 \leqslant i \leqslant n,\;1 \leqslant j \leqslant f} \right.} \right\},\]where $\xi _1 , \ldots ,\xi _f$ is a basis for $\mathbb{F}_q$ over $\mathbb{F}_p$ and $n > 2$ even. Set $\Delta  = \det Q$ such that $\chi \left( {( - 1)^{n/2} \Delta } \right) = 1.$ We shall motivate work of (Cochrane, 1986) to obtain lower bounds on $m,$ size of the box $\mathcal{B},$ so that $\mathcal{B} \cap V$ is nonempty. For this we show that the box $\mathcal{B}(m)$ contains a zero of $Q({\mathbf{x}})$ provided that $m \geqslant p^{1/2}.$ We also show that the box $\mathcal{B}(m)$ contains $n$ linearly independent zeros of $Q({\mathbf{x}})$ provided that $m \geqslant 2^{n/2} p^{1/2} .$


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Gang Wang ◽  
Deng-Ming Xu ◽  
Fang-Wei Fu

<p style='text-indent:20px;'>Codebooks with small maximum cross-correlation amplitudes are used to distinguish the signals from different users in code division multiple access communication systems. In this paper, several classes of codebooks are introduced, whose maximum cross-correlation amplitudes asymptotically achieve the corresponding Welch bound and Levenshtein bound. Specially, a class of optimal codebooks with respect to the Levenshtein bound is obtained. These classes of codebooks are constructed by selecting certain rows deterministically from circulant matrices, Fourier matrices and Hadamard matrices, respectively. The construction methods and parameters of some codebooks provided in this paper are new.</p>


Sign in / Sign up

Export Citation Format

Share Document