Skip to main content
Log in

Unicyclic strong permutations

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

In this paper, we study some properties of a certain kind of permutation σ over \(\mathbb {F}_{2}^{n}\), where n is a positive integer. The desired properties for σ are: (1) the algebraic degree of each component function is n − 1; (2) the permutation is unicyclic; (3) the number of terms of the algebraic normal form of each component is at least 2n− 1. We call permutations that satisfy these three properties simultaneously unicyclic strong permutations. We prove that our permutations σ always have high algebraic degree and that the average number of terms of each component function tends to 2n− 1. We also give a condition on the cycle structure of σ. We observe empirically that for n even, our construction does not provide unicylic permutations. For n odd, n ≤ 11, we conduct an exhaustive search of all σ given our construction for specific examples of unicylic strong permutations. We also present some empirical results on the difference tables and linear approximation tables of σ.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bacher, A., Bodini, O., Hwang, H.-K., Tsai, T.-H.: Generating random permutations by coin tossing: Classical algorithms, new analysis, and modern implementation. ACM Trans. Algor. 13(2), 1–43 (2017)

    Article  MathSciNet  Google Scholar 

  2. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)

    Article  MathSciNet  Google Scholar 

  3. Brassard, G., Kannan, S.: The generation of random permutations on the fly. Inf. Process. Lett., 28(4) (1988)

    Article  MathSciNet  Google Scholar 

  4. Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. monography’s chapter, pp 257–397. Cambridge University Press (2010)

  5. Carlet, C.: Vectorial boolean functions for cryptography. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. monography’s chapter, pp 398–469. Cambridge University Press (2010)

  6. Daemen, J., Vincent, R.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media (2013)

  7. Flajolet, P., Odlyzko, A.M.: Random mapping statistics. In: Quisquater, J.-J., Vandewalle, J. (eds.) Advances in Cryptology — EUROCRYPT ’89, vol. 434, pp 329–354. LNCS (1990)

  8. Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 1st edn. Cambridge University Press (2009)

  9. Hansen, T., Mullen, G.L.: Primitive polynomials over finite fields. Math. Comput. 59(200), 639–643 (1992)

    Article  MathSciNet  Google Scholar 

  10. Xiao, G.-Z., Massey, L., James: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 34(3), 569–571 (1988)

    Article  MathSciNet  Google Scholar 

  11. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp 386–397. Springer (1993)

  12. Mullen, G.L., Panario, D: Handbook of Finite Fields. Chapman & Hall/CRC (2013)

  13. Nyberg, K.: Statistical and linear independence of binary random variables. Cryptology ePrint Archive Report 2017/432 (2017)

  14. Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Info. Th. 30, 776–780 (1984)

    Article  MathSciNet  Google Scholar 

  15. Szpankowski, W.: Average Case Analysis of Algorithms on Sequences. Wiley (2001)

  16. Wan, D.: Generators and irreducible polynomials over finite fields. Math. Comput. 66(219), 1195–1212 (1997)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

The authors are grateful for the very careful reviews and the constructive suggestions received from the referees.

Author information

Authors and Affiliations

Authors

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Special Issue on Boolean Functions and Their Applications

Appendices

Appendix A: Empirical evidence for Assumption 1

In Tables 8910, and 11, the column entitled i refers to the coefficients of Xi of an irreducible polynomial of degree d. The column entitled “Ratios” gives the ratios of the number of irreducible polynomials of degree d with a Xi term.

Table 8 Average proportions by terms of irreducible polynomials
Table 9 Average proportions by terms of irreducible polynomials (continued)
Table 10 Average proportions by terms of irreducible polynomials (continued)
Table 11 Average proportions by terms of irreducible polynomials (continued)

In order to make this article concise, we jump from degree 13 to 26 up to 29 inclusively.

Appendix B: Differentials and correlations

Example 1 gives two unicyclic permutations that are APN except for a fixed set of 215 pairs giving differentials of size 215.

Example 1

The following two examples give unicyclic permutations σ that are APN aside from 215 (c, d) pairs each giving 215 solutions to σ(Xc) ⊕ σ(X) = d. A summary of both difference tables is given in Table 12. We present these examples for interest and further study, but we make no claims on their suitability for cryptography.

Table 12 Summary of the difference tables of two unicyclic strong permutations from (7) and (8)
$$ \begin{array}{@{}rcl@{}} Q_{1}(X) & =& 1 + X + X^{7} + X^{10} + X^{15} \end{array} $$
(7)
$$ \begin{array}{@{}rcl@{}} P_{1,b}(X) & =& 1 + X^{3} + X^{5} + X^{7} + X^{11} + X^{12} + X^{13} \\ Q_{2}(X) &= &1 + X^{2} + X^{3} + X^{7} + X^{8} + X^{12} + X^{13} + X^{14} + X^{15} \\ P_{2,b}(X) &=& X^{2} + X^{5} + X^{6} + X^{7} + X^{8} + X^{11} + X^{12} + X^{14} \end{array} $$
(8)

Example 2

Let n = 17 and let Q and Pb be as follows,

$$ \begin{array}{@{}rcl@{}} Q(X) &=& 1 + X + X^{4} + X^{8} + X^{11} + X^{12} + X^{13} + X^{14} + X^{15} + X^{16} + X^{17}, \\ P_{b}(X) &=& 1 + X^{16}. \end{array} $$

The difference table for σ defined with Q and Pb is

Table 13

Example 3

Let n = 19 and let Q and Pb be as follows,

$$ \begin{array}{@{}rcl@{}} Q(X) &=& 1 + X^{5} + X^{7} + X^{8} + X^{9} + X^{11} + X^{13} + X^{16} + X^{17} + X^{18} + X^{19},\\ P_{b}(X) &=& 1 + X^{18}. \end{array} $$

The difference table for σ defined with Q and Pb is

Differentials

Counts

0

137444193323

2

137428735987

4

4977558

6

75

524288

1

Example 4 gives a comparison of a particular unicyclic permutation with a uniformly randomly sampled permutation.

Example 4

Let n = 15 and let Q and Pb be as follows,

$$ \begin{array}{@{}rcl@{}} Q(X) &=& 1 + X^{3} + X^{4} + X^{5} + X^{7} + X^{14} + X^{15}, \\ P_{b}(X) &=& 1 + X^{14}. \end{array} $$

The linear approximation table for σ defined with Q and Pb is

Table 15

Comparing with a uniform random permutation, we obtain

Table 16

Appendix C: An example with intermediate round computations

For 1 ≤ in, let

$$ \begin{array}{@{}rcl@{}} P_{a^{(i)}}(X)&=&\left( P_{a^{(i-1)}}(X)+P_{b}(X)\right)^{-2^{i-1}}. \end{array} $$

In Table 13, we give the sequence a = a(0)a(1) →⋯ → a(n); columns entitled a(i) contain the output of the partial computations a(i) = σi− 1σi− 2σ0. In each column, we give an underlined boldfaced entry that signifies a cycle that is not of maximal length up to the given column/round. For instance, after two rounds, we have a fixed point since σ1σ0(59) = 59, and after four rounds we have a cycle of length three since σ3σ2σ1σ0(0) = 23, σ3σ2σ1σ0(23) = 35, and σ3σ2σ1σ0(35) = 0.

Table 13 Intermediate round computations for Pb(X) = 1 + X5 and Q(X) = 1 + X + X4 + X5 + X6

As expected, since the degree is even (n = 6), the resulting composition is not unicyclic although the initial round corresponding to σ0 is unicyclic.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gravel, C., Panario, D. & Thomson, D. Unicyclic strong permutations. Cryptogr. Commun. 11, 1211–1231 (2019). https://doi.org/10.1007/s12095-019-00384-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-019-00384-4

Keywords

Mathematics Subject Classification (2010)

Navigation