Skip to main content

Hadamard Modulo Prime Matrices and Their Application in Cryptography: A Survey of Some Recent Works

  • Conference paper
  • First Online:
Proceedings of International Ethical Hacking Conference 2018

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 811))

  • 874 Accesses

Abstract

The notion of Hadamard modulo prime (HMP) matrix inherits in basics that of classical real Hadamard matrix. Namely, by definition, HMP modulo odd prime p matrix \(\mathbf{H}\) of size n, is a \(n\times n\) non-singular over \({\mathbb {Z}}_{p}\) matrix of \(\pm 1\)’s satisfying the equality: \(\mathbf{H}{} \mathbf{H}^{T} = n{(mod p)}\) \(\mathbf{I}\) where \(\mathbf{I}\) is the identity matrix of same size. The HMP matrices have an attractive application in the modern cryptography due to the fact of their efficient employment in constructing of some all-or-nothing transform schemes. The present paper surveys some recent results on this kind of matrices by revealing their connections with coding theory, combinatorics, and elementary number theory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Marrero, O., Butson, A.T.: Modular Hadamard matrices and related designs. J. Comb. Theory A 15, 257–269 (1973)

    Article  MathSciNet  Google Scholar 

  2. Lee, M.H.: A new reverse jacket transform and its fast algorithm. IEEE Trans. Circuits Syst. II 47(6), 39–47 (2000)

    Article  Google Scholar 

  3. Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) Fast Software Encryption. Lecture Notes Computer Science, vol. 1267, pp. 210–218 (1997)

    Chapter  Google Scholar 

  4. Stinson, D.R.: Something about all or nothing (transforms). Des. Codes Cryptogr. 22, 133–138 (2001)

    Article  MathSciNet  Google Scholar 

  5. Lee, M.H., Borissov, Y.L., Dodunekov, S.M.: Class of jacket matrices over finite characteristic fields. Electron. Lett. 46(13), 916–918 (2010)

    Article  Google Scholar 

  6. Lee, M.H., Szollosi, F.: Hadamard matrices modulo 5. J. Comb. Des. 171–178 (2013)

    Article  MathSciNet  Google Scholar 

  7. Borissov, Y.L.: Some new results on Hadamard modulo prime matrices. Probl. Inf. Transm. 52(2), 134–141 (2016)

    Article  MathSciNet  Google Scholar 

  8. D’Arco, P., Nasr Esfahani, N., Stinson, D.R.: All or nothing at all. Electron. J. Comb. 23(4), paper # P4.10, 24 pp (2016)

    Google Scholar 

  9. Nasr Esfahani, N., Goldberg, I., Stinson, D.R.: Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets. IACR Cryptol. ePrint Archive 177 (2017)

    Google Scholar 

  10. Hall, M.: Combinatorial Theory. Blaisdell Publishing Company (1967)

    Google Scholar 

  11. Cusick, T.W., Ding, C., Revall, A.: Stream Ciphers and Number Theory. Elsevier, Amsterdam, The Netherlands (2004)

    MATH  Google Scholar 

  12. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. North-Holland Publishing Company (1977)

    Google Scholar 

  13. Tonchev, V.D.: Combinatorial Configurations: Designs, Codes, Graphs. Longman Scientific & Technical (1988)

    Google Scholar 

  14. Zinoviev, V.A.: On the equivalence of certain constant weight codes and combinatorial designs. J. Stat. Plan. Inference 56(2), 289–294 (1996)

    Article  MathSciNet  Google Scholar 

  15. van Tilborg, H.C.A.: Fundamentals of Cryptology, a Professional Reference and Interactive Tutorial. Kluwer Academic Publishers, Boston, Dordrecht, London (2000)

    MATH  Google Scholar 

  16. Vinogradov, I.M.: Elements of Number Theory (translated from the fifth revised edition by Saul Kravetz), 227 pp. Dover Publications Inc., Mineola, N.Y. (1954)

    Google Scholar 

  17. Hardy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers, 6th edn. Clarendon Press, Oxford, England (2008)

    MATH  Google Scholar 

Download references

Acknowledgements

The author is grateful to Prof. Moon Ho Lee for his helpful discussions on this topic and hospitality of the Department of Electrical and Electronics Engineering of Chonbuk National University, Republic of Korea, where most of this research was done during the years 2010–2012.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuri L. Borissov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Borissov, Y.L. (2019). Hadamard Modulo Prime Matrices and Their Application in Cryptography: A Survey of Some Recent Works. In: Chakraborty, M., Chakrabarti, S., Balas, V., Mandal, J. (eds) Proceedings of International Ethical Hacking Conference 2018. Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore. https://doi.org/10.1007/978-981-13-1544-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1544-2_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1543-5

  • Online ISBN: 978-981-13-1544-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics