Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis José María Amigó, Ljupco Kocarev, and Janusz Szczepanski

Size: px
Start display at page:

Download "Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis José María Amigó, Ljupco Kocarev, and Janusz Szczepanski"

Transcription

1 882 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 10, OCTOBER 2007 Discrete Lyapunov Exponent and Resistance to Dferential Cryptanalysis José María Amigó, Ljupco Kocarev, and Janusz Szczepanski Abstract In a recent paper, Jakimoski and Subbalakshmi provided a nice connection between the so-called discrete Lyapunov exponent of a permutation defined on a finite lattice and its maximal dferential probability, a parameter that measures the complexity of a dferential cryptanalysis attack on the substitution defined by. In this brief, we take a second look at their result to find some practical shortcomings. We also discuss more general aspects. Index Terms Dferential cryptanalysis, discrete Lyapunov exponent (DLE), maximum dferential probability (). I. INTRODUCTION SET endowed with addition modulo and let be a bijection (also called -permutation or -substitution). The discrete Lyapunov exponent (DLE) of is then defined as holds, where Substitutions on sets of integers are important in chaotic cryptography [4] among other potential applications. For this reason, we have scrutinized the constraints (1) in search of further insights. We have found the following. (i) The upper bound in (1) can be optimized for even to render with (2) (3) (4) where for and. was introduced in [1] and further developed in [2] as a main tool of discrete chaos a framework for counterparts of standard dynamical concepts in finite-state systems. In [3], Jakimoski and Subbalakshmi make an interesting connection between and the resistance of (viewed as a substitution of a hypothetical cipher with alphabet ) to dferential cryptanalysis. This resistance or immunity is measured by the maximum dferential probability () Note that (just take ). According to [3, Th. 1], the relation (1) Manuscript received March 2, 2007; revised April 11, This work was supported in part by the Spanish Ministry of Education and Science under Grant MTM2005/049048, and by the European FEDER Funds. The work of L. Kocarev was supported in part by the National Science Foundation. This paper was recommended by Associate Editor Z. Galias. J. M. Amigó is with the Centro de Investigación Operativa, Universidad Miguel Hernández, Elche, Spain ( jm.amigo@umh.es). L. Kocarev is with the Macedonian Academy of Sciences and Arts, 1000 Skopje, Macedonia, New York University Skopje, 1000 Skopje, Macedonia, and Institute for Nonlinear Science, University of Calornia, San Diego, La Jolla, CA USA ( lkocarev@ucsd.edu). J. Szczepanski is with the Institute for Fundamental Technological Research, Polish Academy of Sciences, PL Warsaw, Poland ( jszczepa@ippt.gov.pl). Digital Object Identier /TCSII We will show that the new upper bound,,is reached (hence, it cannot be lowered) and, moreover (5) for all, i.e.,. (ii) Furthermore, one restricts to the optimal value (meaning maximal immunity to dferential cryptanalysis in the context of encryption mappings on ), so as (3) becomes then analytical and numerical calculations show that the constraints (6) are fulfilled by virtually all permutations. We conclude that even the improved interval (6) is too wide to filter in practice the most resistant substitutions to dferential cryptanalysis, thus making necessary a sharper lower constrain for practical cryptographic applications. We also elaborate below (in Section IV) on some more general aspects related to this result. II. UPPER BOUND First of all, we will prove that the permutation, defined as (6) /$ IEEE

2 AMIGÓ et al.: DISCRETE LYAPUNOV EXPONENT AND RESISTANCE TO DIFFERENTIAL CRYPTANALYSIS 883 has the largest possible DLE among all permutations on, namely, From (9) we know that the right-hand side maximizes the second sum on (7) [see (4)]. To prove this claim (Theorem II.2 below), we need the following lemma. Lemma II.1: For any permutation on the set,wehave As for the first sum in (10), set (11) where. Proof: If, then. Suppose now. The sum contains the term once, the terms twice and the term thrice, with altogether an equal number of signs 1 and 1. It is therefore obvious that this sum reaches its maximum when the signs are allotted to the largest entries ( ) and the signs to the smallest entries ( ). Then (8) for, so that and (see, e.g., [5, Lemma 1.4.1]) (12) Now, in the case of permutations on with (hence, maximizing the second term (11) of (10)), it is impossible that (13) thereby maximizing also the first term (12) of (10). The best we can do is to approximate the optimal solution (13) unormly from above and from below. For we have For the permutation ( terms) with (9) i.e., the upper bound in (8) is reached by. Theorem II.2: If is a permutation on the linear set, then holds. In this sense, e may say that is the most chaotic map on (see [2] for the relation between the Lyapunov exponent of a continuous map on a one-dimensional interval and its discrete counterpart). Proof: Let be the permutation,. By definition while ( terms) with (10) So far we have seen that, although -permutations cannot fulfill the optimality condition (13), does comply asymptotically with it in a unorm and centered way. An exhaustive search confirms that for all -permutations with. For higher values of, Monte Carlo simulation was used with the same result (see also Figs. 1 and 2). This completes the proof.

3 884 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 10, OCTOBER 2007 TABLE I SOME VALUES OF (M) AND B asymptotically. From (14) and (15),we get Fig. 1. Normalized histograms of the DLE or permutations F on Z and M = 8, 10, 12. This figure was made using exhaustive sampling. (16) for large enough. Explicit calculation of and for low values of confirms that (16) holds true for all. Table I gives and for, (for, the approximations (14),, and (15),, are already closing in on the correct second decimal digit). Lemma II.3: The inequality (17) holds for all possible values of. Proof: Set,, and Fig. 2. Normalized histograms of the DLE for permutations F on Z and M =16, 32, 64, 128, 256. This figure was made using Monte Carlo sampling. where. Then Observe for further reference [see (7)] that (14) Maximal immunity to dferential cryptanalysis is achieved when takes its minimum value, namely, when. For simplicity, we assume henceforth along with Jakimoski and Subbalakshmi that is a multiple of 4 so that. The upper bound (2) becomes then and, for Stirling s formula yields (15)

4 AMIGÓ et al.: DISCRETE LYAPUNOV EXPONENT AND RESISTANCE TO DIFFERENTIAL CRYPTANALYSIS 885 In order to prove that this dference is positive, set so that TABLE II VALUES OF 3(2 ) FOR 3 n 8 The following are also true. (a). (b). (c). Hence, [case (b)] up to corrections is. Note that the length of this interval because the average of the positive numbers,, is strictly greater than the average of the positive numbers. Lastly, [case (c)] i.e., up to terms. Table II lists for some powers of 2. Figs. 1 and 2 show the probability density functions of permutations on for moderate values of and for higher values of, respectively. As said before, the number of permutations for were estimated by means of Monte Carlo sampling. Note that the curves in both figures become more peaked as increases. From Table II and Figs. 1, 2 it is plain that practically all permutations comply with (19) for. for the same reason as before. Equations (16) and (17) substantiate our claim (5) that the upper bound in (1) can be replaced by the upper bound in (3), independently of. III. INTERVAL LENGTH Furthermore, the logarithmic Stirling s formula can be used to simply the lower bound in (3) and, in particular, in (6) (i.e., when ): If, then (18) Plugging now (14) and (18) into (6), it follows that the DLE of an (from the point of view of dferential cryptanalysis) ideally strong encryption mapping lies in the interval (19) IV. FURTHER CONSIDERATIONS Equation (1) is an interesting relation between the DLE of a substitution on elements (or an S-box on,in cryptographic parlance),, and its resistance to dferential cryptanalysis, measured by. Apart from its theoretical appealing, this relation looks also promising with respect to practical applications because has less computational complexity than and, hence, one could in principle disregard weak substitutions, solely on the base of their DLEs. The scope of this paper was precisely to clary this point. As it turns out, the relation (1) (or (6) for that matter) cannot help discriminate weak from strong substitutions, an upshot being the convenience of further improving (1). In accordance with this apparently negative result, it seems likely that most randomly chosen -substitutions (as those whose DLEs are shown in Fig. 2) will have maximum dferential probabilities close to the optimal value,, thus qualying for cryptographic applications after all. Let us mention in passing that there are algebraic methods for designing S-boxes with optimal properties against the standard attacks (which include dferential and linear cryptanalysis). V. CONCLUSION First, we have sharpened the constraints (1) to the (3), by replacing the upper bound by, and, second, we have shown that not even the latter ones, particularized to the optimal (constraints (6)), are sharp enough to

5 886 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 10, OCTOBER 2007 filter in practice the most resistant substitutions to dferential cryptanalysis. Specically, we have shown that the length of the interval defined by (6) increases monotonically to with, while the corresponding distributions of DLEs become more peaked, being almost wholly contained in the interval (6) from on. Since the new upper bound,, is already optimal (in fact, it is reachable and independent of ), we are left with the task of optimizing the lower bound. ACKNOWLEDGMENT The authors are thankful to the referees for their valuable comments. REFERENCES [1] L. Kocarev and J. Szczepanski, Finite-space lyapunov exponents and pseudochaos, Phys. Rev. Lett., vol. 93, p , [2] L. Kocarev, J. Szczepanski, J. M. Amigó, and I. Tomovski, Discrete chaos Part I: Theory, IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 6, pp , Jun [3] G. Jakimoski and K. P. Subbalakshmi, Discrete lyapunov exponent and dferential cryptanalysis, IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 54, no. 6, pp , Jun [4] J. M. Amigó, L. Kocarev, and J. Szczepanski, Theory and practice of chaotic cryptography, Phys. Lett. A, vol. 366, pp , [5] R. Ash, Information Theory. New York: Dover, 1990.

Designing Self-Synchronizing Stream Ciphers with Flat Dynamical Systems

Designing Self-Synchronizing Stream Ciphers with Flat Dynamical Systems Designing Self-Synchronizing Stream Ciphers with Flat Dynamical Systems Gilles Millérioux, Philippe Guillot, Jose Maria Amigo, Jamal Daafouz To cite this version: Gilles Millérioux, Philippe Guillot, Jose

More information

IN THIS PAPER, we consider a class of continuous-time recurrent

IN THIS PAPER, we consider a class of continuous-time recurrent IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 51, NO. 4, APRIL 2004 161 Global Output Convergence of a Class of Continuous-Time Recurrent Neural Networks With Time-Varying Thresholds

More information

Minimal positive realizations of transfer functions with nonnegative multiple poles

Minimal positive realizations of transfer functions with nonnegative multiple poles 1 Minimal positive realizations of transfer functions with nonnegative multiple poles Béla Nagy Máté Matolcsi Béla Nagy is Professor at the Mathematics Department of Technical University, Budapest, e-mail:

More information

Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and Application to Secure Communication

Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and Application to Secure Communication 976 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 44, NO. 10, OCTOBER 1997 Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and

More information

Breaking an encryption scheme based on chaotic Baker map

Breaking an encryption scheme based on chaotic Baker map Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION

CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION International Journal of Bifurcation and Chaos, Vol. 20, No. 5 (2010) 1405 1413 c World Scientific Publishing Company DOI: 10.1142/S0218127410026563 CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION

More information

-Cryptosystem: A Chaos Based Public Key Cryptosystem

-Cryptosystem: A Chaos Based Public Key Cryptosystem International Journal of Cryptology Research 1(2): 149-163 (2009) -Cryptosystem: A Chaos Based Public Key Cryptosystem 1 M.R.K. Ariffin and 2 N.A. Abu 1 Al-Kindi Cryptography Research Laboratory, Laboratory

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 215 physics pp. 617 627 An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice RENFU

More information

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES Jovan Dj. Golić Security Innovation, Telecom Italia Via Reiss Romoli 274, 10148 Turin, Italy (Submitted August 2004-Final Revision April 200) ABSTRACT

More information

ONE of the main applications of wireless sensor networks

ONE of the main applications of wireless sensor networks 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main

More information

Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption

Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 2 (2015), pp. 55-68 Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption Dariusz Puchala Lodz University of Technology Institute

More information

NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE

NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE José María Amigó Centro de Investigación Operativa, Universidad Miguel Hernández, Elche (Spain) J.M. Amigó (CIO) Nonlinear time series analysis

More information

Cryptanalysis of a computer cryptography scheme based on a filter bank

Cryptanalysis of a computer cryptography scheme based on a filter bank NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

Maiorana-McFarland class: Degree optimization and algebraic properties

Maiorana-McFarland class: Degree optimization and algebraic properties Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,

More information

Implementation of the RSA algorithm and its cryptanalysis. Abstract. Introduction

Implementation of the RSA algorithm and its cryptanalysis. Abstract. Introduction Implementation of the RSA algorithm and its cryptanalysis Chandra M. Kota and Cherif Aissi 1 University of Louisiana at Lafayette, College of Engineering Lafayette, LA 70504, USA Abstract Session IVB4

More information

Potential Design for Electron Transmission in Semiconductor Devices

Potential Design for Electron Transmission in Semiconductor Devices IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 21, NO. 3, MAY 2013 869 Potential Design for Electron Transmission in Semiconductor Devices Jun Zhang, Senior Member, IEEE, Robert Kosut, Fellow, IEEE

More information

PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS

PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS Jörg Keller Hanno Wiese FernUniversität in Hagen LG Parallelität und VLSI 58084 Hagen, Germany joerg.keller@fernuni-hagen.de ABSTRACT Cryptographic

More information

Lyapunov Stability of Linear Predictor Feedback for Distributed Input Delays

Lyapunov Stability of Linear Predictor Feedback for Distributed Input Delays IEEE TRANSACTIONS ON AUTOMATIC CONTROL VOL. 56 NO. 3 MARCH 2011 655 Lyapunov Stability of Linear Predictor Feedback for Distributed Input Delays Nikolaos Bekiaris-Liberis Miroslav Krstic In this case system

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Resistance to Statistical Attacks of Parastrophic Quasigroup Transformation

Resistance to Statistical Attacks of Parastrophic Quasigroup Transformation Vol. 6, No. 9, 05 Resistance to Statistical Attacks of Parastrophic Quasigroup Transformation Verica Bakeva, Aleksandra Popovska-Mitrovikj and Vesna Dimitrova University Ss Cyril and Methodius - Skopje,

More information

IN this paper, we consider the capacity of sticky channels, a

IN this paper, we consider the capacity of sticky channels, a 72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion

More information

Multi-Map Orbit Hopping Chaotic Stream Cipher

Multi-Map Orbit Hopping Chaotic Stream Cipher Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum

More information

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt Katholieke Universiteit Leuven, Laboratorium

More information

A Fast Digital Chaotic Generator for Secure Communication

A Fast Digital Chaotic Generator for Secure Communication A Fast Digital Chaotic Generator for Secure Communication Shih-Liang Chen TingTing Hwang Shu-Ming Chang Wen-Wei Lin Abstract In this paper, we propose a digitalized chaotic map, Variational Logistic Map

More information

New Dynamical Key Dependent S-Box based on chaotic maps

New Dynamical Key Dependent S-Box based on chaotic maps IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. IV (July Aug. 2015), PP 91-101 www.iosrjournals.org New Dynamical Key Dependent S-Box based

More information

Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko

Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko IEEE SIGNAL PROCESSING LETTERS, VOL. 17, NO. 12, DECEMBER 2010 1005 Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko Abstract A new theorem shows that

More information

Stability of interval positive continuous-time linear systems

Stability of interval positive continuous-time linear systems BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 66, No. 1, 2018 DOI: 10.24425/119056 Stability of interval positive continuous-time linear systems T. KACZOREK Białystok University of

More information

Aitken and Neville Inverse Interpolation Methods over Finite Fields

Aitken and Neville Inverse Interpolation Methods over Finite Fields Appl. Num. Anal. Comp. Math. 2, No. 1, 100 107 (2005) / DOI 10.1002/anac.200410027 Aitken and Neville Inverse Interpolation Methods over Finite Fields E.C. Laskari 1,3, G.C. Meletiou 2,3, and M.N. Vrahatis

More information

On bounded redundancy of universal codes

On bounded redundancy of universal codes On bounded redundancy of universal codes Łukasz Dębowski Institute of omputer Science, Polish Academy of Sciences ul. Jana Kazimierza 5, 01-248 Warszawa, Poland Abstract onsider stationary ergodic measures

More information

AN ELECTRIC circuit containing a switch controlled by

AN ELECTRIC circuit containing a switch controlled by 878 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 46, NO. 7, JULY 1999 Bifurcation of Switched Nonlinear Dynamical Systems Takuji Kousaka, Member, IEEE, Tetsushi

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

Accelerated Search for Gaussian Generator Based on Triple Prime Integers

Accelerated Search for Gaussian Generator Based on Triple Prime Integers Journal of Computer Science 5 (9): 614-618, 2009 ISSN 1549-3636 2009 Science Publications Accelerated Search for Gaussian Generator Based on Triple Prime Integers 1 Boris S. Verkhovsky and 2 Md Shiblee

More information

Network Routing Capacity

Network Routing Capacity 1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 08 Shannon s Theory (Contd.)

More information

Further improving security of Vector Stream Cipher

Further improving security of Vector Stream Cipher NOLTA, IEICE Paper Further improving security of Vector Stream Cipher Atsushi Iwasaki 1a) and Ken Umeno 2 1 Fukuoka Institute of Technology Wajiro-higashi, Higashiku, Fukuoka 811-0295, Japan 2 Graduate

More information

Haar Spectrum of Bent Boolean Functions

Haar Spectrum of Bent Boolean Functions Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

Quantum algorithms for computing short discrete logarithms and factoring RSA integers

Quantum algorithms for computing short discrete logarithms and factoring RSA integers Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short

More information

Chaotic Based Secure Hash Algorithm

Chaotic Based Secure Hash Algorithm Chaotic Based Secure Hash Algorithm Mazen Tawfik Mohammed 1, Alaa Eldin Rohiem 2, Ali El-moghazy 3 and A. Z. Ghalwash 4 1,2 Military technical College, Cairo, Egypt 3 Higher Technological Institute, Cairo,

More information

On inverting the VMPC one-way function

On inverting the VMPC one-way function On inverting the VMPC one-way function KAMIL KULESZA Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge, UK Institute of Fundamental Technological Research, Polish

More information

Concurrent Error Detection in S-boxes 1

Concurrent Error Detection in S-boxes 1 International Journal of Computer Science & Applications Vol. 4, No. 1, pp. 27 32 2007 Technomathematics Research Foundation Concurrent Error Detection in S-boxes 1 Ewa Idzikowska, Krzysztof Bucholc Poznan

More information

arxiv: v1 [cs.cr] 5 Dec 2007

arxiv: v1 [cs.cr] 5 Dec 2007 Cryptanalysis of an image encryption scheme based on the Hill cipher Chengqing Li a,, Dan Zhang b, and Guanrong Chen a arxiv:07120693v1 [cscr] 5 Dec 2007 a Department of Electronic Engineering, City University

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Smart Hill Climbing Finds Better Boolean Functions

Smart Hill Climbing Finds Better Boolean Functions Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 9: Encryption using Chaos Contents Chaos and Cryptography Iteration

More information

Binary Convolutional Codes of High Rate Øyvind Ytrehus

Binary Convolutional Codes of High Rate Øyvind Ytrehus Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n

More information

ONE can design optical filters using different filter architectures.

ONE can design optical filters using different filter architectures. JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 28, NO. 23, DECEMBER 1, 2010 3463 Comparison of Cascade, Lattice, and Parallel Filter Architectures Rohit Patnaik, Vivek Vandrasi, Christi K. Madsen, Ali A. Eftekhar,

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

Comments and Corrections

Comments and Corrections 1386 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 59, NO 5, MAY 2014 Comments and Corrections Corrections to Stochastic Barbalat s Lemma and Its Applications Xin Yu and Zhaojing Wu Abstract The proof of

More information

Diagonal matrix solutions of a discrete-time Lyapunov inequality

Diagonal matrix solutions of a discrete-time Lyapunov inequality Diagonal matrix solutions of a discrete-time Lyapunov inequality Harald K. Wimmer Mathematisches Institut Universität Würzburg D-97074 Würzburg, Germany February 3, 1997 Abstract Diagonal solutions of

More information

Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE)

Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE) Symmetry 2015, 7, 1587-1594; doi:10.3390/sym7031587 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange

More information

Chaos and Cryptography

Chaos and Cryptography Chaos and Cryptography Vishaal Kapoor December 4, 2003 In his paper on chaos and cryptography, Baptista says It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property

More information

Type 1.x Generalized Feistel Structures

Type 1.x Generalized Feistel Structures Noname manuscript No. (will be inserted by the editor) Type 1.x Generalized eistel Structures Shingo Yanagihara Tetsu Iwata Received: date / Accepted: date Abstract We formalize the Type 1.x Generalized

More information

Synchronization and control in small networks of chaotic electronic circuits

Synchronization and control in small networks of chaotic electronic circuits Synchronization and control in small networks of chaotic electronic circuits A. Iglesias Dept. of Applied Mathematics and Computational Sciences, Universi~ of Cantabria, Spain Abstract In this paper, a

More information

THE problem of phase noise and its influence on oscillators

THE problem of phase noise and its influence on oscillators IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 5, MAY 2007 435 Phase Diffusion Coefficient for Oscillators Perturbed by Colored Noise Fergal O Doherty and James P. Gleeson Abstract

More information

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith Abstract Generating random numbers are mainly used to create secret keys or random

More information

Statistical and Linear Independence of Binary Random Variables

Statistical and Linear Independence of Binary Random Variables Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.

More information

New Chaotic Permutation Methods for Image Encryption

New Chaotic Permutation Methods for Image Encryption IAENG International Journal of Computer Science, 37:4, IJCS_37_4_ New Chaotic Permutation Methods for Image Encryption Abir Awad, Abdelhakim Saadane 2 Abstract Since two decades, and in order to reach

More information

MODULAR ARITHMETIC KEITH CONRAD

MODULAR ARITHMETIC KEITH CONRAD MODULAR ARITHMETIC KEITH CONRAD. Introduction We will define the notion of congruent integers (with respect to a modulus) and develop some basic ideas of modular arithmetic. Applications of modular arithmetic

More information

Towards Provable Security of Substitution-Permutation Encryption Networks

Towards Provable Security of Substitution-Permutation Encryption Networks Towards Provable Security of Substitution-Permutation Encryption Networks Zhi-Guo Chen and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University at Kingston, Ontario,

More information

Stability Analysis and Synthesis for Scalar Linear Systems With a Quantized Feedback

Stability Analysis and Synthesis for Scalar Linear Systems With a Quantized Feedback IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 48, NO 9, SEPTEMBER 2003 1569 Stability Analysis and Synthesis for Scalar Linear Systems With a Quantized Feedback Fabio Fagnani and Sandro Zampieri Abstract

More information

DATA receivers for digital transmission and storage systems

DATA receivers for digital transmission and storage systems IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 52, NO. 10, OCTOBER 2005 621 Effect of Loop Delay on Phase Margin of First-Order Second-Order Control Loops Jan W. M. Bergmans, Senior

More information

Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module 2 w

Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module 2 w JOURNAL OF L A TEX CLASS FILES, VOL. 13, NO. 9, SEPTEMBER 014 1 Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module w Atsushi Iwasaki,

More information

On the second smallest prime non-residue

On the second smallest prime non-residue On the second smallest prime non-residue Kevin J. McGown 1 Department of Mathematics, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093 Abstract Let χ be a non-principal Dirichlet

More information

FOR linear time-invariant systems with outputs, there are

FOR linear time-invariant systems with outputs, there are 154 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 2, FEBRUARY 2005 Nonlinear Norm-Observability Notions Stability of Switched Systems João P. Hespanha, Senior Member, IEEE, Daniel Liberzon, Senior

More information

4.1 Exponential Functions

4.1 Exponential Functions Graduate T.A. Department of Mathematics Dynamical Systems and Chaos San Diego State University April 9, 211 Definitions The functions that involve some combinations of basic arithmetic operations, powers,

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Evaluation of the Maximum Productivity for Block Encryption Algorithms

Evaluation of the Maximum Productivity for Block Encryption Algorithms Evaluation of the Maximum Productivity for Block Encryption Algorithms Authors: V.M. Fomichev, A.M. Koreneva, D.I. Zadorozhniy, A.R. Miftahutdinova CTCrypt 2018 / Suzdal Introduction Block ciphers are

More information

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Peter Schwabe October 21 and 28, 2011 So far we assumed that Alice and Bob both have some key, which nobody else has. How

More information

1 Cryptographic hash functions

1 Cryptographic hash functions CSCI 5440: Cryptography Lecture 6 The Chinese University of Hong Kong 23 February 2011 1 Cryptographic hash functions Last time we saw a construction of message authentication codes (MACs) for fixed-length

More information

arxiv: v3 [cs.cr] 15 Jun 2017

arxiv: v3 [cs.cr] 15 Jun 2017 Use of Signed Permutations in Cryptography arxiv:1612.05605v3 [cs.cr] 15 Jun 2017 Iharantsoa Vero RAHARINIRINA ihvero@yahoo.fr Department of Mathematics and computer science, Faculty of Sciences, BP 906

More information

The ϵ-capacity of a gain matrix and tolerable disturbances: Discrete-time perturbed linear systems

The ϵ-capacity of a gain matrix and tolerable disturbances: Discrete-time perturbed linear systems IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 11, Issue 3 Ver. IV (May - Jun. 2015), PP 52-62 www.iosrjournals.org The ϵ-capacity of a gain matrix and tolerable disturbances:

More information

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 24 CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 3.1 INTRODUCTION Pseudo Random Number Generators (PRNGs) are widely used in many applications, such as numerical analysis, probabilistic

More information

arxiv:nlin/ v1 [nlin.cd] 10 Aug 2006

arxiv:nlin/ v1 [nlin.cd] 10 Aug 2006 Cryptanalysis of a chaotic block cipher with external key and its improved version arxiv:nlin/0608020v1 [nlin.cd] 10 Aug 2006 Chengqing Li a,, Shujun Li b,, Gonzalo Álvarezc, Guanrong Chen a and Kwok-Tung

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

A Byte-Based Guess and Determine Attack on SOSEMANUK

A Byte-Based Guess and Determine Attack on SOSEMANUK A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy

More information

1 Cryptographic hash functions

1 Cryptographic hash functions CSCI 5440: Cryptography Lecture 6 The Chinese University of Hong Kong 24 October 2012 1 Cryptographic hash functions Last time we saw a construction of message authentication codes (MACs) for fixed-length

More information

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Pino Caballero-Gil Faculty of Mathematics. University of La Laguna 38271. La Laguna, Tenerife, Spain. pcaballe@ull.es

More information

arxiv:cs/ v1 [cs.cr] 2 Feb 2004

arxiv:cs/ v1 [cs.cr] 2 Feb 2004 Problems of Baptista s chaotic cryptosystems and countermeasures for enhancement of their overall performances arxiv:cs/0402004v1 [cs.cr] 2 Feb 2004 Shujun Li, Guanrong Chen Department of Electronic Engineering,

More information

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,

More information

Constructing Explicit RIP Matrices and the Square-Root Bottleneck

Constructing Explicit RIP Matrices and the Square-Root Bottleneck Constructing Explicit RIP Matrices and the Square-Root Bottleneck Ryan Cinoman July 18, 2018 Ryan Cinoman Constructing Explicit RIP Matrices July 18, 2018 1 / 36 Outline 1 Introduction 2 Restricted Isometry

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

Stabilizing and Destabilizing Control for a Piecewise-Linear Circuit

Stabilizing and Destabilizing Control for a Piecewise-Linear Circuit 172 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 45, NO. 2, FEBRUARY 1998 Stabilizing and Destabilizing Control for a Piecewise-Linear Circuit Tadashi Tsubone

More information

Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems

Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems Amit Pande and Joseph Zambreno Department of Electrical and Computer Engineering Iowa State University,

More information

SIMPLE CONDITIONS FOR PRACTICAL STABILITY OF POSITIVE FRACTIONAL DISCRETE TIME LINEAR SYSTEMS

SIMPLE CONDITIONS FOR PRACTICAL STABILITY OF POSITIVE FRACTIONAL DISCRETE TIME LINEAR SYSTEMS Int. J. Appl. Math. Comput. Sci., 2009, Vol. 19, No. 2, 263 269 DOI: 10.2478/v10006-009-0022-6 SIMPLE CONDITIONS FOR PRACTICAL STABILITY OF POSITIVE FRACTIONAL DISCRETE TIME LINEAR SYSTEMS MIKOŁAJ BUSŁOWICZ,

More information

A Chaotic Encryption System Using PCA Neural Networks

A Chaotic Encryption System Using PCA Neural Networks A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science

More information

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member, IEEE, and

More information

A Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases

A Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases 2558 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 48, NO 9, SEPTEMBER 2002 A Generalized Uncertainty Principle Sparse Representation in Pairs of Bases Michael Elad Alfred M Bruckstein Abstract An elementary

More information

Nonlinear Discrete-Time Observer Design with Linearizable Error Dynamics

Nonlinear Discrete-Time Observer Design with Linearizable Error Dynamics 622 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 4, APRIL 2003 Nonlinear Discrete-Time Observer Design with Linearizable Error Dynamics MingQing Xiao, Nikolaos Kazantzis, Costas Kravaris, Arthur

More information

A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION

A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION Claudia Peerez Ruisanchez Universidad Autonoma del Estado de Morelos ABSTRACT In this paper is proposed a new algorithm to construct S-Boxes over

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

Cryptanalysis of a Multistage Encryption System

Cryptanalysis of a Multistage Encryption System Cryptanalysis of a Multistage Encryption System Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Software Engineering

More information

CONTROLLABILITY AND OBSERVABILITY OF 2-D SYSTEMS. Klamka J. Institute of Automatic Control, Technical University, Gliwice, Poland

CONTROLLABILITY AND OBSERVABILITY OF 2-D SYSTEMS. Klamka J. Institute of Automatic Control, Technical University, Gliwice, Poland CONTROLLABILITY AND OBSERVABILITY OF 2D SYSTEMS Institute of Automatic Control, Technical University, Gliwice, Poland Keywords: Controllability, observability, linear systems, discrete systems. Contents.

More information

A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System Commun. Theor. Phys. (Beijing China) 44 (2005) pp. 1115 1124 c International Academic Publishers Vol. 44 No. 6 December 15 2005 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized

More information

Exercise Sheet Cryptography 1, 2011

Exercise Sheet Cryptography 1, 2011 Cryptography 1 http://www.cs.ut.ee/~unruh/crypto1-11/ Exercise Sheet Cryptography 1, 2011 Exercise 1 DES The Data Encryption Standard (DES) is a very famous and widely used block cipher. It maps 64-bit

More information