Pseudorandom Sequences I: Linear Complexity and Related Measures

Size: px
Start display at page:

Download "Pseudorandom Sequences I: Linear Complexity and Related Measures"

Transcription

1 Pseudorandom Sequences I: Linear Complexity and Related Measures Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University 2010 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

2 Why pseudorandom and not truly random sequences? A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

3 Pseudorandom Sequences Sequences which are generated by a deterministic algorithm and look random are called pseudorandom. Desirable randomness properties depend on the application! cryptography: unpredictability numerical integration (quasi-monte Carlo): uniform distribution radar: distinction from reflected signal gambling: a good lawyer A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

4 Linear Complexity The linear complexity L(s n ) of a periodic sequence (s n ) over a field F is the smallest positive integer L such that there are constants c 0,..., c L 1 F with s n+l = c L 1 s n+l c 0 s n, n 0. For a positive integer N the Nth linear complexity L(s n, N) of a sequence (s n ) over F is the smallest positive integer L such that there are constants c 0,..., c L 1 F satisfying 0 n N L 1. s n+l = c L 1 s n+l c 0 s n, A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

5 Cryptographic Background A low Nth linear complexity has turned out to be undesirable for cryptographical applications as stream ciphers. Example (Stream Cipher) We consider a message m 0, m 1,... represented as a sequence over F. In a stream cipher each message symbol m j is enciphered with an element x j of another sequence x 0, x 1,... over F, the key stream, by c j = m j + x j. The cipher text c 0, c 1,... can be deciphered by subtracting the key stream m j = c j x j. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

6 Relation to Quasi-Monte Carlo Methods Sequences with low linear complexity are shown to be unsuitable for some applications using quasi-monte Carlo methods as well. The following example describes a typical quasi-monte Carlo application. Example (Quasi-Monte-Carlo Calculation of π) 1 Choose N pairs of a sequence (x n ) in [0, 1) (x n, x n+1 ) [0, 1) 2, n = 0,..., N 1. 2 Count the number K of pairs (x n, x n+1 ) in the unit circle. 3 Approximate π by 4K N. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

7 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

8 Marsaglia s Lattice test, 1972 (η n ) T-periodic sequence over F p For s 1 we say that (η n ) passes the s-dimensional lattice test if the vectors {u n u 0 : 1 n < T } span F s p, where u n = (η n, η n+1,..., η n+s 1 ), 0 n < T. S(η n ) = max { s : u n u 0, 1 n < T = F s p } A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

9 s = 2: A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

10 s = 3: A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

11 Niederreiter/W., 2002: L(η n ) = S(η n ) or = S(η n ) + 1 Dorfer/W., 2003: Lattice test for parts of the period, S(η n, N) We have either S(η n, N) = min(l(η n, N), N + 1 L(η n, N)) or S(η n, N) = min(l(η n, N), N + 1 L(η n, N)) 1. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

12 Relation to Information and Coding Theory The Kolmogorov complexity of a sequence over F is the length of a shortest Turing machine that generates it. Beth/Dai, 1989: F = F 2 : Linear complexity and Kolmogorov complexity are the same for almost all binary sequences. In general there is no algorithm for calculating the Kolmogorov complexity. In contrast we have the Berlekamp-Massey Algorithm for calculating the linear complexity. This algorithm stems from coding theory. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

13 A Consequence of the Berlekamp-Massey Algorithm Theorem If L(s n, N) > N/2, then we have L(s n, N + 1) = L(s n, N). If L(s n, N) N/2, then we have either L(s n, N + 1) = L(s n, N) or L(s n, N + 1) = N + 1 L(s n, N). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

14 The Expected Value F = F q Theorem The expected value for L(s n, N) is { N 2 + q (q+1) 2 q N N(q+1)+q (q+1) 2 for even N, N + q2 +1 q N N(q+1)+q for odd N. 2 2(q+1) 2 (q+1) 2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

15 Lower Bounds In case of a p-periodic sequence (ξ n ) over F p, where p is a prime, linear complexity is related to the degree of the polynomial g(x ) F p [X ] representing the sequence (ξ n ), i.e., g(x ) is the unique polynomial which satisfies deg g p 1 and ξ n = g(n), 0 n p 1. These sequences are called explicit nonlinear congruential generators and we have L(ξ n ) = deg g + 1. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

16 High linear complexity but low Nth linear complexity Example: ξ n = 1 (n + 1) p 1, 0 n p 1 (ξ 0, ξ 1,..., ξ p 2, ξ p 1 ) = (0, 0,..., 0, 1) L(ξ n ) = p highly predictable L(ξ n, N) = 0, 1 N p 1 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

17 The explicit inversive congruential generator (z n ) is produced by the relation z n = (an + b) p 2, n = 0,..., p 1, z n+p = z n, n 0, with a, b F p, a 0, and p 5. We have (N 1)/3, 1 N (3p 7)/2, L(z n, N) N p + 2, (3p 5)/2 N 2p 3, p 1, N 2p 2. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

18 c L = 1, N p L c l z n+l = 0, 0 n N L 1 l=0 a(n + l) + b 0, 0 l L: L c l (a(n + l) + b) 1 = 0 l=0 F (X ) = L l=0 c l L (a(x + j) + b) j=0 j L has at least N L (L + 1) zeros and degree at most L. L 1 F ( a 1 b L) = c L (a(j L)) 0 j=0 N 2L 1 L and thus L (N 1)/3 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

19 z n = (an + b) p 2 is still highly predictable since inversion is cheap and a = z 1 n+1 z n 1 for all but two n. Open problem: Define a modified linear complexity with inversions and analyze it. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

20 Let p > 2 be a prime. The Legendre-sequence (l n ) is defined by { ( ) n 1, = 1, l n = p n 0, 0, otherwise, ( where. p Theorem ) is the Legendre-symbol. The linear complexity of the Legendre sequence is (p 1)/2, p 1 mod 8, p, p 3 mod 8, L(l n ) = p 1, p 5 mod 8, (p + 1)/2, p 7 mod 8. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

21 Theorem The Nth linear complexity of the Legendre sequence satisfies L(l n, N) > min{n, p} 1, N p 1/2 (1 + log p) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

22 Weil: Let f (X ) F p [X ] a (monic) polynomial which is not a square and a F p then we have ( ) af (x) p (deg(f ) 1)p1/2. x F p L c k l n+k = 0 F 2, 0 n N L 1, (c L = 1) k=0 ( ) n ( 1) ln =, n 0, p ( L ) ( 1) P L k=0 c kl n+k l=0 = (n + l)c l = 1 p for at least min{n, p} (L + 1) different n A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

23 Summing over n: ( N 1 L ) l=0 min{n, p} (L + 1) (n + l)c l p n=0 < (L + 1)p 1/2 (1 + log p) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

24 Relation to Wireless Communication The correlation measure of order k of a binary sequence (s n ) is introduced as M C k (s n ) = max ( 1) s n+d 1 ( 1) s n+dk, k 1, M,D n=1 where the maximum is taken over all D = (d 1, d 2,..., d k ) with non-negative integers d 1 < d 2 < < d k and M such that M 1 + d k T 1. L(s n, N) N max C k(s n ), 2 N t 1. 1 k L(s n,n)+1 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

25 Examples. a) b n = 0, 0 n t 2, b t 1 = 1 L(b n ) = t, one change L(b n) = 0 b) c n+4 = c n, n 0, with c 0 = c 1 = c 2 = 1, c 3 = 0 over F 2 : L(c n ) = 4 over F 3 : L(c n ) = 3 since c n+3 = 2c n+2 + 2c n+1 + 2c n, n 0 Desirable: 1. high linear complexity even if we change a few elements 2. high linear complexity over different fields A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

26 Let (s n ) be a sequence over F, with period t. The k-error linear complexity L k (s n ) of (s n ) is defined as L k (s n ) = min (y n) L(y n), where the minimum is taken over all t-periodic sequences (y n ) over F, for which the Hamming distance of the vectors (s 0, s 1,..., s t 1 ) and (y 0, y 1,..., y t 1 ) is at most k. Theorem Let L k (l n ) denote the k-error linear complexity over F p of the Legendre sequence (l n ). Then, L k (l n ) = p, k = 0, (p + 1)/2, 1 k (p 3)/2, 0, k (p 1)/2. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

27 l n = 2 1 (n p 1 n (p 1)/2 ) F p, n 0 l n = 2 1 (1 n (p 1)/2 ) =: h(n), n 0 l n = f (n) implies L(l n ) = deg(f ) + 1 Let (y n ) be obtained from (l n ) by at most k changes. Case I: (y n ) = (l n ): L(y n ) = p Case II: (y n ) = h(n): L(y n ) = (p + 1)/2 Case III: y n = g(n), g(x ) h(x ) deg(g h) p k 1 (p + 1)/2 if k (p 3)/2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

28 Shparlinski/W.,2006: linear complexity over F k, k prime: L(l n ) 1 { } 2 log k min p 1, 2k 1. p 1/2 log p + 2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

29 Open Problem Find more sequences with high (Nth, k-error) linear complexity. For example, study recursive sequences. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

30 Linear Pseudorandom Number Generators F q finite field of q elements, a, b, x 0 F q, a 0 x n+1 = ax n + b, n 0 q = p prime, F p = {0, 1,..., p 1}: y n = x n /p [0, 1), n 0 Nice features: long period can be easily obtained uniform distribution in dimension 1 flaws: predictable (L(x n ) 2) coarse structure A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

31 Nonlinear Pseudorandom Numbers f F q [X ], 2 deg(f ) q 1, x 0 F q x n+1 = f (x n ), n 0 (purely) periodic with period t q q = p prime: y n = x n /p [0, 1) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

32 Lower Bound on the Linear Complexity Profile Gutierrez/Shparlinski/W., 2003: The linear complexity profile of a nonlinear sequence (x n ) defined by x n+1 = f (x n ), n = 0, 1,..., with a polynomial f F q [X ] of degree d 2, purely periodic with period t, satisfies L(x n, N) min { log d (N log d N ), log d t }. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

33 Proof. F 0 (X ) := X, F i (X ) := F i 1 (f (X )), i 1 deg(f i ) = d i, x n+j = F j (x n ) x n+l = a L 1 x n+l a 0 x n, 0 n N L 1 F (X ) := F L (X ) + a L 1 F L 1 (X ) a 0 F 0 (X ) has degree d L and at least min {N L, t} zeros, namely, x n with 0 n min{n L 1, t 1}. d L min {N L, t} A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

34 Inversive Generators a, b, y 0 F q, a 0 { ay y n+1 = ayn q 2 1 n + b, y + b = n 0, b, y n = 0. Gutierrez/Shparlinski/W., 2003: { } N 1 t 1 L(y n, N) min, 3 2 Reason for better result: f (X ) = bx +a X, F j(x ) = a j X +b j c j X +d A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

35 Dickson and Power Generator The Dickson polynomial D e (X, a) F q [X ] is defined by the following recurrence relation D e (X, a) = XD e 1 (X, a) ad e 2 (X, a), e = 2, 3,..., with initial values D 0 (X, a) = 2, D 1 (X, a) = X, where a F q. Obviously, the degree of D e is e. Moreover, if a {0, 1} then we have D e (D f (X, a), a) = D ef (X, a). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

36 a = 0: D e (X, 0) = X e, e 2 p n+1 = p e n, n 0 power generator Griffin/Shparlinski, 2000: (q = p prime) { } N 2 L(p n, N) min 4(p 1), t 2, N 1. p 1 Reason for better result: F k (X ) = X ek mod p 1 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

37 a = 1: D e (x + x 1, 1) = x e + x e, x F q 2 u n+1 = D e (u n, 1), n 0, with some initial value u 0 and e 2. Dickson generator Aly/W., 2006: L(u n, N) min{n 2, 4t 2 } 16(p + 1) (p + 1) 1/2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

38 Redéi generator Suppose that r(x ) = X 2 αx β F p [X ] is an irreducible quadratic polynomial with the two different roots ξ and ζ = ξ p in F p 2. Then any polynomial b(x ) F p 2[X ] can uniquely be written in the form b(x ) = g(x ) + h(x )ξ with g(x ), h(x ) F p [X ]. We consider the elements (X + ξ) e = g e (X ) + h e (X )ξ. e is the degree of the polynomial g e (X ), and h e (X ) has degree at most e 1. The Rédei function f e (X ) of degree e is then given by f e (X ) = g e(x ) h e (X ). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

39 u n+1 = f e (u n ), n 0, with a Rédei permutation f e (X ) and some initial element u 0 F p. Meidl/W., 2007: L(u n, N) min{n 2, 4t 2 }, N 2. 20(p + 1) 3/2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

40 p-weight Degree n nonnegative integer p-weight of n: σ p ( l i=0 n i p i ) = l n i, 0 n i < p. i=0 0 e 1 < e 2 < < e l integers, q = p r, f (X ) = l i=1 γ ix e i F q [X ] nonzero polynomial over F q with γ i 0, i = 1,..., l p-weight degree of f : w p (f ) deg(f ) w p (f ) = max{σ p (e i ) : 1 i l}. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

41 If g(x ) F q [X ] and {β 1,..., β r } is a fixed ordered F p -basis of F q, we define G(X 1,..., X r ) = Tr(g(X 1 β X r β r )), where Tr(X ) = X + X p X pr 1 is the absolute trace function of F q. Then the transformed polynomial G R (X 1,..., X r ) of g(x ) is the unique polynomial with all local degrees smaller than p such that G R (X 1,..., X r ) G(X 1,..., X r ) mod (X p 1 X 1,..., X p r X r ). The interest of this construction relies on the fact that, under certain assumptions, the total degree of G R (X 1,..., X r ) coincides with the p-weight degree of g(x ). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

42 f (X ) = αx d + f (X ) F q [X ] with α 0, w p ( f ) < σ p (d). (1) If the sequence (x n ) given by x n+1 = f (x n ), n 0, with a polynomial f (X ) F q [X ] of the form (1) satisfying ( gcd d, q 1 ) σ p (d) r/2, p 1 with p-weight degree w = σ p (d) > 1, is purely periodic with period t, then for N 1, L(x n, N) min {log(n/pr 1 log(n/p r 1 )/ log w), log(t/p r 1 )}. log w (Ibeas/W., 2010) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

43 Polynomial Systems Let {F 1,..., F r } be a system of r 2 polynomials F i F q [X i,..., X m ], i = 1,..., r, defined in the following way: F 1 (X 1,..., X r ) = X 1 G 1 (X 2,..., X r ) + H 1 (X 2,..., X r ), F 2 (X 1,..., X r ) = X 2 G 2 (X 3,..., X r ) + H 2 (X 3,..., X r ),... F r 1 (X 1,..., X r ) = X r 1 G r 1 (X r ) + H r 1 (X r ), F r (X 1,..., X r ) = g r X r + h r. Using the following vector notation F = (F 1 (X 1,..., X r ),..., F r (X 1,..., X r )), we define the following vector sequence w n+1 = F ( w n ), n = 0, 1,.... A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

44 Identifying the r dimensional vectors over F q with elements of F q r we get L ( w n, N) N 1/(r 1), 1 N t. q (Ostafe, Shparlinski, W., 2010) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

45 Open Problem Find more good nonlinear generators. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

46 Thank you for your attention. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45

Pseudorandom Sequences II: Exponential Sums and Uniform Distribution

Pseudorandom Sequences II: Exponential Sums and Uniform Distribution Pseudorandom Sequences II: Exponential Sums and Uniform Distribution Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University

More information

Randomness and Complexity of Sequences over Finite Fields. Harald Niederreiter, FAMS. RICAM Linz and University of Salzburg (Austria)

Randomness and Complexity of Sequences over Finite Fields. Harald Niederreiter, FAMS. RICAM Linz and University of Salzburg (Austria) Randomness and Complexity of Sequences over Finite Fields Harald Niederreiter, FAMS RICAM Linz and University of Salzburg (Austria) Introduction A hierarchy of complexities Complexity and random sequences

More information

On the N th linear complexity of p-automatic sequences over F p

On the N th linear complexity of p-automatic sequences over F p On the N th linear complexity of p-automatic sequences over F p László Mérai and Arne Winterhof Johann Radon Institute for Computational and Applied Mathematics Austrian Academy of Sciences Altenbergerstr.

More information

Incomplete exponential sums over finite fields and their applications to new inversive pseudorandom number generators

Incomplete exponential sums over finite fields and their applications to new inversive pseudorandom number generators ACTA ARITHMETICA XCIII.4 (2000 Incomplete exponential sums over finite fields and their applications to new inversive pseudorandom number generators by Harald Niederreiter and Arne Winterhof (Wien 1. Introduction.

More information

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Primitive and normal polynomials over a finite field are, of course, particular examples of irreducible polynomials over

More information

Improved Discrepancy Bounds for Hybrid Sequences. Harald Niederreiter. RICAM Linz and University of Salzburg

Improved Discrepancy Bounds for Hybrid Sequences. Harald Niederreiter. RICAM Linz and University of Salzburg Improved Discrepancy Bounds for Hybrid Sequences Harald Niederreiter RICAM Linz and University of Salzburg MC vs. QMC methods Hybrid sequences The basic sequences Deterministic discrepancy bounds The proof

More information

Carlitz Rank and Index of Permutation Polynomials

Carlitz Rank and Index of Permutation Polynomials arxiv:1611.06361v1 [math.co] 19 Nov 2016 Carlitz Rank and Index of Permutation Polynomials Leyla Işık 1, Arne Winterhof 2, 1 Salzburg University, Hellbrunnerstr. 34, 5020 Salzburg, Austria E-mail: leyla.isik@sbg.ac.at

More information

Pseudo-Random Numbers Generators. Anne GILLE-GENEST. March 1, Premia Introduction Definitions Good generators...

Pseudo-Random Numbers Generators. Anne GILLE-GENEST. March 1, Premia Introduction Definitions Good generators... 14 pages 1 Pseudo-Random Numbers Generators Anne GILLE-GENEST March 1, 2012 Contents Premia 14 1 Introduction 2 1.1 Definitions............................. 2 1.2 Good generators..........................

More information

On components of vectorial permutations of F n q

On components of vectorial permutations of F n q On components of vectorial permutations of F n q Nurdagül Anbar 1, Canan Kaşıkcı 2, Alev Topuzoğlu 2 1 Johannes Kepler University, Altenbergerstrasse 69, 4040-Linz, Austria Email: nurdagulanbar2@gmail.com

More information

Homework 8 Solutions to Selected Problems

Homework 8 Solutions to Selected Problems Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x

More information

Characterization of 2 n -Periodic Binary Sequences with Fixed 2-error or 3-error Linear Complexity

Characterization of 2 n -Periodic Binary Sequences with Fixed 2-error or 3-error Linear Complexity Characterization of n -Periodic Binary Sequences with Fixed -error or 3-error Linear Complexity Ramakanth Kavuluru Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA. Abstract

More information

4.3 General attacks on LFSR based stream ciphers

4.3 General attacks on LFSR based stream ciphers 67 4.3 General attacks on LFSR based stream ciphers Recalling our initial discussion on possible attack scenarios, we now assume that z = z 1,z 2,...,z N is a known keystream sequence from a generator

More information

Lecture 10-11: General attacks on LFSR based stream ciphers

Lecture 10-11: General attacks on LFSR based stream ciphers Lecture 10-11: General attacks on LFSR based stream ciphers Thomas Johansson T. Johansson (Lund University) 1 / 23 Introduction z = z 1, z 2,..., z N is a known keystream sequence find a distinguishing

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 21 November 15, 2017 CPSC 467, Lecture 21 1/31 Secure Random Sequence Generators Pseudorandom sequence generators Looking random

More information

Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences

Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Kalikinkar Mandal, and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

Tropical Polynomials

Tropical Polynomials 1 Tropical Arithmetic Tropical Polynomials Los Angeles Math Circle, May 15, 2016 Bryant Mathews, Azusa Pacific University In tropical arithmetic, we define new addition and multiplication operations on

More information

arxiv: v1 [cs.cr] 25 Jul 2013

arxiv: v1 [cs.cr] 25 Jul 2013 On the k-error linear complexity of binary sequences derived from polynomial quotients Zhixiong Chen School of Applied Mathematics, Putian University, Putian, Fujian 351100, P. R. China ptczx@126.com arxiv:1307.6626v1

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x]. The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive

More information

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer. Attacks on RSA, some using LLL Recall RSA: N = pq hard to factor. Choose e with gcd(e,φ(n)) = 1, where φ(n) = (p 1)(q 1). Via extended Euclid, find d with ed 1 (mod φ(n)). Discard p and q. Public key is

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

Analysis of pseudorandom sequences

Analysis of pseudorandom sequences Eötvös Loránd University, Budapest, Hungary Department of Computer Algebra Summer School on Real-world Crypto and Privacy June 5 9, 2017 Sibenik, Croatia Introduction New, constructive approach - definitions

More information

Pseudo-random Number Generation. Qiuliang Tang

Pseudo-random Number Generation. Qiuliang Tang Pseudo-random Number Generation Qiuliang Tang Random Numbers in Cryptography The keystream in the one-time pad The secret key in the DES encryption The prime numbers p, q in the RSA encryption The private

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

DICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1

DICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1 DICKSON POLYNOMIALS OVER FINITE FIELDS QIANG WANG AND JOSEPH L. YUCAS Abstract. In this paper we introduce the notion of Dickson polynomials of the k + 1)-th kind over finite fields F p m and study basic

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

PUTNAM PROBLEMS SEQUENCES, SERIES AND RECURRENCES. Notes

PUTNAM PROBLEMS SEQUENCES, SERIES AND RECURRENCES. Notes PUTNAM PROBLEMS SEQUENCES, SERIES AND RECURRENCES Notes. x n+ = ax n has the general solution x n = x a n. 2. x n+ = x n + b has the general solution x n = x + (n )b. 3. x n+ = ax n + b (with a ) can be

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

The Weil bounds. 1 The Statement

The Weil bounds. 1 The Statement The Weil bounds Topics in Finite Fields Fall 013) Rutgers University Swastik Kopparty Last modified: Thursday 16 th February, 017 1 The Statement As we suggested earlier, the original form of the Weil

More information

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group.

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group. Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions

More information

2-4 Zeros of Polynomial Functions

2-4 Zeros of Polynomial Functions Write a polynomial function of least degree with real coefficients in standard form that has the given zeros. 33. 2, 4, 3, 5 Using the Linear Factorization Theorem and the zeros 2, 4, 3, and 5, write f

More information

On some properties of PRNGs based on block ciphers in counter mode

On some properties of PRNGs based on block ciphers in counter mode On some properties of PRNGs based on block ciphers in counter mode Alexey Urivskiy, Andrey Rybkin, Mikhail Borodin JSC InfoTeCS, Moscow, Russia alexey.urivskiy@mail.ru 2016 Pseudo Random Number Generators

More information

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9. ASSIGNMENT 1 1. Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9. 2. (i) If d a and d b, prove that d (a + b). (ii) More generally,

More information

Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields

Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields Zilong Wang and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo Waterloo,

More information

Counting Functions for the k-error Linear Complexity of 2 n -Periodic Binary Sequences

Counting Functions for the k-error Linear Complexity of 2 n -Periodic Binary Sequences Counting Functions for the k-error inear Complexity of 2 n -Periodic Binary Sequences amakanth Kavuluru and Andrew Klapper Department of Computer Science, University of Kentucky, exington, KY 40506. Abstract

More information

MATH 361: NUMBER THEORY TENTH LECTURE

MATH 361: NUMBER THEORY TENTH LECTURE MATH 361: NUMBER THEORY TENTH LECTURE The subject of this lecture is finite fields. 1. Root Fields Let k be any field, and let f(x) k[x] be irreducible and have positive degree. We want to construct a

More information

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Kwangsu Lee A Thesis for the Degree of Master of Science Division of Computer Science, Department

More information

Interpolation of Functions Related to the Integer Factoring Problem

Interpolation of Functions Related to the Integer Factoring Problem Interpolation of Functions Related to the Integer Factoring Problem Clemens Adelmann 1 and Arne Winterhof 2 1 Institut für Analysis und Algebra, Technische Universität Braunschweig, Pockelsstraße 14, D-38106

More information

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows. EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =

More information

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary CPSC 531: Random Numbers Jonathan Hudson Department of Computer Science University of Calgary http://www.ucalgary.ca/~hudsonj/531f17 Introduction In simulations, we generate random values for variables

More information

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University Finite fields, randomness and complexity Swastik Kopparty Rutgers University This talk Three great problems: Polynomial factorization Epsilon-biased sets Function uncorrelated with low-degree polynomials

More information

Legendre s Equation. PHYS Southern Illinois University. October 18, 2016

Legendre s Equation. PHYS Southern Illinois University. October 18, 2016 Legendre s Equation PHYS 500 - Southern Illinois University October 18, 2016 PHYS 500 - Southern Illinois University Legendre s Equation October 18, 2016 1 / 11 Legendre s Equation Recall We are trying

More information

One can use elliptic curves to factor integers, although probably not RSA moduli.

One can use elliptic curves to factor integers, although probably not RSA moduli. Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties

More information

PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS

PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS JAIME GUTIERREZ, ÁLVAR IBEAS, DOMINGO GÓMEZ-PEREZ, AND IGOR E. SHPARLINSKI Abstract. We study the security of the linear generator

More information

On the Linear Complexity of Legendre-Sidelnikov Sequences

On the Linear Complexity of Legendre-Sidelnikov Sequences On the Linear Complexity of Legendre-Sidelnikov Sequences Ming Su Nankai University, China Emerging Applications of Finite Fields, Linz, Dec. 12 Outline Motivation Legendre-Sidelnikov Sequence Definition

More information

Stream Ciphers. Çetin Kaya Koç Winter / 20

Stream Ciphers. Çetin Kaya Koç   Winter / 20 Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 20 Linear Congruential Generators A linear congruential generator produces a sequence of integers x i for i = 1,2,... starting with the given initial

More information

with Good Cross Correlation for Communications and Cryptography

with Good Cross Correlation for Communications and Cryptography m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences

More information

: Error Correcting Codes. November 2017 Lecture 2

: Error Correcting Codes. November 2017 Lecture 2 03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial

More information

Math 120. Groups and Rings Midterm Exam (November 8, 2017) 2 Hours

Math 120. Groups and Rings Midterm Exam (November 8, 2017) 2 Hours Math 120. Groups and Rings Midterm Exam (November 8, 2017) 2 Hours Name: Please read the questions carefully. You will not be given partial credit on the basis of having misunderstood a question, and please

More information

Elliptic Nets and Points on Elliptic Curves

Elliptic Nets and Points on Elliptic Curves Department of Mathematics Brown University http://www.math.brown.edu/~stange/ Algorithmic Number Theory, Turku, Finland, 2007 Outline Geometry and Recurrence Sequences 1 Geometry and Recurrence Sequences

More information

The Graph Structure of Chebyshev Polynomials over Finite Fields and Applications

The Graph Structure of Chebyshev Polynomials over Finite Fields and Applications The Graph Structure of Chebyshev Polynomials over Finite Fields and Applications Claudio Qureshi and Daniel Panario arxiv:803.06539v [cs.dm] 7 Mar 08 Abstract We completely describe the functional graph

More information

SOLVING THE PELL EQUATION VIA RÉDEI RATIONAL FUNCTIONS

SOLVING THE PELL EQUATION VIA RÉDEI RATIONAL FUNCTIONS STEFANO BARBERO, UMBERTO CERRUTI, AND NADIR MURRU Abstract. In this paper, we define a new product over R, which allows us to obtain a group isomorphic to R with the usual product. This operation unexpectedly

More information

Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields

Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields 1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

On generalized Lucas sequences

On generalized Lucas sequences Contemporary Mathematics On generalized Lucas sequences Qiang Wang This paper is dedicated to Professor G. B. Khosrovshahi on the occasion of his 70th birthday and to IPM on its 0th birthday. Abstract.

More information

Permutation Polynomials over Finite Fields

Permutation Polynomials over Finite Fields Permutation Polynomials over Finite Fields Omar Kihel Brock University 1 Finite Fields 2 How to Construct a Finite Field 3 Permutation Polynomials 4 Characterization of PP Finite Fields Let p be a prime.

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series.

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series. 6 Polynomial Rings We introduce a class of rings called the polynomial rings, describing computation, factorization and divisibility in such rings For the case where the coefficients come from an integral

More information

50 Algebraic Extensions

50 Algebraic Extensions 50 Algebraic Extensions Let E/K be a field extension and let a E be algebraic over K. Then there is a nonzero polynomial f in K[x] such that f(a) = 0. Hence the subset A = {f K[x]: f(a) = 0} of K[x] does

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Polynomial Rings. (Last Updated: December 8, 2017)

Polynomial Rings. (Last Updated: December 8, 2017) Polynomial Rings (Last Updated: December 8, 2017) These notes are derived primarily from Abstract Algebra, Theory and Applications by Thomas Judson (16ed). Most of this material is drawn from Chapters

More information

Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn

Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn Problem 1: 4.4 # 2:x 3 + 8x 2 x 1 0 (mod 1331). a) x 3 + 8x 2 x 1 0 (mod 11). This does not break down, so trial and error gives: x = 0 : f(0)

More information

Idempotent and p-potent quadratic functions: distribution of nonlinearity and codimension

Idempotent and p-potent quadratic functions: distribution of nonlinearity and codimension Downloaded from orbit.dtu.dk on: Oct 07, 2018 Idempotent and p-potent quadratic functions: distribution of nonlinearity and codimension Anbar Meidl, Nurdagül; Meidl, Wilfried Meidl; Topuzoglu, Alev Published

More information

Chapter 7 Random Numbers

Chapter 7 Random Numbers Chapter 7 Random Numbers February 15, 2010 7 In the following random numbers and random sequences are treated as two manifestations of the same thing. A series of random numbers strung together is considered

More information

Cyclic Codes from the Two-Prime Sequences

Cyclic Codes from the Two-Prime Sequences Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes

More information

On Irreducible Polynomial Remainder Codes

On Irreducible Polynomial Remainder Codes 2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering

More information

Number Theory in Cryptology

Number Theory in Cryptology Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,

More information

On the computation of the linear complexity and the k-error linear complexity of binary sequences with period a power of two

On the computation of the linear complexity and the k-error linear complexity of binary sequences with period a power of two Loughborough University Institutional Repository On the computation of the linear complexity and the k-error linear complexity of binary sequences with period a power of two This item was submitted to

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has

More information

ALGORITHMS FOR ALGEBRAIC CURVES

ALGORITHMS FOR ALGEBRAIC CURVES ALGORITHMS FOR ALGEBRAIC CURVES SUMMARY OF LECTURE 3 In this text the symbol Θ stands for a positive constant. 1. COMPLEXITY THEORY AGAIN : DETERMINISTIC AND PROBABILISTIC CLASSES We refer the reader to

More information

PRIMALITY TESTING. Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi. By TAHIRI JOUTI Kamal

PRIMALITY TESTING. Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi. By TAHIRI JOUTI Kamal PRIMALITY TESTING Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi By TAHIRI JOUTI Kamal TABLE OF CONTENTS I- FUNDAMENTALS FROM NOMBER THEORY FOR RANDOMIZED ALGORITHMS:.page 4 1)

More information

Pseudorandom Generators

Pseudorandom Generators 8 Pseudorandom Generators Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 andomness is one of the fundamental computational resources and appears everywhere. In computer science,

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

On linear complexity of binary lattices

On linear complexity of binary lattices On linear complexity of binary lattices Katalin Gyarmati Eötvös Loránd University Department of Algebra and Number Theory H-1117 Budapest, Pázmány Péter sétány 1/C, Hungary e-mail: gykati@cs.elte.hu (corresponding

More information

CSCE 564, Fall 2001 Notes 6 Page 1 13 Random Numbers The great metaphysical truth in the generation of random numbers is this: If you want a function

CSCE 564, Fall 2001 Notes 6 Page 1 13 Random Numbers The great metaphysical truth in the generation of random numbers is this: If you want a function CSCE 564, Fall 2001 Notes 6 Page 1 13 Random Numbers The great metaphysical truth in the generation of random numbers is this: If you want a function that is reasonably random in behavior, then take any

More information

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5 UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look

More information

Skew Cyclic Codes Of Arbitrary Length

Skew Cyclic Codes Of Arbitrary Length Skew Cyclic Codes Of Arbitrary Length Irfan Siap Department of Mathematics, Adıyaman University, Adıyaman, TURKEY, isiap@adiyaman.edu.tr Taher Abualrub Department of Mathematics and Statistics, American

More information

Irreducible Polynomials over Finite Fields

Irreducible Polynomials over Finite Fields Chapter 4 Irreducible Polynomials over Finite Fields 4.1 Construction of Finite Fields As we will see, modular arithmetic aids in testing the irreducibility of polynomials and even in completely factoring

More information

COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS

COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS ROBERT S. COULTER AND MARIE HENDERSON Abstract. Strong conditions are derived for when two commutative presemifields are isotopic. It is then shown that any commutative

More information

Idempotent Generators of Generalized Residue Codes

Idempotent Generators of Generalized Residue Codes 1 Idempotent Generators of Generalized Residue Codes A.J. van Zanten A.J.vanZanten@uvt.nl Department of Communication and Informatics, University of Tilburg, The Netherlands A. Bojilov a.t.bozhilov@uvt.nl,bojilov@fmi.uni-sofia.bg

More information

ON THE INTERPOLATION OF BIVARIATE POLYNOMIALS RELATED TO THE DIFFIE-HELLMAN MAPPING. ElKE KlLTZ AND ARNE WlNTERHOF

ON THE INTERPOLATION OF BIVARIATE POLYNOMIALS RELATED TO THE DIFFIE-HELLMAN MAPPING. ElKE KlLTZ AND ARNE WlNTERHOF BULL. AUSTRAL. MATH. SOC. VOL. 69 (2004) [305-315] 11TO6, 11T71, 68Q17 ON THE INTERPOLATION OF BIVARIATE POLYNOMIALS RELATE TO THE IFFIE-HELLMAN MAPPING ElKE KlLTZ AN ARNE WlNTERHOF We obtain lower bounds

More information

MTH310 EXAM 2 REVIEW

MTH310 EXAM 2 REVIEW MTH310 EXAM 2 REVIEW SA LI 4.1 Polynomial Arithmetic and the Division Algorithm A. Polynomial Arithmetic *Polynomial Rings If R is a ring, then there exists a ring T containing an element x that is not

More information

Polynomial Rings. i=0

Polynomial Rings. i=0 Polynomial Rings 4-15-2018 If R is a ring, the ring of polynomials in x with coefficients in R is denoted R[x]. It consists of all formal sums a i x i. Here a i = 0 for all but finitely many values of

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

EE512: Error Control Coding

EE512: Error Control Coding EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to

More information

IEEE P1363 / D9 (Draft Version 9). Standard Specifications for Public Key Cryptography

IEEE P1363 / D9 (Draft Version 9). Standard Specifications for Public Key Cryptography IEEE P1363 / D9 (Draft Version 9) Standard Specifications for Public Key Cryptography Annex A (informative) Number-Theoretic Background Copyright 1997,1998,1999 by the Institute of Electrical and Electronics

More information

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

Here, logx denotes the natural logarithm of x. Mrsky [7], and later Cheo and Yien [2], proved that iz;.(»)=^io 8 "0(i).

Here, logx denotes the natural logarithm of x. Mrsky [7], and later Cheo and Yien [2], proved that iz;.(»)=^io 8 0(i). Curtis Cooper f Robert E* Kennedy, and Milo Renberg Dept. of Mathematics, Central Missouri State University, Warrensburg, MO 64093-5045 (Submitted January 1997-Final Revision June 1997) 0. INTRODUCTION

More information

Division of Trinomials by Pentanomials and Orthogonal Arrays

Division of Trinomials by Pentanomials and Orthogonal Arrays Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang

More information

The Hidden Root Problem

The Hidden Root Problem EPFL 2008 Definition of HRP Let F q k be a finite field where q = p n for prime p. The (Linear) Hidden Root Problem: let r N0 be given and x F q k hidden access to oracle Ox that given (a, b) F 2 q k returns

More information

arxiv: v1 [math.nt] 7 Sep 2015

arxiv: v1 [math.nt] 7 Sep 2015 THE ARITHMETIC OF CONSECUTIVE POLYNOMIAL SEQUENCES OVER FINITE FIELDS arxiv:1509.01936v1 [math.nt] 7 Sep 2015 DOMINGO GÓMEZ-PÉREZ, ALINA OSTAFE, AND MIN SHA Abstract. Motivated by a question of van der

More information

On the Primitivity of some Trinomials over Finite Fields

On the Primitivity of some Trinomials over Finite Fields On the Primitivity of some Trinomials over Finite Fields LI Yujuan & WANG Huaifu & ZHAO Jinhua Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China email: liyj@amss.ac.cn,

More information

IEEE P1363 / D13 (Draft Version 13). Standard Specifications for Public Key Cryptography

IEEE P1363 / D13 (Draft Version 13). Standard Specifications for Public Key Cryptography IEEE P1363 / D13 (Draft Version 13). Standard Specifications for Public Key Cryptography Annex A (Informative). Number-Theoretic Background. Copyright 1999 by the Institute of Electrical and Electronics

More information

Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek

Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek The Graduate School Yonsei University Department of Electrical and Electronic Engineering Design of Filter

More information