Pseudorandom Sequences I: Linear Complexity and Related Measures
|
|
- Kelley Holt
- 5 years ago
- Views:
Transcription
1 Pseudorandom Sequences I: Linear Complexity and Related Measures Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University 2010 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
2 Why pseudorandom and not truly random sequences? A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
3 Pseudorandom Sequences Sequences which are generated by a deterministic algorithm and look random are called pseudorandom. Desirable randomness properties depend on the application! cryptography: unpredictability numerical integration (quasi-monte Carlo): uniform distribution radar: distinction from reflected signal gambling: a good lawyer A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
4 Linear Complexity The linear complexity L(s n ) of a periodic sequence (s n ) over a field F is the smallest positive integer L such that there are constants c 0,..., c L 1 F with s n+l = c L 1 s n+l c 0 s n, n 0. For a positive integer N the Nth linear complexity L(s n, N) of a sequence (s n ) over F is the smallest positive integer L such that there are constants c 0,..., c L 1 F satisfying 0 n N L 1. s n+l = c L 1 s n+l c 0 s n, A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
5 Cryptographic Background A low Nth linear complexity has turned out to be undesirable for cryptographical applications as stream ciphers. Example (Stream Cipher) We consider a message m 0, m 1,... represented as a sequence over F. In a stream cipher each message symbol m j is enciphered with an element x j of another sequence x 0, x 1,... over F, the key stream, by c j = m j + x j. The cipher text c 0, c 1,... can be deciphered by subtracting the key stream m j = c j x j. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
6 Relation to Quasi-Monte Carlo Methods Sequences with low linear complexity are shown to be unsuitable for some applications using quasi-monte Carlo methods as well. The following example describes a typical quasi-monte Carlo application. Example (Quasi-Monte-Carlo Calculation of π) 1 Choose N pairs of a sequence (x n ) in [0, 1) (x n, x n+1 ) [0, 1) 2, n = 0,..., N 1. 2 Count the number K of pairs (x n, x n+1 ) in the unit circle. 3 Approximate π by 4K N. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
7 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
8 Marsaglia s Lattice test, 1972 (η n ) T-periodic sequence over F p For s 1 we say that (η n ) passes the s-dimensional lattice test if the vectors {u n u 0 : 1 n < T } span F s p, where u n = (η n, η n+1,..., η n+s 1 ), 0 n < T. S(η n ) = max { s : u n u 0, 1 n < T = F s p } A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
9 s = 2: A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
10 s = 3: A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
11 Niederreiter/W., 2002: L(η n ) = S(η n ) or = S(η n ) + 1 Dorfer/W., 2003: Lattice test for parts of the period, S(η n, N) We have either S(η n, N) = min(l(η n, N), N + 1 L(η n, N)) or S(η n, N) = min(l(η n, N), N + 1 L(η n, N)) 1. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
12 Relation to Information and Coding Theory The Kolmogorov complexity of a sequence over F is the length of a shortest Turing machine that generates it. Beth/Dai, 1989: F = F 2 : Linear complexity and Kolmogorov complexity are the same for almost all binary sequences. In general there is no algorithm for calculating the Kolmogorov complexity. In contrast we have the Berlekamp-Massey Algorithm for calculating the linear complexity. This algorithm stems from coding theory. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
13 A Consequence of the Berlekamp-Massey Algorithm Theorem If L(s n, N) > N/2, then we have L(s n, N + 1) = L(s n, N). If L(s n, N) N/2, then we have either L(s n, N + 1) = L(s n, N) or L(s n, N + 1) = N + 1 L(s n, N). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
14 The Expected Value F = F q Theorem The expected value for L(s n, N) is { N 2 + q (q+1) 2 q N N(q+1)+q (q+1) 2 for even N, N + q2 +1 q N N(q+1)+q for odd N. 2 2(q+1) 2 (q+1) 2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
15 Lower Bounds In case of a p-periodic sequence (ξ n ) over F p, where p is a prime, linear complexity is related to the degree of the polynomial g(x ) F p [X ] representing the sequence (ξ n ), i.e., g(x ) is the unique polynomial which satisfies deg g p 1 and ξ n = g(n), 0 n p 1. These sequences are called explicit nonlinear congruential generators and we have L(ξ n ) = deg g + 1. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
16 High linear complexity but low Nth linear complexity Example: ξ n = 1 (n + 1) p 1, 0 n p 1 (ξ 0, ξ 1,..., ξ p 2, ξ p 1 ) = (0, 0,..., 0, 1) L(ξ n ) = p highly predictable L(ξ n, N) = 0, 1 N p 1 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
17 The explicit inversive congruential generator (z n ) is produced by the relation z n = (an + b) p 2, n = 0,..., p 1, z n+p = z n, n 0, with a, b F p, a 0, and p 5. We have (N 1)/3, 1 N (3p 7)/2, L(z n, N) N p + 2, (3p 5)/2 N 2p 3, p 1, N 2p 2. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
18 c L = 1, N p L c l z n+l = 0, 0 n N L 1 l=0 a(n + l) + b 0, 0 l L: L c l (a(n + l) + b) 1 = 0 l=0 F (X ) = L l=0 c l L (a(x + j) + b) j=0 j L has at least N L (L + 1) zeros and degree at most L. L 1 F ( a 1 b L) = c L (a(j L)) 0 j=0 N 2L 1 L and thus L (N 1)/3 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
19 z n = (an + b) p 2 is still highly predictable since inversion is cheap and a = z 1 n+1 z n 1 for all but two n. Open problem: Define a modified linear complexity with inversions and analyze it. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
20 Let p > 2 be a prime. The Legendre-sequence (l n ) is defined by { ( ) n 1, = 1, l n = p n 0, 0, otherwise, ( where. p Theorem ) is the Legendre-symbol. The linear complexity of the Legendre sequence is (p 1)/2, p 1 mod 8, p, p 3 mod 8, L(l n ) = p 1, p 5 mod 8, (p + 1)/2, p 7 mod 8. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
21 Theorem The Nth linear complexity of the Legendre sequence satisfies L(l n, N) > min{n, p} 1, N p 1/2 (1 + log p) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
22 Weil: Let f (X ) F p [X ] a (monic) polynomial which is not a square and a F p then we have ( ) af (x) p (deg(f ) 1)p1/2. x F p L c k l n+k = 0 F 2, 0 n N L 1, (c L = 1) k=0 ( ) n ( 1) ln =, n 0, p ( L ) ( 1) P L k=0 c kl n+k l=0 = (n + l)c l = 1 p for at least min{n, p} (L + 1) different n A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
23 Summing over n: ( N 1 L ) l=0 min{n, p} (L + 1) (n + l)c l p n=0 < (L + 1)p 1/2 (1 + log p) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
24 Relation to Wireless Communication The correlation measure of order k of a binary sequence (s n ) is introduced as M C k (s n ) = max ( 1) s n+d 1 ( 1) s n+dk, k 1, M,D n=1 where the maximum is taken over all D = (d 1, d 2,..., d k ) with non-negative integers d 1 < d 2 < < d k and M such that M 1 + d k T 1. L(s n, N) N max C k(s n ), 2 N t 1. 1 k L(s n,n)+1 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
25 Examples. a) b n = 0, 0 n t 2, b t 1 = 1 L(b n ) = t, one change L(b n) = 0 b) c n+4 = c n, n 0, with c 0 = c 1 = c 2 = 1, c 3 = 0 over F 2 : L(c n ) = 4 over F 3 : L(c n ) = 3 since c n+3 = 2c n+2 + 2c n+1 + 2c n, n 0 Desirable: 1. high linear complexity even if we change a few elements 2. high linear complexity over different fields A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
26 Let (s n ) be a sequence over F, with period t. The k-error linear complexity L k (s n ) of (s n ) is defined as L k (s n ) = min (y n) L(y n), where the minimum is taken over all t-periodic sequences (y n ) over F, for which the Hamming distance of the vectors (s 0, s 1,..., s t 1 ) and (y 0, y 1,..., y t 1 ) is at most k. Theorem Let L k (l n ) denote the k-error linear complexity over F p of the Legendre sequence (l n ). Then, L k (l n ) = p, k = 0, (p + 1)/2, 1 k (p 3)/2, 0, k (p 1)/2. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
27 l n = 2 1 (n p 1 n (p 1)/2 ) F p, n 0 l n = 2 1 (1 n (p 1)/2 ) =: h(n), n 0 l n = f (n) implies L(l n ) = deg(f ) + 1 Let (y n ) be obtained from (l n ) by at most k changes. Case I: (y n ) = (l n ): L(y n ) = p Case II: (y n ) = h(n): L(y n ) = (p + 1)/2 Case III: y n = g(n), g(x ) h(x ) deg(g h) p k 1 (p + 1)/2 if k (p 3)/2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
28 Shparlinski/W.,2006: linear complexity over F k, k prime: L(l n ) 1 { } 2 log k min p 1, 2k 1. p 1/2 log p + 2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
29 Open Problem Find more sequences with high (Nth, k-error) linear complexity. For example, study recursive sequences. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
30 Linear Pseudorandom Number Generators F q finite field of q elements, a, b, x 0 F q, a 0 x n+1 = ax n + b, n 0 q = p prime, F p = {0, 1,..., p 1}: y n = x n /p [0, 1), n 0 Nice features: long period can be easily obtained uniform distribution in dimension 1 flaws: predictable (L(x n ) 2) coarse structure A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
31 Nonlinear Pseudorandom Numbers f F q [X ], 2 deg(f ) q 1, x 0 F q x n+1 = f (x n ), n 0 (purely) periodic with period t q q = p prime: y n = x n /p [0, 1) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
32 Lower Bound on the Linear Complexity Profile Gutierrez/Shparlinski/W., 2003: The linear complexity profile of a nonlinear sequence (x n ) defined by x n+1 = f (x n ), n = 0, 1,..., with a polynomial f F q [X ] of degree d 2, purely periodic with period t, satisfies L(x n, N) min { log d (N log d N ), log d t }. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
33 Proof. F 0 (X ) := X, F i (X ) := F i 1 (f (X )), i 1 deg(f i ) = d i, x n+j = F j (x n ) x n+l = a L 1 x n+l a 0 x n, 0 n N L 1 F (X ) := F L (X ) + a L 1 F L 1 (X ) a 0 F 0 (X ) has degree d L and at least min {N L, t} zeros, namely, x n with 0 n min{n L 1, t 1}. d L min {N L, t} A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
34 Inversive Generators a, b, y 0 F q, a 0 { ay y n+1 = ayn q 2 1 n + b, y + b = n 0, b, y n = 0. Gutierrez/Shparlinski/W., 2003: { } N 1 t 1 L(y n, N) min, 3 2 Reason for better result: f (X ) = bx +a X, F j(x ) = a j X +b j c j X +d A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
35 Dickson and Power Generator The Dickson polynomial D e (X, a) F q [X ] is defined by the following recurrence relation D e (X, a) = XD e 1 (X, a) ad e 2 (X, a), e = 2, 3,..., with initial values D 0 (X, a) = 2, D 1 (X, a) = X, where a F q. Obviously, the degree of D e is e. Moreover, if a {0, 1} then we have D e (D f (X, a), a) = D ef (X, a). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
36 a = 0: D e (X, 0) = X e, e 2 p n+1 = p e n, n 0 power generator Griffin/Shparlinski, 2000: (q = p prime) { } N 2 L(p n, N) min 4(p 1), t 2, N 1. p 1 Reason for better result: F k (X ) = X ek mod p 1 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
37 a = 1: D e (x + x 1, 1) = x e + x e, x F q 2 u n+1 = D e (u n, 1), n 0, with some initial value u 0 and e 2. Dickson generator Aly/W., 2006: L(u n, N) min{n 2, 4t 2 } 16(p + 1) (p + 1) 1/2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
38 Redéi generator Suppose that r(x ) = X 2 αx β F p [X ] is an irreducible quadratic polynomial with the two different roots ξ and ζ = ξ p in F p 2. Then any polynomial b(x ) F p 2[X ] can uniquely be written in the form b(x ) = g(x ) + h(x )ξ with g(x ), h(x ) F p [X ]. We consider the elements (X + ξ) e = g e (X ) + h e (X )ξ. e is the degree of the polynomial g e (X ), and h e (X ) has degree at most e 1. The Rédei function f e (X ) of degree e is then given by f e (X ) = g e(x ) h e (X ). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
39 u n+1 = f e (u n ), n 0, with a Rédei permutation f e (X ) and some initial element u 0 F p. Meidl/W., 2007: L(u n, N) min{n 2, 4t 2 }, N 2. 20(p + 1) 3/2 A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
40 p-weight Degree n nonnegative integer p-weight of n: σ p ( l i=0 n i p i ) = l n i, 0 n i < p. i=0 0 e 1 < e 2 < < e l integers, q = p r, f (X ) = l i=1 γ ix e i F q [X ] nonzero polynomial over F q with γ i 0, i = 1,..., l p-weight degree of f : w p (f ) deg(f ) w p (f ) = max{σ p (e i ) : 1 i l}. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
41 If g(x ) F q [X ] and {β 1,..., β r } is a fixed ordered F p -basis of F q, we define G(X 1,..., X r ) = Tr(g(X 1 β X r β r )), where Tr(X ) = X + X p X pr 1 is the absolute trace function of F q. Then the transformed polynomial G R (X 1,..., X r ) of g(x ) is the unique polynomial with all local degrees smaller than p such that G R (X 1,..., X r ) G(X 1,..., X r ) mod (X p 1 X 1,..., X p r X r ). The interest of this construction relies on the fact that, under certain assumptions, the total degree of G R (X 1,..., X r ) coincides with the p-weight degree of g(x ). A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
42 f (X ) = αx d + f (X ) F q [X ] with α 0, w p ( f ) < σ p (d). (1) If the sequence (x n ) given by x n+1 = f (x n ), n 0, with a polynomial f (X ) F q [X ] of the form (1) satisfying ( gcd d, q 1 ) σ p (d) r/2, p 1 with p-weight degree w = σ p (d) > 1, is purely periodic with period t, then for N 1, L(x n, N) min {log(n/pr 1 log(n/p r 1 )/ log w), log(t/p r 1 )}. log w (Ibeas/W., 2010) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
43 Polynomial Systems Let {F 1,..., F r } be a system of r 2 polynomials F i F q [X i,..., X m ], i = 1,..., r, defined in the following way: F 1 (X 1,..., X r ) = X 1 G 1 (X 2,..., X r ) + H 1 (X 2,..., X r ), F 2 (X 1,..., X r ) = X 2 G 2 (X 3,..., X r ) + H 2 (X 3,..., X r ),... F r 1 (X 1,..., X r ) = X r 1 G r 1 (X r ) + H r 1 (X r ), F r (X 1,..., X r ) = g r X r + h r. Using the following vector notation F = (F 1 (X 1,..., X r ),..., F r (X 1,..., X r )), we define the following vector sequence w n+1 = F ( w n ), n = 0, 1,.... A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
44 Identifying the r dimensional vectors over F q with elements of F q r we get L ( w n, N) N 1/(r 1), 1 N t. q (Ostafe, Shparlinski, W., 2010) A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
45 Open Problem Find more good nonlinear generators. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
46 Thank you for your attention. A.Winterhof (RICAM (Linz)) Linear Complexity Carleton University / 45
Pseudorandom Sequences II: Exponential Sums and Uniform Distribution
Pseudorandom Sequences II: Exponential Sums and Uniform Distribution Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University
More informationRandomness and Complexity of Sequences over Finite Fields. Harald Niederreiter, FAMS. RICAM Linz and University of Salzburg (Austria)
Randomness and Complexity of Sequences over Finite Fields Harald Niederreiter, FAMS RICAM Linz and University of Salzburg (Austria) Introduction A hierarchy of complexities Complexity and random sequences
More informationOn the N th linear complexity of p-automatic sequences over F p
On the N th linear complexity of p-automatic sequences over F p László Mérai and Arne Winterhof Johann Radon Institute for Computational and Applied Mathematics Austrian Academy of Sciences Altenbergerstr.
More informationIncomplete exponential sums over finite fields and their applications to new inversive pseudorandom number generators
ACTA ARITHMETICA XCIII.4 (2000 Incomplete exponential sums over finite fields and their applications to new inversive pseudorandom number generators by Harald Niederreiter and Arne Winterhof (Wien 1. Introduction.
More informationStephen Cohen, University of Glasgow Methods for primitive and normal polynomials
Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Primitive and normal polynomials over a finite field are, of course, particular examples of irreducible polynomials over
More informationImproved Discrepancy Bounds for Hybrid Sequences. Harald Niederreiter. RICAM Linz and University of Salzburg
Improved Discrepancy Bounds for Hybrid Sequences Harald Niederreiter RICAM Linz and University of Salzburg MC vs. QMC methods Hybrid sequences The basic sequences Deterministic discrepancy bounds The proof
More informationCarlitz Rank and Index of Permutation Polynomials
arxiv:1611.06361v1 [math.co] 19 Nov 2016 Carlitz Rank and Index of Permutation Polynomials Leyla Işık 1, Arne Winterhof 2, 1 Salzburg University, Hellbrunnerstr. 34, 5020 Salzburg, Austria E-mail: leyla.isik@sbg.ac.at
More informationPseudo-Random Numbers Generators. Anne GILLE-GENEST. March 1, Premia Introduction Definitions Good generators...
14 pages 1 Pseudo-Random Numbers Generators Anne GILLE-GENEST March 1, 2012 Contents Premia 14 1 Introduction 2 1.1 Definitions............................. 2 1.2 Good generators..........................
More informationOn components of vectorial permutations of F n q
On components of vectorial permutations of F n q Nurdagül Anbar 1, Canan Kaşıkcı 2, Alev Topuzoğlu 2 1 Johannes Kepler University, Altenbergerstrasse 69, 4040-Linz, Austria Email: nurdagulanbar2@gmail.com
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationCharacterization of 2 n -Periodic Binary Sequences with Fixed 2-error or 3-error Linear Complexity
Characterization of n -Periodic Binary Sequences with Fixed -error or 3-error Linear Complexity Ramakanth Kavuluru Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA. Abstract
More information4.3 General attacks on LFSR based stream ciphers
67 4.3 General attacks on LFSR based stream ciphers Recalling our initial discussion on possible attack scenarios, we now assume that z = z 1,z 2,...,z N is a known keystream sequence from a generator
More informationLecture 10-11: General attacks on LFSR based stream ciphers
Lecture 10-11: General attacks on LFSR based stream ciphers Thomas Johansson T. Johansson (Lund University) 1 / 23 Introduction z = z 1, z 2,..., z N is a known keystream sequence find a distinguishing
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 21 November 15, 2017 CPSC 467, Lecture 21 1/31 Secure Random Sequence Generators Pseudorandom sequence generators Looking random
More informationCryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences
Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Kalikinkar Mandal, and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,
More informationTropical Polynomials
1 Tropical Arithmetic Tropical Polynomials Los Angeles Math Circle, May 15, 2016 Bryant Mathews, Azusa Pacific University In tropical arithmetic, we define new addition and multiplication operations on
More informationarxiv: v1 [cs.cr] 25 Jul 2013
On the k-error linear complexity of binary sequences derived from polynomial quotients Zhixiong Chen School of Applied Mathematics, Putian University, Putian, Fujian 351100, P. R. China ptczx@126.com arxiv:1307.6626v1
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationKnow the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].
The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive
More informationIn fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.
Attacks on RSA, some using LLL Recall RSA: N = pq hard to factor. Choose e with gcd(e,φ(n)) = 1, where φ(n) = (p 1)(q 1). Via extended Euclid, find d with ed 1 (mod φ(n)). Discard p and q. Public key is
More informationSequences, DFT and Resistance against Fast Algebraic Attacks
Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca
More informationAnalysis of pseudorandom sequences
Eötvös Loránd University, Budapest, Hungary Department of Computer Algebra Summer School on Real-world Crypto and Privacy June 5 9, 2017 Sibenik, Croatia Introduction New, constructive approach - definitions
More informationPseudo-random Number Generation. Qiuliang Tang
Pseudo-random Number Generation Qiuliang Tang Random Numbers in Cryptography The keystream in the one-time pad The secret key in the DES encryption The prime numbers p, q in the RSA encryption The private
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationDICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1
DICKSON POLYNOMIALS OVER FINITE FIELDS QIANG WANG AND JOSEPH L. YUCAS Abstract. In this paper we introduce the notion of Dickson polynomials of the k + 1)-th kind over finite fields F p m and study basic
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationPUTNAM PROBLEMS SEQUENCES, SERIES AND RECURRENCES. Notes
PUTNAM PROBLEMS SEQUENCES, SERIES AND RECURRENCES Notes. x n+ = ax n has the general solution x n = x a n. 2. x n+ = x n + b has the general solution x n = x + (n )b. 3. x n+ = ax n + b (with a ) can be
More informationNew algebraic decoding method for the (41, 21,9) quadratic residue code
New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,
More informationThird-order nonlinearities of some biquadratic monomial Boolean functions
Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this
More informationThe Weil bounds. 1 The Statement
The Weil bounds Topics in Finite Fields Fall 013) Rutgers University Swastik Kopparty Last modified: Thursday 16 th February, 017 1 The Statement As we suggested earlier, the original form of the Weil
More informationAlgebra Review 2. 1 Fields. A field is an extension of the concept of a group.
Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions
More information2-4 Zeros of Polynomial Functions
Write a polynomial function of least degree with real coefficients in standard form that has the given zeros. 33. 2, 4, 3, 5 Using the Linear Factorization Theorem and the zeros 2, 4, 3, and 5, write f
More informationOn some properties of PRNGs based on block ciphers in counter mode
On some properties of PRNGs based on block ciphers in counter mode Alexey Urivskiy, Andrey Rybkin, Mikhail Borodin JSC InfoTeCS, Moscow, Russia alexey.urivskiy@mail.ru 2016 Pseudo Random Number Generators
More informationASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.
ASSIGNMENT 1 1. Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9. 2. (i) If d a and d b, prove that d (a + b). (ii) More generally,
More informationCorrelation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields
Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields Zilong Wang and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo Waterloo,
More informationCounting Functions for the k-error Linear Complexity of 2 n -Periodic Binary Sequences
Counting Functions for the k-error inear Complexity of 2 n -Periodic Binary Sequences amakanth Kavuluru and Andrew Klapper Department of Computer Science, University of Kentucky, exington, KY 40506. Abstract
More informationMATH 361: NUMBER THEORY TENTH LECTURE
MATH 361: NUMBER THEORY TENTH LECTURE The subject of this lecture is finite fields. 1. Root Fields Let k be any field, and let f(x) k[x] be irreducible and have positive degree. We want to construct a
More informationPermutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Kwangsu Lee A Thesis for the Degree of Master of Science Division of Computer Science, Department
More informationInterpolation of Functions Related to the Integer Factoring Problem
Interpolation of Functions Related to the Integer Factoring Problem Clemens Adelmann 1 and Arne Winterhof 2 1 Institut für Analysis und Algebra, Technische Universität Braunschweig, Pockelsstraße 14, D-38106
More informationG Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.
EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =
More informationCPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary
CPSC 531: Random Numbers Jonathan Hudson Department of Computer Science University of Calgary http://www.ucalgary.ca/~hudsonj/531f17 Introduction In simulations, we generate random values for variables
More informationFinite fields, randomness and complexity. Swastik Kopparty Rutgers University
Finite fields, randomness and complexity Swastik Kopparty Rutgers University This talk Three great problems: Polynomial factorization Epsilon-biased sets Function uncorrelated with low-degree polynomials
More informationLegendre s Equation. PHYS Southern Illinois University. October 18, 2016
Legendre s Equation PHYS 500 - Southern Illinois University October 18, 2016 PHYS 500 - Southern Illinois University Legendre s Equation October 18, 2016 1 / 11 Legendre s Equation Recall We are trying
More informationOne can use elliptic curves to factor integers, although probably not RSA moduli.
Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties
More informationPREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS
PREDICTING MASKED LINEAR PSEUDORANDOM NUMBER GENERATORS OVER FINITE FIELDS JAIME GUTIERREZ, ÁLVAR IBEAS, DOMINGO GÓMEZ-PEREZ, AND IGOR E. SHPARLINSKI Abstract. We study the security of the linear generator
More informationOn the Linear Complexity of Legendre-Sidelnikov Sequences
On the Linear Complexity of Legendre-Sidelnikov Sequences Ming Su Nankai University, China Emerging Applications of Finite Fields, Linz, Dec. 12 Outline Motivation Legendre-Sidelnikov Sequence Definition
More informationStream Ciphers. Çetin Kaya Koç Winter / 20
Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 20 Linear Congruential Generators A linear congruential generator produces a sequence of integers x i for i = 1,2,... starting with the given initial
More informationwith Good Cross Correlation for Communications and Cryptography
m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences
More information: Error Correcting Codes. November 2017 Lecture 2
03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial
More informationMath 120. Groups and Rings Midterm Exam (November 8, 2017) 2 Hours
Math 120. Groups and Rings Midterm Exam (November 8, 2017) 2 Hours Name: Please read the questions carefully. You will not be given partial credit on the basis of having misunderstood a question, and please
More informationElliptic Nets and Points on Elliptic Curves
Department of Mathematics Brown University http://www.math.brown.edu/~stange/ Algorithmic Number Theory, Turku, Finland, 2007 Outline Geometry and Recurrence Sequences 1 Geometry and Recurrence Sequences
More informationThe Graph Structure of Chebyshev Polynomials over Finite Fields and Applications
The Graph Structure of Chebyshev Polynomials over Finite Fields and Applications Claudio Qureshi and Daniel Panario arxiv:803.06539v [cs.dm] 7 Mar 08 Abstract We completely describe the functional graph
More informationSOLVING THE PELL EQUATION VIA RÉDEI RATIONAL FUNCTIONS
STEFANO BARBERO, UMBERTO CERRUTI, AND NADIR MURRU Abstract. In this paper, we define a new product over R, which allows us to obtain a group isomorphic to R with the usual product. This operation unexpectedly
More informationSub-Linear Root Detection for Sparse Polynomials Over Finite Fields
1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work
More informationFunctions on Finite Fields, Boolean Functions, and S-Boxes
Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More informationOn generalized Lucas sequences
Contemporary Mathematics On generalized Lucas sequences Qiang Wang This paper is dedicated to Professor G. B. Khosrovshahi on the occasion of his 70th birthday and to IPM on its 0th birthday. Abstract.
More informationPermutation Polynomials over Finite Fields
Permutation Polynomials over Finite Fields Omar Kihel Brock University 1 Finite Fields 2 How to Construct a Finite Field 3 Permutation Polynomials 4 Characterization of PP Finite Fields Let p be a prime.
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationA New Characterization of Semi-bent and Bent Functions on Finite Fields
A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department
More informationg(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series.
6 Polynomial Rings We introduce a class of rings called the polynomial rings, describing computation, factorization and divisibility in such rings For the case where the coefficients come from an integral
More information50 Algebraic Extensions
50 Algebraic Extensions Let E/K be a field extension and let a E be algebraic over K. Then there is a nonzero polynomial f in K[x] such that f(a) = 0. Hence the subset A = {f K[x]: f(a) = 0} of K[x] does
More informationLECTURE NOTES IN CRYPTOGRAPHY
1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic
More informationPolynomial Rings. (Last Updated: December 8, 2017)
Polynomial Rings (Last Updated: December 8, 2017) These notes are derived primarily from Abstract Algebra, Theory and Applications by Thomas Judson (16ed). Most of this material is drawn from Chapters
More informationHomework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn
Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn Problem 1: 4.4 # 2:x 3 + 8x 2 x 1 0 (mod 1331). a) x 3 + 8x 2 x 1 0 (mod 11). This does not break down, so trial and error gives: x = 0 : f(0)
More informationIdempotent and p-potent quadratic functions: distribution of nonlinearity and codimension
Downloaded from orbit.dtu.dk on: Oct 07, 2018 Idempotent and p-potent quadratic functions: distribution of nonlinearity and codimension Anbar Meidl, Nurdagül; Meidl, Wilfried Meidl; Topuzoglu, Alev Published
More informationChapter 7 Random Numbers
Chapter 7 Random Numbers February 15, 2010 7 In the following random numbers and random sequences are treated as two manifestations of the same thing. A series of random numbers strung together is considered
More informationCyclic Codes from the Two-Prime Sequences
Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes
More informationOn Irreducible Polynomial Remainder Codes
2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering
More informationNumber Theory in Cryptology
Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,
More informationOn the computation of the linear complexity and the k-error linear complexity of binary sequences with period a power of two
Loughborough University Institutional Repository On the computation of the linear complexity and the k-error linear complexity of binary sequences with period a power of two This item was submitted to
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has
More informationALGORITHMS FOR ALGEBRAIC CURVES
ALGORITHMS FOR ALGEBRAIC CURVES SUMMARY OF LECTURE 3 In this text the symbol Θ stands for a positive constant. 1. COMPLEXITY THEORY AGAIN : DETERMINISTIC AND PROBABILISTIC CLASSES We refer the reader to
More informationPRIMALITY TESTING. Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi. By TAHIRI JOUTI Kamal
PRIMALITY TESTING Professor : Mr. Mohammad Amin Shokrollahi Assistant : Mahdi Cheraghchi By TAHIRI JOUTI Kamal TABLE OF CONTENTS I- FUNDAMENTALS FROM NOMBER THEORY FOR RANDOMIZED ALGORITHMS:.page 4 1)
More informationPseudorandom Generators
8 Pseudorandom Generators Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 andomness is one of the fundamental computational resources and appears everywhere. In computer science,
More informationAlgebra for error control codes
Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22
More informationOn linear complexity of binary lattices
On linear complexity of binary lattices Katalin Gyarmati Eötvös Loránd University Department of Algebra and Number Theory H-1117 Budapest, Pázmány Péter sétány 1/C, Hungary e-mail: gykati@cs.elte.hu (corresponding
More informationCSCE 564, Fall 2001 Notes 6 Page 1 13 Random Numbers The great metaphysical truth in the generation of random numbers is this: If you want a function
CSCE 564, Fall 2001 Notes 6 Page 1 13 Random Numbers The great metaphysical truth in the generation of random numbers is this: If you want a function that is reasonably random in behavior, then take any
More informationCS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5
UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look
More informationSkew Cyclic Codes Of Arbitrary Length
Skew Cyclic Codes Of Arbitrary Length Irfan Siap Department of Mathematics, Adıyaman University, Adıyaman, TURKEY, isiap@adiyaman.edu.tr Taher Abualrub Department of Mathematics and Statistics, American
More informationIrreducible Polynomials over Finite Fields
Chapter 4 Irreducible Polynomials over Finite Fields 4.1 Construction of Finite Fields As we will see, modular arithmetic aids in testing the irreducibility of polynomials and even in completely factoring
More informationCOMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS
COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS ROBERT S. COULTER AND MARIE HENDERSON Abstract. Strong conditions are derived for when two commutative presemifields are isotopic. It is then shown that any commutative
More informationIdempotent Generators of Generalized Residue Codes
1 Idempotent Generators of Generalized Residue Codes A.J. van Zanten A.J.vanZanten@uvt.nl Department of Communication and Informatics, University of Tilburg, The Netherlands A. Bojilov a.t.bozhilov@uvt.nl,bojilov@fmi.uni-sofia.bg
More informationON THE INTERPOLATION OF BIVARIATE POLYNOMIALS RELATED TO THE DIFFIE-HELLMAN MAPPING. ElKE KlLTZ AND ARNE WlNTERHOF
BULL. AUSTRAL. MATH. SOC. VOL. 69 (2004) [305-315] 11TO6, 11T71, 68Q17 ON THE INTERPOLATION OF BIVARIATE POLYNOMIALS RELATE TO THE IFFIE-HELLMAN MAPPING ElKE KlLTZ AN ARNE WlNTERHOF We obtain lower bounds
More informationMTH310 EXAM 2 REVIEW
MTH310 EXAM 2 REVIEW SA LI 4.1 Polynomial Arithmetic and the Division Algorithm A. Polynomial Arithmetic *Polynomial Rings If R is a ring, then there exists a ring T containing an element x that is not
More informationPolynomial Rings. i=0
Polynomial Rings 4-15-2018 If R is a ring, the ring of polynomials in x with coefficients in R is denoted R[x]. It consists of all formal sums a i x i. Here a i = 0 for all but finitely many values of
More informationCCZ-equivalence and Boolean functions
CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence
More informationEE512: Error Control Coding
EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to
More informationIEEE P1363 / D9 (Draft Version 9). Standard Specifications for Public Key Cryptography
IEEE P1363 / D9 (Draft Version 9) Standard Specifications for Public Key Cryptography Annex A (informative) Number-Theoretic Background Copyright 1997,1998,1999 by the Institute of Electrical and Electronics
More informationLattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.
Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationHere, logx denotes the natural logarithm of x. Mrsky [7], and later Cheo and Yien [2], proved that iz;.(»)=^io 8 "0(i).
Curtis Cooper f Robert E* Kennedy, and Milo Renberg Dept. of Mathematics, Central Missouri State University, Warrensburg, MO 64093-5045 (Submitted January 1997-Final Revision June 1997) 0. INTRODUCTION
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationThe Hidden Root Problem
EPFL 2008 Definition of HRP Let F q k be a finite field where q = p n for prime p. The (Linear) Hidden Root Problem: let r N0 be given and x F q k hidden access to oracle Ox that given (a, b) F 2 q k returns
More informationarxiv: v1 [math.nt] 7 Sep 2015
THE ARITHMETIC OF CONSECUTIVE POLYNOMIAL SEQUENCES OVER FINITE FIELDS arxiv:1509.01936v1 [math.nt] 7 Sep 2015 DOMINGO GÓMEZ-PÉREZ, ALINA OSTAFE, AND MIN SHA Abstract. Motivated by a question of van der
More informationOn the Primitivity of some Trinomials over Finite Fields
On the Primitivity of some Trinomials over Finite Fields LI Yujuan & WANG Huaifu & ZHAO Jinhua Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China email: liyj@amss.ac.cn,
More informationIEEE P1363 / D13 (Draft Version 13). Standard Specifications for Public Key Cryptography
IEEE P1363 / D13 (Draft Version 13). Standard Specifications for Public Key Cryptography Annex A (Informative). Number-Theoretic Background. Copyright 1999 by the Institute of Electrical and Electronics
More informationDesign of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek
Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek The Graduate School Yonsei University Department of Electrical and Electronic Engineering Design of Filter
More information