Some approaches to construct MDS matrices over a finite field

Size: px
Start display at page:

Download "Some approaches to construct MDS matrices over a finite field"

Transcription

1 Å 31 Å 2 ¹ June 2017 Communication on Applied Mathematics and Computation Vol.31 No.2 DOI /j.issn Some approaches to construct MDS matrices over a finite field BELOV A V, LOS A B, ROZHKOV M I (National Research University Higher School of Economics, Moscow , Russia) Abstract The paper examines some approaches to construct the square maximum distance separable (MDS) matrices over a finite field. This class of matrices is widely used as diffuse maps when building block type cryptographic algorithms and hash functions. Some classes of circulant MDS matrices of size 4 4 and matrices with the maximum number of units are presented. Key words maximum distance separable (MDS) matrix; MDS code; data protection algorithms 2010 Mathematics Subject Classification 15B33 Chinese Library Classification O Ë MDS Ï Ç ÉÈ BELOV A V, LOS A B, ROZHKOV M I ( , ) ¼ MDS ÆÁ Æ À² Áà ±» ½ ¾ ³º ² 4 MDS Á «4 MDS Á ÌÎÆ MDS Á MDS µ ¾ 2010 Ê Í 15B33 Ð Ê Í O Å A ÄÍ (2017) Introduction The paper considers the problem of constructing a square n n matrix A = A n n over a finite field F q = GF(q), where the determinant of any square submatrix is nonzero. For such matrices, the set {(x, A x) x (F q ) n } is a linear code of dimension n, the block length of 2n and a minimum code distance n+1, i.e., this code achieves the upper bound of the singleton Received ; Revised Corresponding author BELOV A V, research interest is matrix theory. avbelov@hse.ru

2 144 Communication on Applied Mathematics and Computation Vol. 31 for the code distance and it is called the maximum distance separable (MDS) code. In this connection, the corresponding matrix A is called an MDS matrix. This class of matrices is widely used in the construction of the block type cryptographic algorithms and the hash functions of a data protection. To implement methods for constructing MDS matrices, an MDS matrix with a maximum number of elements equal to 1 and a minimal number of distinct elements not equal to 1 is considered. Matrices over the field GF(q) = GF(2 t ) are also considered. Now the most active researches are carried out for constructing MDS matrices of a special type, for example, circulant matrices (Hadamard matrices) [1-7]. The basic algebraic concepts used in the article are given in [8-9]. 1 Equivalent matrices It is a promising idea to build a whole class of MDS matrices {A} from the initial matrix A using just the transformations that preserve the MDS property. Examples of such transformations are the multiplication of the row (column) by an arbitrary nonzero element of the field, the permutation of rows (columns), and the transpose of the matrix. Definition 1 MDS matrices A and B are called equivalent (A B) if one of them can be obtained from the other by multiplying its rows and columns by nonzero elements of the field. For the MDS matrix M whose first row and column elements are units, let M be the submatrix obtained by deleting the first row and the first column of the matrix M. Statement 1 (i) Any MDS matrix A = (a ij ) is equivalent to the matrix whose first row and first column elements are units. (ii) Matrices A and B are equivalent if and only if A = B. (iii) Let M = (m ij ) be an n n MDS matrix. Then, the capacity of the containing equivalence class is equal to {M} = (q 1) 2n 1. Proof (i) follows from the fact that all elements of matrix A are different from zero (a ij 0). In one direction, (ii) is obvious. Let A B, p 1, p 2,, p n and q 1, q 2,, q n be the multipliers, respectively, of rows and columns of the matrix A to obtain the matrix B. In this case, we get p 1 q 1 = p 1 q 2 = = p 1 q n = 1, q 1 p 1 = q 1 p 2 = q 1 p 3 = = q 1 p n = 1. Therefore, if we divide the elements of the equality by p 1, we get q 1 = q 2 = = q n = (p 1 ) 1, p 2 = p 3 = p n = = p 1. Thus, the elements of the submatrix A do not change and A = B.

3 No. 2 BELOV A V, et al.: Some approaches to construct MDS matrices 145 Let us prove (iii). Given (i), without loss of generality, assume that the first row and column of the matrix M are units. Let p 1, p 2,, p n and q 1, q 2,, q n be the multipliers, respectively, of rows and columns of the matrix M, M 1 the transformed matrix, α, α 2, α 3,, α n elements of the first column and α, β 2, β 3,, β n elements of the first row of the matrix M 1. We get α = p 1 q 1, α i = q 1 p i, β i = p 1 q i, i = 2, 3,, n. Therefore, p i = p 1α i α, q i = q 1β i, i = 2, 3,, n. α Thus, for any set of nonzero elements α, α 2, α 3,, α n, β 2, β 3,, β n, the number of the sets is equal to (q 1) 2n 1, there are p 1, p 2,, p n and q 1, q 2,, q n which correspond to the specified set. If the elements α, α 2, α 3,, α n, β 2, β 3,, β n, are fixed, then the elements of the matrix M 1 = (b ij ) are completely determined by the specified items and the original matrix M, The proof is complete. ( p1 α i b ij = m ij p i q j = m ij α q1β ) j = m ij α ( αi β ) j. α In particular, for 2 2 matrices, representatives of the equivalence classes are the matrices of the form ( α ), α 0, α 1. The number of classes is q 2. The capacity of each class is (q 1) 3. 2 Circulant MDS matrices The circulant matrix M = cir(a 0, a 1,, a n 1 ) is uniquely determined by the polynomial f(x) = a 0 + a 1 x + a 2 x a n 1 x n 1. Coefficients of the polynomial are equal to the elements of the first row of the matrix. Note that det(m) 0 if and only if the polynomial f(x) is invertible in the ring F q [x]/(x n 1) of polynomials modulo a polynomial x n 1. In this case, the inverse matrix will also be circulant, i.e., M 1 = cir(b 0, b 1,, b n 1 ), where the first line coincides with the polynomial coefficients, g(x) = b 0 + b 1 x + b 2 x b n 1 x n 1, where g(x) is the inverse to the polynomial f(x), i.e., f(x) g(x) 1 mod (x n 1).

4 146 Communication on Applied Mathematics and Computation Vol. 31 In addition, without loss of generality, we can assume that a n 1 = 1 since any circulant matrix can be obtained from the matrix with a n 1 = 1 by nonzero element multiplication. Further, we consider the MDS matrix M = cir(a, b, c, 1) over a field GF(q), where q = p t, p is a prime number, a 0, b 0, and c 0. Conditions under which the 2 2 minors of matrix M are not equal to zero are a 2 b, ab c, a 2 c 2, ac 1, b 2 ac, bc a, b 2 1, c 2 b. Since b 2 1, the existence of the inverse matrix M 1, i.e., the mutual simplicity of the polynomials f(x) = a + bx + cx 2 + x 3 and x 4 1 is equivalent to the following relations: a + b + c + 1 0, a b + c 1 0, b /{1 + (a c)α 1, 1 + (a c)α 2 }, where α 1 and α 2 are the roots of the equation x = 0 in the field GF(q). The matrix M 1 is circulant. The conditions for the absence of zero elements in matrix M 1 are equivalent to the absence of such elements in one of its rows or columns. It is known that the elements of the first column of the matrix M 1, up to a nonzero multiplier equal to det(m), are given by minors of size 3 3 corresponding to the first row of the matrix M, namely a b c M 1 = 1 a b c 1 a, M 2 = 1 b c c a b b 1 a, M 3 = 1 a c c 1 b b c a, M 4 = 1 a b c 1 a. b c 1 Then, we get the following relations: det(m 1 ) = a 3 2ab + b 2 c ac 2 + c 0, ( a b 2 2 )b + a3 ac + 1 0, c c det(m 2 ) = b 3 2abc + a 2 + c 2 b 0, b 3 (2ac + 1)b + a 2 + c 2 0, det(m 3 ) = c 3 2bc a 2 c + ab 2 + a 0, ( c b 2 2 ac + a)b c3 a + 1 0, det(m 4 ) = a 2 b + bc 2 b 2 2ac + 1 0, b 2 (a 2 + c 2 )b + 2ac 1 0. Note that when a nonzero element a is fixed, one of the equations has a degree 3 (relatively unknown b), all others have degree 2. Thus, the full set of restrictions on the elements of the MDS matrix M has the following form: where c 0, a /A(c) = {0, ±c, c 1 }, b /B(a, c), B(a, c) = B 1 (a, c) B 2 (a, c) B 3 (a, c) B 4 (a, c), B 1 (a, c) = {0, ±1, (a + c + 1), a + c 1, a 2, c 2, ca 1, ac 1 };

5 No. 2 BELOV A V, et al.: Some approaches to construct MDS matrices 147 B 2 (a, c) = {± ac} = {±β}, where β is the root of the equation x 2 = ac in a field GF(q); B 3 (a, c) = {1 + (a c)α 1, 1 + (a c)α 2 }, where α 1 and α 2 are the roots of the equation x 2 +1 = 0 in a field GF(q); B 4 (a, c) is the set of roots of equations det(m i ) = 0 (i = 1, 2, 3, 4), where a and c are nonzero constants. For the sets, estimates of their power are 2 A(c) 4, 3 B 1 (a, c) 9, 0 B 2 (a, c) 2, 0 B 3 (a, c) 2, 0 B 4 (a, c) 9, 3 B(a, c) 22. get Then, for the total number K of choices a, b, c, and the corresponding MDS matrix, we (q 1)(q 4)(q 22) K (q 1)(q 2)(q 3). For the field GF(q = 2 t ), the above constraints are simplified. For the matrix M = cir(a, b, 1, 1), they take the form of det(m 1 ) = b 2 + a + a , det(m 2 ) = b 3 + b + a , det(m 3 ) = ab 2 + a 2 + a + 1 0, det(m 4 ) = b 2 + (a 2 + 1)b + 1 0, a /A = {0, 1}, b /B(a), where B(a) = B 1 (a) B 2 (a) B 3 (a) B 4 (a), B 1 (a) = {0, 1, a, a 2, a 1 }; B 2 (a) = {a S }, where S = q 2 (β = as is the root of the equation x 2 = a in a field GF(q)); B 3 (a) = ; B 4 (a) is the set of roots of equations det(m i ) = 0 (i = 1, 2, 3, 4), where a is a nonzero constant. For the sets, estimates of their power are A = 2, 3 B 1 (a) 5, B 2 (a) = 1, B 3 (a) = 0, 0 B 4 (a) 9, 3 B(a) 15. For the total number K of choices a, b, and the corresponding MDS matrix M = cir(a, b, 1, 1), we get (q 2)(q 15) K (q 2)(q 3). Assume that the elements of the field GF(2 t ) = F 2 [x]/f(x) are binary polynomials. The operations with these polynomials are carried out modulo an irreducible polynomial f(x) = f 0 + f 1 x + + f t 1 x t 1 + f t x t, f 0 = f t = 1

6 148 Communication on Applied Mathematics and Computation Vol. 31 over the field F 2. Theorem 1 Let GF(q) = GF(2 t ), t > 6. Then, M = cir(a, b, 1, 1) is an MDS matrix if one of the conditions occurs: (i) a = x + c (c F 2 ), b = a + 1; (ii) a = x + c (c F 2 ), b = x 2 + c + 1; (iii) a = x + c (c F 2 ), b = x 2 + x + ε (ε F 2 ); (iv) 1 deg(a(x)) = deg(b(x)) < t 1 3, a b. Proof Let one of conditions (i) (iv) hold. We substitute the pair (a(x), b(x)) in the polynomial det(m i ) for (a, b). Then, it is easy to verify that the degree of nonlinearity of any polynomial det(m i ) will be enclosed within 3 deg(det(m i )) t 2. Therefore, det(m i ) 0, i = 1, 2, 3, 4. The fulfillment of other conditions is checked directly. The proof is complete. b a, ab 1, b a 2, b 2 a Note 1 This statement remains valid for any irreducible polynomial f(x), deg(f) = t, t > 6, specifying the field GF(2 t ) = F 2 [x]/f(x). It follows from Theorem 1(i) that the MDS matrix of the form cir(a, b, 1, 1) is the case when a = x, b = x + 1, GF(2 t ) = F 2 [x]/f(x), f(x) is an irreducible binary polynomial of degree t > 6. For the case of the field GF(256), a similar example is given in [1] MDS matrix with maximum number of units It is known that the maximum number of unit elements of 4 4 MDS matrix is 9 and the minimum number of distinct non-unit elements is equal to 2 [1]. In this regard, we will explore the conditions under which the matrix M of the form a M = 1 a 1 b 1 b a b a is an MDS one. Considering the minors of the first and the second orders, we have restrictions on the elements of the matrix: a /{0, ±1}, b /{0, 1, a, a 1, a 2, ± a}.

7 No. 2 BELOV A V, et al.: Some approaches to construct MDS matrices 149 Consider the five submatrices of the third order: M 1 corresponds to deletion of the first row and the first column; M 2 corresponds to deletion of the first row and the second column; M 3 corresponds to deletion of the second row and the second column; M 4 corresponds to deletion of the second row and the third column; M 5 corresponds to deletion of the second row and the fourth column. The analysis shows that any of the 16 minors of the third order with the accuracy to a sign coincides with the determinant some of the preceding submatrix. In this case, the nonzero of all minors of the third order is equivalent to the followings: f 1 (a, b) = det(m 1 ) = a 3 + b 3 3ab + 1 0, f 2 (a, b) = det(m 2 ) = a 2 + b 2 ab a b + 1 0, f 3 (a, b) = det(m 3 ) = a 3 ab 2a + b + 1 0, f 4 (a, b) = det(m 4 ) = a 2 b 2a b + 2 0, f 5 (a, b) = det(m 5 ) = b 2 a a 2 2b + a Next, we have det(m) = (a 2 + ab + a 3)f 2 (a, b), f 3 (a, b) = (a 1)(a 2 + a b 1), f 4 (a, b) = (a 1)(ab + b 2). Hence, when a 0 and f 2 (a, b) 0, the condition det(m) 0 is equivalent to the inequality b 3a 1 a 1. Besides, when a ±1, the condition f 3 (a, b) 0 is equivalent to the inequality b a 2 + a 1, and the condition f 4 (a, b) 0 is equivalent to the inequality b 2(a + 1) 1. Note that M 1 is equal to cir(b, a, 1) up to permutation of the rows. Then, the condition f 1 (a, b) 0 is equivalent to the mutual simplicity of the polynomials b+ax+x 2 and x 3 1 = (x 1)(x 2 + x+1). Taking into account that a 1, this implies that f 1 (a, b) = det(m 1 ) 0 is equivalent to the following conditions: b (a + 1) and (b 1)(a 1) 1 is not a root of the equation x 2 + x + 1 = 0. The latter condition is equivalent to the relation f 2 (a, b) = a 2 + b 2 ab a b

8 150 Communication on Applied Mathematics and Computation Vol. 31 Thus, we have the full set of restrictions a /{0, ±1}, b /B(a) = B 1 (a) B 2 (a) B 3 (a) B 4 (a), where B 1 (a) = {0, 1, a, a 1, a 2, a 2 +a 1, (a+1), 2(a+1) 1, 3a 1 a 1}, B 2 (a) = {± a}, B 3 (a) is the set of solutions of the equation f 2 (a, b) = a 2 + b 2 ab a b + 1 = 0, B 4 (a) = {a 1 (1 + (a 1) a + 1), a 1 (1 (a 1) a + 1)} is the set of solutions of the equation f 5 (a, b) = b 2 a a 2 2b + a + 1 = 0 (relatively unknown b, element a is fixed). We have 3 B 1 (a) 9, 0 B 2 (a) 2, 0 B 3 (a) 2, 0 B 4 (a) 2, 3 B(a) 15. Hence, we have the total number K of pairs (a, b), resulting MDS matrix: (q 3)(q 15) K (q 2)(q 3). Theorem 2 Let GF(q) = GF(2 t ) = F 2 [x]/f(x), t 8, 1 deg(a(x)) 3, and 1 deg(b(x)) 2. Then, the matrix M is an MDS matrix if and only if one of the conditions is true: (i) a = x + c (c {0, 1}), b = x 2 + x; (ii) a = x 2, b {x + 1, x 2 + x, x 2 + x + 1}; (iii) a = x 2 + 1, b {x, x 2 + x, x 2 + x + 1}; (iv) a = x 2 + x + c (c {0, 1}), b {x, x + 1, x 2 + ε} (ε {0, 1}); (v) deg(a(x)) = 3, 1 deg(b(x)) 2. Proof The proof is a direct verification of the previously listed conditions. Bring it for the cases (iv) and (v). Let a = x 2 + x + c, b = x 2 + ε. Then, deg(b 2 a + a 2 + a + 1) = deg((x 2 + ε)(x 2 + x + c) + x 4 + x 2 + c + x 2 + x + c + 1) = deg(x 3 + cx 2 + ε(x 2 + x + c) + x + 1) = 3. Hence, the polynomial f 5 (a, b) = b 2 a+a 2 +a+1 has no null values. Similarly, deg(f 2 (a, b)) = deg(a 2 + b 2 + ab + a + b + 1) = 4 and the polynomial f 2 (a, b) has no null values either. Let deg(a(x)) = 3 and deg(b(x)) = 1. Then, deg(b 2 a+a 2 +a+1) = deg(a 2 ) = 6 and the polynomial f 5 (a, b) = b 2 a+a 2 +a+1 has no null values. Similarly, deg(a 2 +b 2 +ab+a+b+1) = 6 and the polynomial f 2 (a, b) has no null values either. Let deg(a(x)) = 3 and deg(b(x)) = 2. Then, we have deg(b 2 a + a 2 + a + 1) = 7. Thus the polynomial f 5 (a, b) has no null values. Similarly, deg(a 2 +b 2 +ab+a+b+1) = 6. Thus the polynomial f 2 (a, b) has no null values either.

9 No. 2 BELOV A V, et al.: Some approaches to construct MDS matrices 151 Conditions b /{a, a + 1, a 2, a 2 + a + 1}, b 2 a, ab 1 are checked directly. The remaining cases are treated in a similar way. Note 2 This statement is true for any irreducible polynomial f(x) specifying the field GF(2 t ) = F 2 [x]/f(x). An element a GF(q) is called quadratic non-residue if the equation x 2 = a has no solutions in the field GF(q). It is known when q is odd, half of the nonzero elements are quadratic non-residue. When q is even, equation specified above always has a solution (x = a q/2 ). Therefore, all elements of the field are quadratic residue. Theorem 3 Let each of the elements 3, 2, 5, 7 be the quadratic non-residue in the field GF(q), q = p t, p > 3. Suppose that for all a GF(q)\{0, ±1}, (a + 1) is quadratic non-residue and b = a + 1. Then, the matrix M is an MDS matrix. Proof The proof is carried out by checking the above general restrictions on the elements of the MDS matrix M. We will give some parts of it only. Let a + 1 = a 1. Then, a 2 + a 1 = 0, 4(a ) 2 = 5. 5 is a quadratic residue. Let a + 1 = a 2 + a 1. Then, a 2 = 2. 2 is a residue. Let a + 1 = 3a 1 a 1. Then, 2a 2 + 2a 3 = 0, 4(a ) 2 = 7. 7 is a residue. Similarly, it is established that a + 1 cannot coincide with any other element of the set B 1 (a). Let a + 1 = a. Then, a 2 + 2a + 1 = a, a 2 + a + 1 = 0, 4(a ) 2 = 3. 3 is a residue. Note that when (a, b) = (a, a + 1), the equality f 2 (a, b) = a 2 + b 2 ab a b + 1 = 0 is equivalent to the equality a 2 a + 1 = 0 which fails because 3 is a non-residue. We now show that the pair (a, b) = (a, a + 1) does not satisfy the equation f 5 (a, b) = b 2 a 2b a 2 + a + 1 = 0. If f 5 (a, b) = 0, we have b 2 a 2b a 2 + a + 1 = 0, b 2 2b a 1 a a 1 = 0, (b a 1 ) 2 = a + a 2 a 1 1 = a 2 (a 3 a 2 a + 1), (b a 1 ) 2 = a 2 (a 1)(a 2 1) = a 2 (a 1) 2 (a + 1), a 2 (a 1) 2 (b a 1 ) 2 = a + 1,

10 152 Communication on Applied Mathematics and Computation Vol. 31 a + 1 is a residue. This contradicts the conditions of the theorem. The examples of the fields GF(p) satisfying the conditions of the theorem are p = 293, p = 947, p = Conclusions The paper describes new classes of circulant 4 4 MDS matrices, and also matrices with the maximum number of units (nine) and the minimum number of distinct non-unit elements (two). Upper and lower estimates of the number of MDS matrices of the type in question for an arbitrary field GF(q) are obtained. The new classes of MDS matrices over the field GF(2 t ) whose elements (as binary polynomials) have a small degree of nonlinearity (Theorems 1 and 2) are constructed. For a field GF(q), the class of MDS matrices having only two non-unit elements a, b with the simplest analytical relationship b = a + 1 (Theorem 3) is described. It would be interesting to search for other simple (polynomial) connection between these elements preserving MDS property. References [1] Junod P, Vaudenay S. Perfect diffusion primitives for block ciphers: building efficient MDS matrices [M]// Handschuh H, Hasan M A. Proceedings of the 11th International Conference on Selected Areas in Cryptography. Heidelberg/Berlin: Springer-Verlag, 2004: [2] Augot D, Finiasz M. Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions [C]// Proceedings of the IEEE International Simposium on Information Theory (ISIT). New York: IEEE, 2013: [3] Gupta K C, Ray I G. On constructions of MDS matrices from companion matrices for lightweight cryptography [M]// Cuzzocrea A, Kittl C, Simos D E, Weippl E, Xu L. Security Engineering and Intelligence Informatics. Heidelberg/Berlin: Springer-Verlag, 2013: [4] Murtaza G, Ikram N. New methods of generating MDS matrices [C]// Proceedings of International Cryptology Workshop and Conference, [5] Markov V, Nechaev A. Generalized BCH-theorem and linear recursive MDS-codes [C]// Proceedings of 12th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT-2010), Novosibirsk, Russia, [6] Couselo E, Gonzalez S, Markov V, Nechaev A. Recursive MDS-codes and recursive differentiable quasigroups [J]. Discrete Math Appl, 1998, 8(3): [7] Couselo E, Gonzalez S, Markov V, Nechaev A. Parameters of recursive MDS-codes [J]. Discrete Math Appl, 2000, 10(5): [8] Lidl R, Niderrayter G. Konechnye Polya [M]. Moscow: Mir, (in Russian) [9] Berlekèmp È. Algebraicheskaya Teoriya Kodirovaniya [M]. Moscow: Mir, (in Russian)

Perfect Diffusion Primitives for Block Ciphers

Perfect Diffusion Primitives for Block Ciphers Perfect Diffusion Primitives for Block Ciphers Building Efficient MDS Matrices Pascal Junod and Serge Vaudenay École Polytechnique Fédérale de Lausanne (Switzerland) {pascaljunod, sergevaudenay}@epflch

More information

Finite Fields. Mike Reiter

Finite Fields. Mike Reiter 1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

Galois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a.

Galois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a. Galois fields 1 Fields A field is an algebraic structure in which the operations of addition, subtraction, multiplication, and division (except by zero) can be performed, and satisfy the usual rules. More

More information

Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes

Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Daniel Augot 1 and Matthieu Finiasz 2 1 INRIA - LIX UMR 7161 X-CNRS 2 CryptoExperts Abstract. MDS matrices allow to build

More information

Elementary maths for GMT

Elementary maths for GMT Elementary maths for GMT Linear Algebra Part 2: Matrices, Elimination and Determinant m n matrices The system of m linear equations in n variables x 1, x 2,, x n a 11 x 1 + a 12 x 2 + + a 1n x n = b 1

More information

Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes. Daniel Augot and Matthieu Finiasz

Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes. Daniel Augot and Matthieu Finiasz Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Daniel Augot and Matthieu Finiasz Context Diffusion layers in a block cipher/spn should: obviously, offer good diffusion,

More information

Chapter 4 Finite Fields

Chapter 4 Finite Fields Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 1 x 2. x n 8 (4) 3 4 2

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 1 x 2. x n 8 (4) 3 4 2 MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS SYSTEMS OF EQUATIONS AND MATRICES Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows. EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =

More information

Introduction to Modern Cryptography. (1) Finite Groups, Rings and Fields. (2) AES - Advanced Encryption Standard

Introduction to Modern Cryptography. (1) Finite Groups, Rings and Fields. (2) AES - Advanced Encryption Standard Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard +,0, and -a are only notations! Review - Groups Def (group): A set G with a binary

More information

Section VI.33. Finite Fields

Section VI.33. Finite Fields VI.33 Finite Fields 1 Section VI.33. Finite Fields Note. In this section, finite fields are completely classified. For every prime p and n N, there is exactly one (up to isomorphism) field of order p n,

More information

Criterion of maximal period of a trinomial over nontrivial Galois ring of odd characteristic

Criterion of maximal period of a trinomial over nontrivial Galois ring of odd characteristic Criterion of maximal period of a trinomial over nontrivial Galois ring of odd characteristic V.N.Tsypyschev and Ju.S.Vinogradova Russian State Social University, 4,W.Pik Str., Moscow, Russia Abstract In

More information

Linear Systems and Matrices

Linear Systems and Matrices Department of Mathematics The Chinese University of Hong Kong 1 System of m linear equations in n unknowns (linear system) a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.......

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

Criterion of period maximality of trinomial over nontrivial Galois ring of odd characteristic

Criterion of period maximality of trinomial over nontrivial Galois ring of odd characteristic Criterion of period maximality of trinomial over nontrivial Galois ring of odd characteristic V.N.Tsypyschev 1,, Ju.S.Vinogradova 1 a Russian State Social University, 4,W.Pik Str., Moscow, Russia Abstract

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

Chapter 4 Mathematics of Cryptography

Chapter 4 Mathematics of Cryptography Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers

Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers Zhiyuan Guo 1,2, Renzhang Liu 3, Wenling Wu 1,2, and Dongdai Lin 3 1 Institute of Software, Chinese Academy of Sciences, Beijing,

More information

Reducing the Complexity of Normal Basis Multiplication

Reducing the Complexity of Normal Basis Multiplication Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper

More information

Gurgen Khachatrian Martun Karapetyan

Gurgen Khachatrian Martun Karapetyan 34 International Journal Information Theories and Applications, Vol. 23, Number 1, (c) 2016 On a public key encryption algorithm based on Permutation Polynomials and performance analyses Gurgen Khachatrian

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

Quasi-reducible Polynomials

Quasi-reducible Polynomials Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let

More information

William Stallings Copyright 2010

William Stallings Copyright 2010 A PPENDIX E B ASIC C ONCEPTS FROM L INEAR A LGEBRA William Stallings Copyright 2010 E.1 OPERATIONS ON VECTORS AND MATRICES...2 Arithmetic...2 Determinants...4 Inverse of a Matrix...5 E.2 LINEAR ALGEBRA

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes

Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes Cauchois Victor 1 Loidreau Pierre 1 Merkiche Nabil 23 1 DGA-MI / IRMAR 2 DGA-IP 3 Sorbonnes Université, UPMC, LIP6

More information

Mathematical Foundations of Cryptography

Mathematical Foundations of Cryptography Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

A Polynomial Description of the Rijndael Advanced Encryption Standard

A Polynomial Description of the Rijndael Advanced Encryption Standard A Polynomial Description of the Rijndael Advanced Encryption Standard arxiv:cs/0205002v1 [cs.cr] 2 May 2002 Joachim Rosenthal Department of Mathematics University of Notre Dame Notre Dame, Indiana 46556,

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has

More information

Three Ways to Test Irreducibility

Three Ways to Test Irreducibility Three Ways to Test Irreducibility Richard P. Brent Australian National University joint work with Paul Zimmermann INRIA, Nancy France 12 Feb 2009 Outline Polynomials over finite fields Irreducibility criteria

More information

Least Period of Linear Recurring Sequences over a Finite Field

Least Period of Linear Recurring Sequences over a Finite Field Degree Project Least Period of Linear Recurring Sequences over a Finite Field 2012-02-29 Author: Sajid Hanif Subject: Mathematics Level: Master Course code: 5MA12E Abstract This thesis deals with fundamental

More information

Math 312/ AMS 351 (Fall 17) Sample Questions for Final

Math 312/ AMS 351 (Fall 17) Sample Questions for Final Math 312/ AMS 351 (Fall 17) Sample Questions for Final 1. Solve the system of equations 2x 1 mod 3 x 2 mod 7 x 7 mod 8 First note that the inverse of 2 is 2 mod 3. Thus, the first equation becomes (multiply

More information

MATRICES AND MATRIX OPERATIONS

MATRICES AND MATRIX OPERATIONS SIZE OF THE MATRIX is defined by number of rows and columns in the matrix. For the matrix that have m rows and n columns we say the size of the matrix is m x n. If matrix have the same number of rows (n)

More information

1 Multiply Eq. E i by λ 0: (λe i ) (E i ) 2 Multiply Eq. E j by λ and add to Eq. E i : (E i + λe j ) (E i )

1 Multiply Eq. E i by λ 0: (λe i ) (E i ) 2 Multiply Eq. E j by λ and add to Eq. E i : (E i + λe j ) (E i ) Direct Methods for Linear Systems Chapter Direct Methods for Solving Linear Systems Per-Olof Persson persson@berkeleyedu Department of Mathematics University of California, Berkeley Math 18A Numerical

More information

Math Camp Lecture 4: Linear Algebra. Xiao Yu Wang. Aug 2010 MIT. Xiao Yu Wang (MIT) Math Camp /10 1 / 88

Math Camp Lecture 4: Linear Algebra. Xiao Yu Wang. Aug 2010 MIT. Xiao Yu Wang (MIT) Math Camp /10 1 / 88 Math Camp 2010 Lecture 4: Linear Algebra Xiao Yu Wang MIT Aug 2010 Xiao Yu Wang (MIT) Math Camp 2010 08/10 1 / 88 Linear Algebra Game Plan Vector Spaces Linear Transformations and Matrices Determinant

More information

New Construction of Single Cycle T-function Families

New Construction of Single Cycle T-function Families New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

Rings. EE 387, Notes 7, Handout #10

Rings. EE 387, Notes 7, Handout #10 Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for

More information

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases 1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Linear Algebra and Vector Analysis MATH 1120

Linear Algebra and Vector Analysis MATH 1120 Faculty of Engineering Mechanical Engineering Department Linear Algebra and Vector Analysis MATH 1120 : Instructor Dr. O. Philips Agboola Determinants and Cramer s Rule Determinants If a matrix is square

More information

Mathematical Olympiad Training Polynomials

Mathematical Olympiad Training Polynomials Mathematical Olympiad Training Polynomials Definition A polynomial over a ring R(Z, Q, R, C) in x is an expression of the form p(x) = a n x n + a n 1 x n 1 + + a 1 x + a 0, a i R, for 0 i n. If a n 0,

More information

Chapter 1 Vector Spaces

Chapter 1 Vector Spaces Chapter 1 Vector Spaces Per-Olof Persson persson@berkeley.edu Department of Mathematics University of California, Berkeley Math 110 Linear Algebra Vector Spaces Definition A vector space V over a field

More information

On complete permutation polynomials 1

On complete permutation polynomials 1 Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 57 62 On complete permutation polynomials 1 L. A. Bassalygo

More information

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Prof. Tesler Math 283 Fall 2018 Also see the separate version of this with Matlab and R commands. Prof. Tesler Diagonalizing

More information

Stream Ciphers and Number Theory

Stream Ciphers and Number Theory Stream Ciphers and Number Theory Revised Edition Thomas W. Cusick The State University of New York at Buffalo, NY, U.S.A. Cunsheng Ding The Hong Kong University of Science and Technology China Ari Renvall

More information

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Prof. Tesler Math 283 Fall 2016 Also see the separate version of this with Matlab and R commands. Prof. Tesler Diagonalizing

More information

Matrix operations Linear Algebra with Computer Science Application

Matrix operations Linear Algebra with Computer Science Application Linear Algebra with Computer Science Application February 14, 2018 1 Matrix operations 11 Matrix operations If A is an m n matrix that is, a matrix with m rows and n columns then the scalar entry in the

More information

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162 COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication

More information

AES side channel attacks protection using random isomorphisms

AES side channel attacks protection using random isomorphisms Rostovtsev A.G., Shemyakina O.V., St. Petersburg State Polytechnic University AES side channel attacks protection using random isomorphisms General method of side-channel attacks protection, based on random

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

Review of Vectors and Matrices

Review of Vectors and Matrices A P P E N D I X D Review of Vectors and Matrices D. VECTORS D.. Definition of a Vector Let p, p, Á, p n be any n real numbers and P an ordered set of these real numbers that is, P = p, p, Á, p n Then P

More information

Groups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002

Groups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002 Background on Groups, Rings, and Finite Fields Andreas Klappenecker September 12, 2002 A thorough understanding of the Agrawal, Kayal, and Saxena primality test requires some tools from algebra and elementary

More information

Algebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example.

Algebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example. Coding Theory Massoud Malek Algebra Congruence Relation The definition of a congruence depends on the type of algebraic structure under consideration Particular definitions of congruence can be made for

More information

Jim Lambers MAT 610 Summer Session Lecture 1 Notes

Jim Lambers MAT 610 Summer Session Lecture 1 Notes Jim Lambers MAT 60 Summer Session 2009-0 Lecture Notes Introduction This course is about numerical linear algebra, which is the study of the approximate solution of fundamental problems from linear algebra

More information

ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3

ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ISSUED 24 FEBRUARY 2018 1 Gaussian elimination Let A be an (m n)-matrix Consider the following row operations on A (1) Swap the positions any

More information

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

M 2 + s 2. Note that the required matrix A when M 2 + s 2 was also obtained earlier by Gordon [2]. (2.2) x -alxn-l-aex n-2 an

M 2 + s 2. Note that the required matrix A when M 2 + s 2 was also obtained earlier by Gordon [2]. (2.2) x -alxn-l-aex n-2 an SIAM J. ALG. DISC. METH. Vol. 1, No. 1, March 1980 1980 Society for. Industrial and Applied Mathematics 0196-52/80/0101-0014 $01.00/0 ON CONSTRUCTION OF MATRICES WITH DISTINCT SUBMATRICES* SHARAD V. KANETKAR"

More information

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group.

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group. Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Lecture Notes in Linear Algebra

Lecture Notes in Linear Algebra Lecture Notes in Linear Algebra Dr. Abdullah Al-Azemi Mathematics Department Kuwait University February 4, 2017 Contents 1 Linear Equations and Matrices 1 1.2 Matrices............................................

More information

Math Linear Algebra Final Exam Review Sheet

Math Linear Algebra Final Exam Review Sheet Math 15-1 Linear Algebra Final Exam Review Sheet Vector Operations Vector addition is a component-wise operation. Two vectors v and w may be added together as long as they contain the same number n of

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

Commutative Rings and Fields

Commutative Rings and Fields Commutative Rings and Fields 1-22-2017 Different algebraic systems are used in linear algebra. The most important are commutative rings with identity and fields. Definition. A ring is a set R with two

More information

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8 Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................

More information

EE512: Error Control Coding

EE512: Error Control Coding EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to

More information

Lightweight Multiplication in GF (2 n ) with Applications to MDS Matrices

Lightweight Multiplication in GF (2 n ) with Applications to MDS Matrices Lightweight Multiplication in GF (2 n ) with Applications to MDS Matrices Christof Beierle, Thorsten Kranz, and Gregor Leander Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany {christof.beierle,

More information

B. Encryption using quasigroup

B. Encryption using quasigroup Sequence Randomization Using Quasigroups and Number Theoretic s Vaignana Spoorthy Ella Department of Computer Science Oklahoma State University Stillwater, Oklahoma, USA spoorthyella@okstateedu Abstract

More information

Fundamental Theorem of Algebra

Fundamental Theorem of Algebra EE 387, Notes 13, Handout #20 Fundamental Theorem of Algebra Lemma: If f(x) is a polynomial over GF(q) GF(Q), then β is a zero of f(x) if and only if x β is a divisor of f(x). Proof: By the division algorithm,

More information

Three Ways to Test Irreducibility

Three Ways to Test Irreducibility Outline Three Ways to Test Irreducibility Richard P. Brent Australian National University joint work with Paul Zimmermann INRIA, Nancy France 8 Dec 2008 Polynomials over finite fields Irreducibility criteria

More information

Graduate Mathematical Economics Lecture 1

Graduate Mathematical Economics Lecture 1 Graduate Mathematical Economics Lecture 1 Yu Ren WISE, Xiamen University September 23, 2012 Outline 1 2 Course Outline ematical techniques used in graduate level economics courses Mathematics for Economists

More information

Homework 10 M 373K by Mark Lindberg (mal4549)

Homework 10 M 373K by Mark Lindberg (mal4549) Homework 10 M 373K by Mark Lindberg (mal4549) 1. Artin, Chapter 11, Exercise 1.1. Prove that 7 + 3 2 and 3 + 5 are algebraic numbers. To do this, we must provide a polynomial with integer coefficients

More information

Undergraduate Mathematical Economics Lecture 1

Undergraduate Mathematical Economics Lecture 1 Undergraduate Mathematical Economics Lecture 1 Yu Ren WISE, Xiamen University September 15, 2014 Outline 1 Courses Description and Requirement 2 Course Outline ematical techniques used in economics courses

More information

OR MSc Maths Revision Course

OR MSc Maths Revision Course OR MSc Maths Revision Course Tom Byrne School of Mathematics University of Edinburgh t.m.byrne@sms.ed.ac.uk 15 September 2017 General Information Today JCMB Lecture Theatre A, 09:30-12:30 Mathematics revision

More information

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under

More information

Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices

Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices Operator Theory: Advances and Applications, Vol 1, 1 13 c 27 Birkhäuser Verlag Basel/Switzerland Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices Tom Bella, Vadim

More information

Lemma 8: Suppose the N by N matrix A has the following block upper triangular form:

Lemma 8: Suppose the N by N matrix A has the following block upper triangular form: 17 4 Determinants and the Inverse of a Square Matrix In this section, we are going to use our knowledge of determinants and their properties to derive an explicit formula for the inverse of a square matrix

More information

Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair. Corrections and clarifications

Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair. Corrections and clarifications 1 Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair Corrections and clarifications Note: Some corrections were made after the first printing of the text. page 9, line 8 For of the

More information

Materials engineering Collage \\ Ceramic & construction materials department Numerical Analysis \\Third stage by \\ Dalya Hekmat

Materials engineering Collage \\ Ceramic & construction materials department Numerical Analysis \\Third stage by \\ Dalya Hekmat Materials engineering Collage \\ Ceramic & construction materials department Numerical Analysis \\Third stage by \\ Dalya Hekmat Linear Algebra Lecture 2 1.3.7 Matrix Matrix multiplication using Falk s

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Problem Set (T) If A is an m n matrix, B is an n p matrix and D is a p s matrix, then show

Problem Set (T) If A is an m n matrix, B is an n p matrix and D is a p s matrix, then show MTH 0: Linear Algebra Department of Mathematics and Statistics Indian Institute of Technology - Kanpur Problem Set Problems marked (T) are for discussions in Tutorial sessions (T) If A is an m n matrix,

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Rings. Chapter 1. Definition 1.2. A commutative ring R is a ring in which multiplication is commutative. That is, ab = ba for all a, b R.

Rings. Chapter 1. Definition 1.2. A commutative ring R is a ring in which multiplication is commutative. That is, ab = ba for all a, b R. Chapter 1 Rings We have spent the term studying groups. A group is a set with a binary operation that satisfies certain properties. But many algebraic structures such as R, Z, and Z n come with two binary

More information

On transitive polynomials modulo integers

On transitive polynomials modulo integers Notes on Number Theory and Discrete Mathematics Print ISSN 1310 5132, Online ISSN 2367 8275 Vol. 22, 2016, No. 2, 23 35 On transitive polynomials modulo integers Mohammad Javaheri 1 and Gili Rusak 2 1

More information

Introduction to Matrix Algebra

Introduction to Matrix Algebra Introduction to Matrix Algebra August 18, 2010 1 Vectors 1.1 Notations A p-dimensional vector is p numbers put together. Written as x 1 x =. x p. When p = 1, this represents a point in the line. When p

More information

Solution to Homework 8, Math 2568

Solution to Homework 8, Math 2568 Solution to Homework 8, Math 568 S 5.4: No. 0. Use property of heorem 5 to test for linear independence in P 3 for the following set of cubic polynomials S = { x 3 x, x x, x, x 3 }. Solution: If we use

More information

EE512: Error Control Coding

EE512: Error Control Coding EE512: Error Control Coding Solution for Assignment on Cyclic Codes March 22, 2007 1. A cyclic code, C, is an ideal genarated by its minimal degree polynomial, g(x). C = < g(x) >, = {m(x)g(x) : m(x) is

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

On permutation automorphism groups of q-ary Hamming codes

On permutation automorphism groups of q-ary Hamming codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 28, Pamporovo, Bulgaria pp. 119-124 On permutation automorphism groups of q-ary Hamming codes Evgeny V. Gorkunov

More information

Matrix Arithmetic. j=1

Matrix Arithmetic. j=1 An m n matrix is an array A = Matrix Arithmetic a 11 a 12 a 1n a 21 a 22 a 2n a m1 a m2 a mn of real numbers a ij An m n matrix has m rows and n columns a ij is the entry in the i-th row and j-th column

More information

MATH2210 Notebook 2 Spring 2018

MATH2210 Notebook 2 Spring 2018 MATH2210 Notebook 2 Spring 2018 prepared by Professor Jenny Baglivo c Copyright 2009 2018 by Jenny A. Baglivo. All Rights Reserved. 2 MATH2210 Notebook 2 3 2.1 Matrices and Their Operations................................

More information

On one class of permutation polynomials over finite fields of characteristic two *

On one class of permutation polynomials over finite fields of characteristic two * On one class of permutation polynomials over finite fields of characteristic two * Leonid Bassalygo, Victor A. Zinoviev To cite this version: Leonid Bassalygo, Victor A. Zinoviev. On one class of permutation

More information