Affinity of permutations of F n 2

Size: px
Start display at page:

Download "Affinity of permutations of F n 2"

Transcription

1 Discrete Applied Mathematics 54 (6) Affinity of permutations of F n Xiang-dong Hou Department of Mathematics and Statistics, Wright State University, Dayton, OH 45435, USA Received 5 June 3; received in revised form August 3; accepted March 5 Available online 6 September 5 Abstract It was conjectured that if n is even, then every permutation of F n is affine on some -dimensional affine subspace of Fn. We prove that the conjecture is true for n = 4, for quadratic permutations of F n and for permutation polynomials of F n with coefficients in F n/. The conjecture is actually a claim about (AGL(n, ), AGL(n, ))-double cosets in permutation group S(F n ) of Fn.Wegivea formula for the number of (AGL(n, ), AGL(n, ))-double cosets in S(F n ) and classify the (AGL(4, ), AGL(4, ))-double cosets in S(F 4 ). 5 Elsevier B.V. All rights reserved. Keywords: Almost perfect nonlinear function; General affine group; General linear group; Permutation group; Quadratic function. Introduction Let F q be the finite field with q elements. In a bloc cipher, the ciphertext of a plaintext x F n is obtained by applying a composition of several round functions to x; each round function is a permutation of F n. Let σ : Fn Fn be such a round function. To resist differential cryptanalysis, the distribution of the values of the function σ(x + a)+ σ(x) should be as uniform as possible for every = a F n [9]. A function σ : Fn Fn is called almost perfect nonlinear (APN) if for every a,b F n with a =, the equation σ(x + a) + σ(x) = b has either or solutions x F n []. Therefore, ideal candidates for round functions are permutations of Fn which are APN. When n is odd, such permutations exist. For an easy example, one can identify F n with F n and let σ(x) = x3 []. For a survey of nown APN power functions, see Dobbertin [4]. For even n, no APN permutation of F n is nown. The following conjecture is sometimes referred to as the APN conjecture. Conjecture.. If n is even and σ is a permutation of F n, then σ is not APN. address: xhou@mail.cas.usf.edu. Research supported by NSA Grant MDA Current address: Department of Mathematics, University of South Florida, Tampa, FL 336, USA 66-8X/$ - see front matter 5 Elsevier B.V. All rights reserved. doi:.6/j.dam.5.3.

2 34 X.-d. Hou / Discrete Applied Mathematics 54 (6) The author became aware of the conjecture at theyacc conference in where he had a discussion with Canteaut and Dobbertin []. The problem was implicitly studied in [].In[3], the existence of APN permutations of F n for even n was raised as an open problem. Conjecture. can be formulated in terms of affinity of permutations of F n on -dimensional affine subspaces. Recall that for affine spaces A and B over F, a map σ : A B is called affine if σ(a + a + a 3 ) = σ(a ) + σ(a ) + σ(a 3 ) for all a,a,a 3 A. We observe that σ : F n Fn is APN if and only if σ is not affine on any -dimensional affine subspace of F n. In fact, assume that σ is affine on a -dimensional affine subspace {a,a,a 3,a + a + a 3 } F n. Let σ(a i ) = b i ( i 3). Then σ(a + a + a 3 ) = b + b + b 3. It follows that σ(x + a + a ) + σ(x) = b + b for all x A. Hence σ is not APN. On the other hand, assume that for some a F n \{}, there exist distinct elements x,x,x 3 F n such that σ(x i + a) + σ(x i ) = σ(x j + a) + σ(x j ) for all i, j 3. Since either x + x = a or x + x 3 = a, we may assume that x + x = a. Thus A ={x,x,x + a,x + a} is a -dimensional affine subspace of F n. Since σ(x + a) + σ(x ) = σ(x + a) + σ(x ), σ is affine on A. Therefore, Conjecture. is equivalent to Conjecture.. Let n be even and let σ be a permutation of F n. Then there is a -dimensional affine subspace A of Fn such that σ(a) is a -dimensional affine subspace of F n. We now introduce some notation. Let { } A b AGL(n, ) = : A GL(n, ), b F n be the general affine group. The action of AGL(n, ) on F n is given by A b (x) = Ax + b for x F n. Let S(F n ) be the group of all permutations of Fn. For any X Fn, the stabilizer of X in S(Fn ) is S X ={σ S(F n ) : σ X = id}. We observe that Conjecture. is equivalent to Conjecture.3. Let A ={(x,x,,...,) T : x i F } F n. When n is even, S(F n ) = AGL(n, ) S A AGL(n, ). (.) (In (.), the multiplication is the operation of the group S(F n ).) To see that Conjecture.3 implies Conjecture., note that every σ S(F n ) can be written as σ = h τ g where g, h AGL(,n) and τ S A. Then σ maps a -dimensional affine subspace g (A ) to a -dimensional affine subspace h(a ). To see that Conjecture. implies Conjecture.3, assume that σ S(F n ) such that σ(a ) = A for some -dimensional subspaces A and A. Then there exist g, h AGL(n, ) such that g(a ) = A and h(a ) = A, hence h σ g(a ) = A. Furthermore, we can choose h suitably such that h σ g A = id, i.e., h σ g S A. In this paper, we report some partial results on the above conjectures and suggest a group theoretic approach to the problem.

3 X.-d. Hou / Discrete Applied Mathematics 54 (6) Section contains some miscellaneous results. We prove that Conjecture. is true for n = 4. We also show that the normalizers of AGL(n, ) and GL(n, ) in S(F n ) are themselves. In Section 3, we prove that Conjecture. is true for permutation polynomials of F n with coefficients in F n/. In Section 4, we study the affinity of elements in S(F n ) using directional derivatives. In particular, we show that Conjecture. is true for permutations of F n with at least n quadratic component functions. Conjecture. for quadratic permutations of F n was proved by Nyberg in [8]. Recall the if H and K are subgroups of a group G and g G, the (H, K)-double coset with representative g is HgK. Eq. (.) means that every (AGL(n, ), AGL(n, ))-double coset in S(F n ) has a representative in S A. This suggests the importance of the structure of (AGL(n, ), AGL(n, ))-double cosets in S(F n ). In Section 5, we give a formula for computing the number of (AGL(n, q), AGL(n, q))-double cosets in S(F n q ). The number of (AGL(4, ), AGL(4, ))- double cosets in S(F 4 ) is 3; the number of (AGL(5, ), AGL(5, ))-double cosets in S(F5 ) is astronomical. In Section 6, we find the representatives for the 3 (AGL(4, ), AGL(4, ))-double cosets in S(F 4 ) using a computer. This classification answers all questions about affinity of permutations of F 4.. Miscellaneous results Since there are counter examples to Conjectures..3 for odd n, one might hope to use them to build a counter example to the conjectures for even n. However, the following proposition shows that this approach is not liely to be easy. Proposition.. Let A ={[ v ]:v Fn } F n. Assume that σ S(Fn ) such that σ(a) = A. Then σ is not APN. Proof. Assume to the contrary that σ is not affine on any -dimensional subspace. Let () () σ =, σ =, v F n v α(v) v β(v), where α and β are permutations of F n. Then α and β are not affine on any -dimensional subspace of F n. Fix any = a F n. The map v α(v) + α(v + a) is -to- from F n to F n \{}. (Otherwise, α would be affine on a -dimensional affine subspace of F n.) Let D(α) ={α(v) + α(v + a) : v F n } F n \{}. Then D(α) = n. In the same way, D(β) F n \{} and D(β) = n. Hence D(α) D(β) =, i.e., α(u) + α(u + a) = β(v) + β(v + a) for some u, v F n. Then σ is affine on the -dimensional affine subspace { },,,. u u + a v v + a By a -frame, we mean an affinely independent subset X F n with X = +, i.e., a ( + )-element subset of F n which spans a -dimensional affine subspace. If X and Y are two -frames of Fn, then any bijection σ : X Y can be extended to an element in AGL(n, ). Lemma.. (i) Let σ S(F n ). Then there exists an n-frame X Fn such that σ(x) is also an n-frame. (ii) Let e,...,e n be the standard basis of F n and let e = F n. Then S(F n ) = AGL(n, ) S {e,e,...,e n } AGL(n, ), where S {e,e,...,e n } is the stabilizer of {e,e,...,e n }.

4 36 X.-d. Hou / Discrete Applied Mathematics 54 (6) Proof. (i) By induction, we show that for every n, there exists a -frame X F n such that σ(x ) is also a -frame. The claim is obviously true for =,. Assume that <nand that X is a -frame of F n such that σ(x ) is also a -frame of F n. Let X af be the affine span of X and consider the map Since σ : F n \ X af F n \σ(x ). σ(f n \ X af ) + F n \ σ(x ) af =( n )> n ( + ) = F n \σ(x ), we have σ(f n \ X af ) (F n \ σ(x ) af ) =, i.e., there exists x F n \ X af such that σ(x) / σ(x ) af. Put X + = X {x}. Then both X + and σ(x + ) are ( + )-frames in F n. (ii) For each σ S(F n ), by (i), there is an n-frame {x,...,x n } F n such that {σ(x ),...,σ(x n )} is also an n-frame. Choose g, h AGL(n, ) such that g(e i ) = x i and h(f (x i )) = e i for all i n. Then h σ g S {e,...,e n }, hence σ AGL(n, ) S {e,...,e n } AGL(n, ). Theorem.3. Conjecture. is true for n = 4. Proof. By Lemma. (ii), we only have to prove Conjecture. for σ S {e,e,...,e 4 }, i.e., for permutations of F 4 which stabilize e i ( i 4). There are! such permutations and the claim is easily verified using a computer. The theorem also follows from the classification of (AGL(4, ), AGL(4, ))-double cosets in S(F 4 ) in Section 6. For σ, τ S(F n ), we say σ and τ are equivalent (σ τ) ifσ and τ are in the same (AGL(n, ), AGL(n, ))-double coset of S(F n ). Corollary.4. Letnbeeven, σ S(F n ), and identify Fn with F n. Then σ is not APN if one of the following is true. (i) σ τ for some permutation polynomial τ of F n such that τ F [x]. (ii) 4 n and σ τ for some permutation polynomial of τ of F n such that τ F 4[x]. Proof. (i) is obvious since τ maps F to F. (ii) Observe that τ maps F 4 to F 4. Hence τ F 4 S(F 4). By Theorem.3, τ F 4 is not APN, hence τ is not APN. Proposition.5. The normalizer of AGL(n, ) in S(F n ) is AGL(n, ). Proof. Since AGL(, )=S(F ), we may assume that n 3.Assume to the contrary that there is a σ S(Fn )\AGL(n, ) such that σ AGL(n, )σ = AGL(n, ). Then there exists a -dimensional affine subspace A F n such that σ(a) is not a -dimensional affine subspace, i.e., σ(a) is a 3-frame. By Lemma. (i), there is a 3-frame X F n such that σ (X) is also a 3-frame. Choose a g AGL(n, ) such that g(σ(a)) = X. Since σ g σ(a) = σ (X), which is not affine, we have σ g σ / AGL(n, ), which is a contradiction. Proposition.6. The normalizer of GL(n, ) in S(F n ) is GL(n, ). Proof. Again we may assume n 3. Let σ S(F n ) such that σ GL(n, )σ = GL(n, ). First we have σ() =. (Otherwise, choose g GL(n, ) such that g(σ()) = σ(). Then σ g σ() =, which is a contradiction.) Assume to the contrary that σ / GL(n, ). Then there exist a,b F n \{}, a = b, such that σ(a), σ(b), σ(a + b) are linearly independent. The number of 3-element linearly independent subsets of F n \{} is 3! (n )( n )( n 4), which is greater than ( n 3 ). Thus there is a 3-element linearly independent subset X F n \{} such that σ (X) is also a 3-element linearly independent subset. Choose g GL(n, ) such that g({σ(a), σ(b), σ(a + b)}) = X. Since σ g σ({a,b,a + b}) = X,wehaveσ g σ / GL(n, ), which is a contradiction.

5 X.-d. Hou / Discrete Applied Mathematics 54 (6) Permutation polynomials of F m with coefficients in F m Theorem 3.. If σ is a permutation polynomial of F m such that σ F m[x], then σ is not APN. Proof. Assume to the contrary that σ is APN. Let ρ be the generator of the Galois group Gal(F m/f m). Then we have σ ρ = ρ σ. The set F m\f m is partitioned into ρ-orbits of size. The ρ-orbit of x F m\f m, i.e., {x,ρ(x)}, is denoted by [x]. Fix an x F m\f m and let y = Tr F m /F m (x ). Put A ={[x + x] :x F m} and define : A F m\{}, [x + x] Tr F m /F m (σ(x + x)). We claim that is. Otherwise, there exist x,y F m such that [x + x] = [x + y],but ([x + x]) = ([x + y]). Let A ={x + x,ρ(x + x),x + y,ρ(x + y)}. Then (x + x) + ρ(x + x) + (x + y) + ρ(x + y) = and σ(x + x) + σ(ρ(x + x)) + σ(x + y) + σ(ρ(x + y)) = σ(x + x) + ρ(σ(x + x)) + σ(x + y) + ρ(σ(x + y)) = ([x + x]) + ([x + y]) =. Hence both A and σ(a) are -dimensional affine subspaces, which is a contradiction. Also put B ={{x,x + y }:x F m} and define ψ : B F m\{}, {x,x + y } σ(x) + σ(x + y ). we claim that ψ is also. Otherwise, there exist x,y F m such that {x,x + y } = {y,y + y },butψ({x,x + y }) = ψ({y,y + y }). Let B ={x,x + y,y,y+ y }. Since σ(x) + σ(x + y ) + σ(y) + σ(y + y ) = ψ({x,x + y }) + ψ({y,y + y }) =, both B and σ(b) are -dimensional affine subspaces, which is a contradiction. Since A = B = m and (A) ψ(b) F m\{}, we must have (A) ψ(b) =, namely, there exist x,y F m such that ([x + x]) = ψ({y,y + y }). Let C ={x + x,ρ(x + x),y,y+ y }. It is easy to see that both C and σ(c) are -dimensional affine subspaces, which is impossible. 4. Quadratic permutations of F n It is well nown that the F -algebra of all functions from F n to F is P n = F [X,...,X n ]/(X X,...,X n X n). Also recall that the rth order Reed Muller code of length n is R(r, n) ={f P n : deg f r}. Forf P n, its Hamming weight, denoted by f, is the cardinality of f ({}). We remind the reader that in this paper, both the cardinality of a set and the Hamming weight of a boolean function are denoted by. The meaning of the notation should be clear from the context.

6 38 X.-d. Hou / Discrete Applied Mathematics 54 (6) Let σ = (f,...,f n ) T be a function from F n to Fn where f i P n. We define deg σ = max deg f i. i n When n is odd, the counter example to the conjectures, σ(x) = x 3 : F n F n, is a quadratic permutation of F n. Thus it is natural to as if the conjectures are true for quadratic permutations of F n when n is even. We will see that the answer is positive. Let f : F n F be any function and let a F n. We define D a f : F n F, x f(x+ a) + f(x). Lemma 4.. Let σ = (f,...,f n ) T : F n Fn be APN, and let e = (,,...,) T F n. If D e f is a constant, then (D e f,...,d e f n ) T :{} F n F n is a bijection. Proof. Assume the contrary. Then there exist a,b {} F n, a = b, such that f i (a + e ) + f i (a) = f i (b + e ) + f i (b) for i n. But since f (a + e ) + f (a) = (D e f )(a) = (D e f )(b) = f (b + e ) + f (b), wehave σ(a + e ) + σ(a) = σ(b + e ) + σ(b), i.e., σ is affine on the -dimensional affine subspace {a,b,a + e,b+ e }. This is a contradiction. For any f P n, define N(f)={a F n : D af = constant}. Clearly, N(f) is a subspace of F n. Corollary 4.. Let σ = (f,...,f n ) T : F n Fn be APN. Then N(f ) N(f ) ={}. Proof. Otherwise, we may assume that e N(f ) N(f ). Then both D e f and D e f are constants, which is impossible by Lemma 4.. Theorem 4.3. Let n be even and let σ = (f,...,f n ) T S(F n ) such that dim F [( f,...,f n +R(, n))/r(,n)], (4.) where f,...,f n is the linear span of f,...,f n. Then σ is not APN. Note: Inequality (4.) means that there is an element f P n such that f,...,f n are all in R(,n) (f + R(, n)). For the proof of Theorem 4.3, we assume that the reader is familiar with the basic facts about binary quadratic functions (cf. [7, Chapter 5]). For each f R(,n), its homogeneous part of degree corresponds to an n n symmetric matrix A over F whose diagonal entries are. The quadratic ran of f, denoted by ran(f ), is ran(a).itis well nown that ran(f ) is even and that dim N(f)=n ran(f ).Ifn is even and ran(f )=n, then f = n ± n. Proof of Theorem 4.3. Of course, we may assume that n 4. Because of (4.), after a suitable linear transformation on (f,...,f n ) T, we may assume that f,...,f n R(,n). For any = (c,...,c n ) F n,wehave ran(c f + +c n f n ) n. (Otherwise, the Hamming weight of n i= c if i is n i= c if i = n ± n = n. Then σ = (f,...,f n ) T cannot be a permutation of F n, which is a contradiction.) Therefore dim N(c f + +c n f n ) for all = (c,...,c n ) F n.

7 X.-d. Hou / Discrete Applied Mathematics 54 (6) We claim that there exist (u,...,u n ), (v,...,v n ) F n \{}, (u,...,u n ) = (v,...,v n ), such that N(u f + +u n f n ) N(v f + +v n f n ) = {}. Otherwise, (c,...,c n ) F n \{} N(c f + +c n f n ) + 3( n )> n, which is a contradiction. Through a suitable linear transformation, we may assume that (u,...,u n ) = (,,...,) and (v,...,v n ) = (,,,...,). Then N(f ) N(f ) = {}. By Corollary 4., σ is affine on a -dimensional affine subspace of F n. Corollary 4.4. Let n be even. If σ S(F n ) and deg σ, then σ is not APN. Remar. Corollary 4.4 also follows from a result of Nyberg [8] which states that for even n, there does not exist APN permutations of F n whose components are partially bent functions. 5. Number of (AGL(n, q), AGL(n, q))-double cosets in S(F n q ) Let p be a prime and q a power of p. In this section we wor with F q instead of F because the q-ary case does not require any extra wor and because the formulas are of more general interest. The group AGL(n, q) AGL(n, q) acts on S(F n q ), the group of all permutations of Fn q :For(g, h) AGL(n, q) AGL(n, q) and σ S(F n q ), (g, h)(σ) = g σ h. The orbits of this action are precisely the (AGL(n, q), AGL(n, q))-double cosets in S(F n q ). By the Burnside Lemma, the number of (AGL(n, q), AGL(n, q))-double cosets in S(F n q ), denoted by N(n, q), isgivenby N(n, q) = cent AGL(n,q) (g) cent AGL(n,q) (h) F(g,h), g,h C where C is a system of representatives of the conjugacy classes of AGL(n, q), cent AGL(n,q) (g) is the centralizer of g in AGL(n, q), and F(g,h)={σ S(F n q ) : gσh = σ}. We have F(g,h) = {σ S(F n q ) : g = σhσ } { if g and h are of different cycle types, = (λ!λ! )( λ λ ) if g and h are both of cycle type (λ, λ,...) q n, where (λ, λ,...) q n means that (λ, λ,...)is a partition of q n, i.e., λ i and λ + λ + =q n. That g is of cycle type (λ, λ,...) means that in the decomposition of g into disjoint cycles, there are λ i cycles of length i. For each λ = (λ, λ,...) q n, put C λ ={g C : g is of cycle type λ}. Then we have N(n, q) = (λ!λ! )( λ λ ) λ=(λ,λ,...) q n g Cλ. (5.) cent AGL(n,q) (g)

8 3 X.-d. Hou / Discrete Applied Mathematics 54 (6) To use formula (5.), we have to now three things: (i) a system C of representatives of the conjugacy classes of AGL(n, q), (ii) cent AGL(n,q) (g) for every g C, and (iii) the cycle type of every g C. Items (i) and (ii) have been determined in [5,6]. For any integer >, let I be the identity matrix and N = be the nilpotent matrix. Put J = I + N.For define A a AGL(, q), A a B b = B b AGL(l, q), [ A ] a B b AGL( + l,q). (5.) Let B() be a system of representatives of conjugacy classes of GL(, q) whose elements have no eigenvalue. For any partition λ = (λ, λ,...), define λ =λ + λ + and T(λ) ={t : λ t > }. Also define J J J J g λ = AGL( λ,q), (5.3) } {{ } λ } {{ } λ and J J g λ,t = }{{} λ Jt ε(t) Jt Jt AGL( λ,q) }{{} for t T(λ), (5.4) λ t where ε(t) = (,...,, ) T F t q.asλ runs through all partitions with λ n, t runs through T(λ) and B runs through B(n λ ), the following elements form a system of representatives of the conjugacy classes of AGL(n, q): g λ B, g λ,t B. (5.5) Thus we can let C be the set of the elements in (5.5). Furthermore, we have [5, Theorems 3. and 3.5], ( ) B cent AGL(n,q) g λ = cent GL(n λ,q)(b) q λ +λ + i q λ i(λ +λ + +iλ i +iλ i+ + ) λ i ( q j ), j=

9 cent AGL(n,q) ( g λ,t X.-d. Hou / Discrete Applied Mathematics 54 (6) ) B GL(n λ,q)(b) qλ t +λ t+ + = cent q λ t i q λ i(λ +λ + +iλ i +iλ i+ + ) λ i ( q j ). In the above, cent GL(n λ,q) (B) is given by the following general formula [6, Theorem 3.6]: Assume that C M m m (F q ) has elementary divisors e,...e }{{}, e,...e,..., where e F }{{} q [x] is irreducible of degree d, then μ cent GL(m,q) (C) = i μ μ q dμ i (μ +μ + +iμ i +iμ i i+ + ) ( q dj ). Now we turn to item (iii) that we need in formula (5.), i.e., the cycle type of every g C. Let (λ, λ,...)be the cycle type of g and put Fix(g) ={x F n q : g(x) = x}. Then we have j= j= Fix(g ) = i iλ i. By the Möbius inversion, we obtain iλ i = ( ) i μ Fix(g ), i where μ is the classical Möbius function. Thus λ i = ( ) i μ Fix(g ). i i Therefore we only have to determine Fix(g ) for each g C and. Observe that for g AGL(, q), h AGL(l, q), x F q, and y Fl q,wehave x g(x) (g h) =, y h(y) where is defined in (5.). In particular, Fix(g h) = Fix(g) Fix(h). (5.6) Lemma 5.. Let i be positive integers. Then ( ) ( ) ( ) (mod p) i if and only if p ν p() >i, where ν p () is the p-adic order of. Proof. Let = a p + a p + ( a i p ) be the p-adic expansion of and define dig p () = (a,a,...). For two integer sequences (a,a,...)and (b,b,...),wesay(a,a,...) (b,b,...)if a j b j for all j. Since ( j ) (mod p) if and only if dig p (j) dig p (), the conclusion follows immediately. For an n n matrix A, put null(a) = n ran(a). Lemma 5.. We have null(j i I)= min{i, p ν p() }.

10 3 X.-d. Hou / Discrete Applied Mathematics 54 (6) Proof. We have J i I = (I + N i ) I = j= ( ) N j j i = The conclusion immediately follows from Lemma 5.. ( ) i ( ) ( ) (. (5.7) ) Lemma 5.3. Let Then g = Jt ε(t) AGL(t, q). { Fix(g q t if p ) = νp() >t, if p νp() t. Proof. Since [ g J = t (I + J t + +Jt ] )ε(t), we see that for x F t q, g (x) = x if and only if (J t I)x = (I + J t + +Jt )ε(t). By Lemma 5., we have Since { Fix(g q min{t,p νp() } if (I + J ) = t + +Jt )ε(t) is in the column space of Jt I, otherwise. I + J t + +Jt = (I + N t ) i = i= i i= j= = j= = i= i=j ( j + ( ) i N j j t ( ) i N j j t ) N j t.

11 We have (I + J t + +J t )ε(t) = X.-d. Hou / Discrete Applied Mathematics 54 (6) ( i= ( ) ( ) ) t N j... j + t = (. ). (5.8) ( ) Comparing (5.8) with (5.7), we see that (I + J t + +Jt )ε(t) is in the column space of Jt ( ) ( ) ( t ) (mod p). By Lemma 5., this happens if and only if pνp() >t. I if and only if Proposition 5.4. Let λ = (λ, λ,...)be a partition such that λ n, t T(λ) and B B(n λ ). Then we have [ ( ) ] B Fix g λ = q i λ i min{i,p νp() }+null(b I), (5.9) [ ( ) ] { B q Fix g λ,t = i λ i min{i,p νp() }+null(b I) if p νp() >t, if p νp() (5.) t. Proof. We only prove (5.) since the proof of (5.9) is similar. Observe that ( [B ] ) Fix = qnull(b I), ( [Ji ] ) Fix = qnull(j (i) I) = q min{i,pνp() } (by Lemma 5.) and ( [Jt ] ) { Fix ε(t) q = min{t,p νp() } if p νp() >t if p νp() t. (by Lemma 5.3) Using (5.6) and (5.4), one can see that (5.) follows immediately form the above equations. Therefore, the three ingredients in (5.) are all determined. We now use (5.) to compute N(4, ). Relevant data of the computation are contained in Table.InTable, g λ, t,b = g λ,t When t is not specified, g λ,t,b means g λ B, λ 4, t T(λ), B B(4 λ ). B, λ 4, B B(4 λ ). In the same way we find that N(5, ) =, 569, 966, 4, 3, 938, 84.

12 34 X.-d. Hou / Discrete Applied Mathematics 54 (6) Table Computation of N(4, )

13 X.-d. Hou / Discrete Applied Mathematics 54 (6) Table Values of n(i) 6. Classification of (AGL(4, ), AGL(4, ))-double cosets in S(F 4 ) To find representatives of (AGL(4, ), AGL(4, ))-double cosets in S(F 4 ), by Lemma. (ii), we only have to search through permutations of F 4 which fix,e,...,e 4. The search is complete when 3 mutually non-equivalent permutations have been found. Note that for σ, τ S(F 4 ), σ τ if and only if σgτ AGL(4, ) for some g AGL(4, ). The indicator functions of all -dimensional subspaces of F 4 generate the Reed Muller code R(, 4). Since dim R(, 4) = =, we can find -dimensional subspaces V,...,V of F 4 such that their indicator functions form a basis of R(, 4). Then σgτ AGL(4, ) if and only if σgτ (x) = for i. x V i In this way, we have found the representatives of the (AGL(4, ), AGL(4, ))-double cosets in S(F 4 ) using a computer. However, the list of the representatives is too long to be included in this paper. Using this classification, we can answer all questions about the affinity of permutations of F 4. In particular, we find that every element in S(F4 ) is affine on at least 5 two-dimensional affine subspaces of F 4. More precisely, let n(i) be the number of (AGL(4, ), AGL(4, ))- double cosets in S(F 4 ) whose elements are affine on exactly i two-dimensional affine subspaces of F4. Table lists all nonzero entries of n(i). Acnowledgements The author thans Professor W.E. Clar for sharing his experiment results. References [] C. Carlet, P. Charpin, V. Zinoviev, Codes, bent functions and permutations suitable for DES-lie cryptosystems, Designs, Codes Cryptogr. 5 (998) [] A. Canteaut, H. Dobbertin, private communication. [3] H. Dobbertin, Almost perfect nonlinear power functions over GF( n ): the Niho case, Inform. Comput. 5 (999) [4] H. Dobbertin, Almost perfect nonlinear power functions on GF(n): a new case for n divisible by 5, Finite Fields Appl. (Augsburg, 999), Springer, Berlin,, pp. 3. [5] X. Hou, AGL(m, ) acting on R(r, m)/r(s, m), J. Algebra 7 (995) [6] X. Hou, GL(m, ) acting on R(r, m)/r(r,m), Discrete Math. 49 (996) 99. [7] F.J. MacWilliams, N.J.A. Sloane, The Theory of Error-Correcting Codes, vols. I and II, North-Holland, Amsterdam, 977. [8] K. Nyberg, S-boxes and round functions with controllable linearity and differential uniformity, Fast Software Encryption (Leuven, 994), Lecture Notes in Computer Science, vol. 8, Springer, Berlin, 995. [9] D.R. Stinson, Cryptography, Theory and Practice, second ed., Chapman and Hall, New Yor,.

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

The Analysis of affinely Equivalent Boolean Functions

The Analysis of affinely Equivalent Boolean Functions The Analysis of affinely Equivalent Boolean Functions Qing-shu Meng Min Yang Huan-guo Zhang Yuzhen Liu October 21, 2005 Abstract By Walsh transform, autocorrelation function, decomposition, derivation

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

Characterizations of the differential uniformity of vectorial functions by the Walsh transform Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

SF2729 GROUPS AND RINGS LECTURE NOTES

SF2729 GROUPS AND RINGS LECTURE NOTES SF2729 GROUPS AND RINGS LECTURE NOTES 2011-03-01 MATS BOIJ 6. THE SIXTH LECTURE - GROUP ACTIONS In the sixth lecture we study what happens when groups acts on sets. 1 Recall that we have already when looking

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

Vectorial Boolean Functions for Cryptography

Vectorial Boolean Functions for Cryptography Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

Fourier Spectra of Binomial APN Functions

Fourier Spectra of Binomial APN Functions Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra

More information

Real representations

Real representations Real representations 1 Definition of a real representation Definition 1.1. Let V R be a finite dimensional real vector space. A real representation of a group G is a homomorphism ρ VR : G Aut V R, where

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

Finite Fields. [Parts from Chapter 16. Also applications of FTGT]

Finite Fields. [Parts from Chapter 16. Also applications of FTGT] Finite Fields [Parts from Chapter 16. Also applications of FTGT] Lemma [Ch 16, 4.6] Assume F is a finite field. Then the multiplicative group F := F \ {0} is cyclic. Proof Recall from basic group theory

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

GROUP ACTIONS EMMANUEL KOWALSKI

GROUP ACTIONS EMMANUEL KOWALSKI GROUP ACTIONS EMMANUEL KOWALSKI Definition 1. Let G be a group and T a set. An action of G on T is a map a: G T T, that we denote a(g, t) = g t, such that (1) For all t T, we have e G t = t. (2) For all

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

A class of quadratic APN binomials inequivalent to power functions

A class of quadratic APN binomials inequivalent to power functions A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander November 30, 2006 Abstract We exhibit an infinite class of almost perfect nonlinear quadratic

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

ARCS IN FINITE PROJECTIVE SPACES. Basic objects and definitions

ARCS IN FINITE PROJECTIVE SPACES. Basic objects and definitions ARCS IN FINITE PROJECTIVE SPACES SIMEON BALL Abstract. These notes are an outline of a course on arcs given at the Finite Geometry Summer School, University of Sussex, June 26-30, 2017. Let K denote an

More information

Lower bound of the covering radius of binary irreducible Goppa codes

Lower bound of the covering radius of binary irreducible Goppa codes Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

Contradiction. Theorem 1.9. (Artin) Let G be a finite group of automorphisms of E and F = E G the fixed field of G. Then [E : F ] G.

Contradiction. Theorem 1.9. (Artin) Let G be a finite group of automorphisms of E and F = E G the fixed field of G. Then [E : F ] G. 1. Galois Theory 1.1. A homomorphism of fields F F is simply a homomorphism of rings. Such a homomorphism is always injective, because its kernel is a proper ideal (it doesnt contain 1), which must therefore

More information

The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t

The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t Wiebke S. Diestelkamp Department of Mathematics University of Dayton Dayton, OH 45469-2316 USA wiebke@udayton.edu

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

Division Property: a New Attack Against Block Ciphers

Division Property: a New Attack Against Block Ciphers Division Property: a New Attack Against Block Ciphers Christina Boura (joint on-going work with Anne Canteaut) Séminaire du groupe Algèbre et Géometrie, LMV November 24, 2015 1 / 50 Symmetric-key encryption

More information

arxiv: v1 [math.co] 3 Nov 2014

arxiv: v1 [math.co] 3 Nov 2014 SPARSE MATRICES DESCRIBING ITERATIONS OF INTEGER-VALUED FUNCTIONS BERND C. KELLNER arxiv:1411.0590v1 [math.co] 3 Nov 014 Abstract. We consider iterations of integer-valued functions φ, which have no fixed

More information

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Céline Blondeau, Anne Canteaut and Pascale Charpin* Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 149 Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin* INRIA Paris-Rocquencourt, Project-Team SECRET,

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

Newton, Fermat, and Exactly Realizable Sequences

Newton, Fermat, and Exactly Realizable Sequences 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 8 (2005), Article 05.1.2 Newton, Fermat, and Exactly Realizable Sequences Bau-Sen Du Institute of Mathematics Academia Sinica Taipei 115 TAIWAN mabsdu@sinica.edu.tw

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch Definitions, Theorems and Exercises Abstract Algebra Math 332 Ethan D. Bloch December 26, 2013 ii Contents 1 Binary Operations 3 1.1 Binary Operations............................... 4 1.2 Isomorphic Binary

More information

Chapter 4 Euclid Space

Chapter 4 Euclid Space Chapter 4 Euclid Space Inner Product Spaces Definition.. Let V be a real vector space over IR. A real inner product on V is a real valued function on V V, denoted by (, ), which satisfies () (x, y) = (y,

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Rank 3 Latin square designs

Rank 3 Latin square designs Rank 3 Latin square designs Alice Devillers Université Libre de Bruxelles Département de Mathématiques - C.P.216 Boulevard du Triomphe B-1050 Brussels, Belgium adevil@ulb.ac.be and J.I. Hall Department

More information

NONCOMMUTATIVE POLYNOMIAL EQUATIONS. Edward S. Letzter. Introduction

NONCOMMUTATIVE POLYNOMIAL EQUATIONS. Edward S. Letzter. Introduction NONCOMMUTATIVE POLYNOMIAL EQUATIONS Edward S Letzter Introduction My aim in these notes is twofold: First, to briefly review some linear algebra Second, to provide you with some new tools and techniques

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

1 The Algebraic Normal Form

1 The Algebraic Normal Form 1 The Algebraic Normal Form Boolean maps can be expressed by polynomials this is the algebraic normal form (ANF). The degree as a polynomial is a first obvious measure of nonlinearity linear (or affine)

More information

A connection between number theory and linear algebra

A connection between number theory and linear algebra A connection between number theory and linear algebra Mark Steinberger Contents 1. Some basics 1 2. Rational canonical form 2 3. Prime factorization in F[x] 4 4. Units and order 5 5. Finite fields 7 6.

More information

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet 1 and Stjepan Picek 1, 2 1 LAGA, Department of Mathematics, University of Paris 8 (and Paris

More information

The primitive root theorem

The primitive root theorem The primitive root theorem Mar Steinberger First recall that if R is a ring, then a R is a unit if there exists b R with ab = ba = 1. The collection of all units in R is denoted R and forms a group under

More information

1 Finite abelian groups

1 Finite abelian groups Last revised: May 16, 2014 A.Miller M542 www.math.wisc.edu/ miller/ Each Problem is due one week from the date it is assigned. Do not hand them in early. Please put them on the desk in front of the room

More information

The generalized order-k Fibonacci Pell sequence by matrix methods

The generalized order-k Fibonacci Pell sequence by matrix methods Journal of Computational and Applied Mathematics 09 (007) 33 45 wwwelseviercom/locate/cam The generalized order- Fibonacci Pell sequence by matrix methods Emrah Kilic Mathematics Department, TOBB University

More information

MATH FINAL EXAM REVIEW HINTS

MATH FINAL EXAM REVIEW HINTS MATH 109 - FINAL EXAM REVIEW HINTS Answer: Answer: 1. Cardinality (1) Let a < b be two real numbers and define f : (0, 1) (a, b) by f(t) = (1 t)a + tb. (a) Prove that f is a bijection. (b) Prove that any

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

A New Approach to Permutation Polynomials over Finite Fields

A New Approach to Permutation Polynomials over Finite Fields A New Approach to Permutation Polynomials over Finite Fields Xiang-dong Hou Department of Mathematics and Statistics University of South Florida Coding, Cryptology and Combinatorial Designs Singapore,

More information

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS italian journal of pure and applied mathematics n. 37 2017 (173 182) 173 COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS Shashi Kant Pandey Department of Mathematics University

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

On the number of representations of n by ax 2 + by(y 1)/2, ax 2 + by(3y 1)/2 and ax(x 1)/2 + by(3y 1)/2

On the number of representations of n by ax 2 + by(y 1)/2, ax 2 + by(3y 1)/2 and ax(x 1)/2 + by(3y 1)/2 ACTA ARITHMETICA 1471 011 On the number of representations of n by ax + byy 1/, ax + by3y 1/ and axx 1/ + by3y 1/ by Zhi-Hong Sun Huaian 1 Introduction For 3, 4,, the -gonal numbers are given by p n n

More information

HOMEWORK Graduate Abstract Algebra I May 2, 2004

HOMEWORK Graduate Abstract Algebra I May 2, 2004 Math 5331 Sec 121 Spring 2004, UT Arlington HOMEWORK Graduate Abstract Algebra I May 2, 2004 The required text is Algebra, by Thomas W. Hungerford, Graduate Texts in Mathematics, Vol 73, Springer. (it

More information

Some practice problems for midterm 2

Some practice problems for midterm 2 Some practice problems for midterm 2 Kiumars Kaveh November 14, 2011 Problem: Let Z = {a G ax = xa, x G} be the center of a group G. Prove that Z is a normal subgroup of G. Solution: First we prove Z is

More information

Quadratic Gauss sums on matrices

Quadratic Gauss sums on matrices Linear Algebra and its Applications 384 (2004) 187 198 www.elsevier.com/locate/laa Quadratic Gauss sums on matrices Mitsuru Kuroda 410, Haitsu-hosha, 61, Nojiri-cho, Sakai, Osaka 599-8116, Japan Received

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

We simply compute: for v = x i e i, bilinearity of B implies that Q B (v) = B(v, v) is given by xi x j B(e i, e j ) =

We simply compute: for v = x i e i, bilinearity of B implies that Q B (v) = B(v, v) is given by xi x j B(e i, e j ) = Math 395. Quadratic spaces over R 1. Algebraic preliminaries Let V be a vector space over a field F. Recall that a quadratic form on V is a map Q : V F such that Q(cv) = c 2 Q(v) for all v V and c F, and

More information

REPRESENTATION THEORY WEEK 5. B : V V k

REPRESENTATION THEORY WEEK 5. B : V V k REPRESENTATION THEORY WEEK 5 1. Invariant forms Recall that a bilinear form on a vector space V is a map satisfying B : V V k B (cv, dw) = cdb (v, w), B (v 1 + v, w) = B (v 1, w)+b (v, w), B (v, w 1 +

More information

How many units can a commutative ring have?

How many units can a commutative ring have? How many units can a commutative ring have? Sunil K. Chebolu and Keir Locridge Abstract. László Fuchs posed the following problem in 960, which remains open: classify the abelian groups occurring as the

More information

with Good Cross Correlation for Communications and Cryptography

with Good Cross Correlation for Communications and Cryptography m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences

More information

J. Combin. Theory Ser. A 116(2009), no. 8, A NEW EXTENSION OF THE ERDŐS-HEILBRONN CONJECTURE

J. Combin. Theory Ser. A 116(2009), no. 8, A NEW EXTENSION OF THE ERDŐS-HEILBRONN CONJECTURE J. Combin. Theory Ser. A 116(2009), no. 8, 1374 1381. A NEW EXTENSION OF THE ERDŐS-HEILBRONN CONJECTURE Hao Pan and Zhi-Wei Sun Department of Mathematics, Naning University Naning 210093, People s Republic

More information

APN Power Functions Over GF(2 n ) for Infinitely Many n

APN Power Functions Over GF(2 n ) for Infinitely Many n APN Power Functions Over GF( n ) for Infinitely Many n David Jedlicka University of Texas at Austin Department of Mathematics Austin, TX 7871 USA jedlicka@math.utexas.edu July 11, 005 Abstract I present

More information

MATH JORDAN FORM

MATH JORDAN FORM MATH 53 JORDAN FORM Let A,, A k be square matrices of size n,, n k, respectively with entries in a field F We define the matrix A A k of size n = n + + n k as the block matrix A 0 0 0 0 A 0 0 0 0 A k It

More information

Lacunary Polynomials over Finite Fields Course notes

Lacunary Polynomials over Finite Fields Course notes Lacunary Polynomials over Finite Fields Course notes Javier Herranz Abstract This is a summary of the course Lacunary Polynomials over Finite Fields, given by Simeon Ball, from the University of London,

More information

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................

More information

Groups of Prime Power Order with Derived Subgroup of Prime Order

Groups of Prime Power Order with Derived Subgroup of Prime Order Journal of Algebra 219, 625 657 (1999) Article ID jabr.1998.7909, available online at http://www.idealibrary.com on Groups of Prime Power Order with Derived Subgroup of Prime Order Simon R. Blackburn*

More information

Partial permutation decoding for binary linear Hadamard codes

Partial permutation decoding for binary linear Hadamard codes Partial permutation decoding for binary linear Hadamard codes R. D. Barrolleta 1 and M. Villanueva 2 Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Cerdanyola

More information

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou 1, Huiting Han 1, Chunming Tang 1, and Maozhi Xu 1,2 1 LMAM, School of Mathematical Sciences, Peing

More information

z-classes in finite groups of conjugate type (n, 1)

z-classes in finite groups of conjugate type (n, 1) Proc. Indian Acad. Sci. (Math. Sci.) (2018) 128:31 https://doi.org/10.1007/s12044-018-0412-5 z-classes in finite groups of conjugate type (n, 1) SHIVAM ARORA 1 and KRISHNENDU GONGOPADHYAY 2, 1 Department

More information

0 Sets and Induction. Sets

0 Sets and Induction. Sets 0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set

More information

Lecture Notes on Cryptographic Boolean Functions

Lecture Notes on Cryptographic Boolean Functions Lecture Notes on Cryptographic Boolean Functions Anne Canteaut Inria, Paris, France Anne.Canteaut@inria.fr https://www.rocq.inria.fr/secret/anne.canteaut/ version: March 10, 016 Contents 1 Boolean functions

More information

Thesis Research Notes

Thesis Research Notes Thesis Research Notes Week 26-2012 Christopher Wood June 29, 2012 Abstract This week was devoted to reviewing some classical literature on the subject of Boolean functions and their application to cryptography.

More information

5 Quiver Representations

5 Quiver Representations 5 Quiver Representations 5. Problems Problem 5.. Field embeddings. Recall that k(y,..., y m ) denotes the field of rational functions of y,..., y m over a field k. Let f : k[x,..., x n ] k(y,..., y m )

More information

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator

More information

Math 594, HW2 - Solutions

Math 594, HW2 - Solutions Math 594, HW2 - Solutions Gilad Pagi, Feng Zhu February 8, 2015 1 a). It suffices to check that NA is closed under the group operation, and contains identities and inverses: NA is closed under the group

More information

Polynomials, Ideals, and Gröbner Bases

Polynomials, Ideals, and Gröbner Bases Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields

More information

6 Cosets & Factor Groups

6 Cosets & Factor Groups 6 Cosets & Factor Groups The course becomes markedly more abstract at this point. Our primary goal is to break apart a group into subsets such that the set of subsets inherits a natural group structure.

More information

ON THE SUM OF ELEMENT ORDERS OF FINITE ABELIAN GROUPS

ON THE SUM OF ELEMENT ORDERS OF FINITE ABELIAN GROUPS ANALELE ŞTIINŢIFICE ALE UNIVERSITĂŢII AL.I. CUZA DIN IAŞI (S.N.) MATEMATICĂ, Tomul...,..., f... DOI: 10.2478/aicu-2013-0013 ON THE SUM OF ELEMENT ORDERS OF FINITE ABELIAN GROUPS BY MARIUS TĂRNĂUCEANU and

More information

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over

More information

2 More on Congruences

2 More on Congruences 2 More on Congruences 2.1 Fermat s Theorem and Euler s Theorem definition 2.1 Let m be a positive integer. A set S = {x 0,x 1,,x m 1 x i Z} is called a complete residue system if x i x j (mod m) whenever

More information

The Symmetric Groups

The Symmetric Groups Chapter 7 The Symmetric Groups 7. Introduction In the investigation of finite groups the symmetric groups play an important role. Often we are able to achieve a better understanding of a group if we can

More information

Tactical Decompositions of Steiner Systems and Orbits of Projective Groups

Tactical Decompositions of Steiner Systems and Orbits of Projective Groups Journal of Algebraic Combinatorics 12 (2000), 123 130 c 2000 Kluwer Academic Publishers. Manufactured in The Netherlands. Tactical Decompositions of Steiner Systems and Orbits of Projective Groups KELDON

More information

Rings and groups. Ya. Sysak

Rings and groups. Ya. Sysak Rings and groups. Ya. Sysak 1 Noetherian rings Let R be a ring. A (right) R -module M is called noetherian if it satisfies the maximum condition for its submodules. In other words, if M 1... M i M i+1...

More information

Algebra: Groups. Group Theory a. Examples of Groups. groups. The inverse of a is simply a, which exists.

Algebra: Groups. Group Theory a. Examples of Groups. groups. The inverse of a is simply a, which exists. Group Theory a Let G be a set and be a binary operation on G. (G, ) is called a group if it satisfies the following. 1. For all a, b G, a b G (closure). 2. For all a, b, c G, a (b c) = (a b) c (associativity).

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/32076 holds various files of this Leiden University dissertation Author: Junjiang Liu Title: On p-adic decomposable form inequalities Issue Date: 2015-03-05

More information

UNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY

UNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY UNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY ISAAC M. DAVIS Abstract. By associating a subfield of R to a set of points P 0 R 2, geometric properties of ruler and compass constructions

More information

SUMMARY ALGEBRA I LOUIS-PHILIPPE THIBAULT

SUMMARY ALGEBRA I LOUIS-PHILIPPE THIBAULT SUMMARY ALGEBRA I LOUIS-PHILIPPE THIBAULT Contents 1. Group Theory 1 1.1. Basic Notions 1 1.2. Isomorphism Theorems 2 1.3. Jordan- Holder Theorem 2 1.4. Symmetric Group 3 1.5. Group action on Sets 3 1.6.

More information

CYCLIC SIEVING FOR CYCLIC CODES

CYCLIC SIEVING FOR CYCLIC CODES CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show

More information

MATH 361: NUMBER THEORY FOURTH LECTURE

MATH 361: NUMBER THEORY FOURTH LECTURE MATH 361: NUMBER THEORY FOURTH LECTURE 1. Introduction Everybody knows that three hours after 10:00, the time is 1:00. That is, everybody is familiar with modular arithmetic, the usual arithmetic of the

More information

D-MATH Algebra I HS18 Prof. Rahul Pandharipande. Solution 1. Arithmetic, Zorn s Lemma.

D-MATH Algebra I HS18 Prof. Rahul Pandharipande. Solution 1. Arithmetic, Zorn s Lemma. D-MATH Algebra I HS18 Prof. Rahul Pandharipande Solution 1 Arithmetic, Zorn s Lemma. 1. (a) Using the Euclidean division, determine gcd(160, 399). (b) Find m 0, n 0 Z such that gcd(160, 399) = 160m 0 +

More information

AN UPPER BOUND FOR SIGNATURES OF IRREDUCIBLE, SELF-DUAL gl(n, C)-REPRESENTATIONS

AN UPPER BOUND FOR SIGNATURES OF IRREDUCIBLE, SELF-DUAL gl(n, C)-REPRESENTATIONS AN UPPER BOUND FOR SIGNATURES OF IRREDUCIBLE, SELF-DUAL gl(n, C)-REPRESENTATIONS CHRISTOPHER XU UROP+ Summer 2018 Mentor: Daniil Kalinov Project suggested by David Vogan Abstract. For every irreducible,

More information

Dickson Polynomials that are Involutions

Dickson Polynomials that are Involutions Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.

More information

Groups that Distribute over Stars

Groups that Distribute over Stars Groups that Distribute over Stars Arthur Holshouser 3600 Bullard St Charlotte, NC, USA, 808 Harold Reiter Department of Mathematics UNC Charlotte Charlotte, NC 83 hbreiter@emailunccedu 1 Abstract Suppose

More information

On Robbins example of a continued fraction expansion for a quartic power series over F 13

On Robbins example of a continued fraction expansion for a quartic power series over F 13 Journal of Number Theory 28 (2008) 09 5 www.elsevier.com/locate/jnt On Robbins example of a continued fraction expansion for a quartic power series over F 3 Alain Lasjaunias C.N.R.S.-UMR 5465, Université

More information

DISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3. Contents

DISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3. Contents DISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3 T.K.SUBRAHMONIAN MOOTHATHU Contents 1. Cayley s Theorem 1 2. The permutation group S n 2 3. Center of a group, and centralizers 4 4. Group actions

More information