Abstract
In this paper, we explore further the non-linearity and affine equivalence as proposed by Mishra et al. (Non-linearity and affine equivalence of permutations. 2014. http://eprint.iacr.org/2014/974.pdf). We propose an efficient algorithm in order to compute affine equivalent permutation(s) of a given permutation of length n, of complexity \(O(n^4)\) in worst case and \(O(n^2)\) in best case. Also in the affirmative in a special case \(n = p\), prime, it is of complexity \(O(n^3)\). We also propose an upper bound of non-linearity of permutation(s) whose length satisfies a special condition. Further, behaviour of non-linearity on direct sum and skew sum of permutation has been analysed. Also the distance of an affine permutation from the other affine permutations has also been studied. The cryptographic implication of this work is on permutation based stream ciphers like RC4 and its variants. In this paper, we have applied this study on RC4 cipher. The analysis shows that increasing the key size for RC4 does not mean that increase in the security or saturation after a limit but security may falls as key size increases.
Similar content being viewed by others
References
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Beth, Ding, C.: On almost perfect nonlinear permutations. In: Advances in Cryptology-Eurocrypt’93, Lecture Notes in Computer Science, pp. 65–76. Springer (1994)
Golomb, S.W., Gong, G.: Signal Design for good Correlation, for Wireless Communication, Cryptography, and Radar. Cambridge University Press, Cambridge (2005)
MacWilliams, F.J., Sloane, N.J.A.: Theory of Error-Correcting codes. North Holland Publishing Company, North-Holland (1997)
Carlet, C.: Boolean Models and Methods in Mathematics, Computer Science, and Engineering. Cambridge University Press, Cambridge (2010). (Chapter Boolean Functions for Cryptography and Error Correcting Codes)
Budaghyan, L.: Construction and Analysis of Cryptographic Functions. Springer, Berlin (2014)
Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3), 1141–1152 (2006)
Cusik, T.W., Stanica, P.: Cryptographic Boolean Functions and Applications, 1st edn. Academic Press, Cambridge (2009)
Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for des-like cryptosystems. Des. Codes Cryptogr 15(2), 125–156 (1998)
Pott, A., Zhou, Y.: CCZ and EA equivalenc between mappings over finite abelian groups. Des. Codes Cryptogr 66(1–3), 99–109 (2013)
Kumar, P.V., Scholtz, R.A., Welch, L.R.: Generalized bent functions and their properties. J. Comb. Theory A 40, 90–107 (1985)
Pless, V.S., Huffman, W.C.: Handbook of Coding Theory. Elsevier, Amsterdam (1998)
Carlet, C., Ding, C.: Highly nonlinear mappings. J. Complex. 20(2–3), 205244 (2004)
Logachev, O.A., Salnikov, A.A., Yashchenko, V.V.: Boolean Functions in Coding Theory and Cryptography. American Mathematical Society, Providence (2012)
Mishra, P.R., Gupta, I., Pillai N.R.: Non-linearity and affine equivalence of permutations. http://eprint.iacr.org/2014/974.pdf (2014)
Carlet, C.: Recent results on bent functions. In: Proceedings of the International Conference on Conbinatorics, Information Theory and Statistics, Portland, Maine, pp. 275–291 (1999)
McKague, M.E.: Design and analysis of RC4-like stream ciphers. A Master of Mathematics Thesis, University of Waterloo, Combinatorics and Optimization (2005)
Maitra, S., Paul, G.: Analysis of RC4 and proposal of additional layers for better security margin. In: INDOCRYPT 2008, Volume 5365 of Lecture Notes in Computer Science, pp. 27–39. Springer (2008)
Zoltak B.: VMPC one-way function and stream cipher. In: FSE 2004, volume 3017 of Lecture Notes in Computer Science, pp. 210–225. Springer (2004)
Kitaev, S.: Patterns in Permutations and Words Monographs in Theoretical Computer Science. An EATCS Series. Springer, Berlin (2011)
Paul, G., Maitra, S.: RC4 Stream Cipher and its Variants, 1st edn. CRC Press, Boca Raton (2012)
Koblitz, Neal: A Course in Number Theory and Cryptography, 2nd edn. Springer, New York (1994)
Dickson, L.E.: History of the Theory of Numbers, vol. II. Carnegie Institution of Washington, Washington (1920)
Acknowledgements
The authors are extremely thankful to the referee for his valuable comments and suggestions. This led to the over all improvement in quality and presentation of the paper.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Note: inv at line no. 3 is actually inverse of a / d in \(\mathbb Z_{b/d}^*\). The function \(EX\_GCD(a, b)\) compute GCD of a, b and x, y such that \(d=ax+by\).
Rights and permissions
About this article
Cite this article
Kumar, Y., Mishra, P.R., Pillai, N.R. et al. Affine equivalence and non-linearity of permutations over \(\mathbb Z_n\) . AAECC 28, 257–279 (2017). https://doi.org/10.1007/s00200-016-0307-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00200-016-0307-6