Skip to main content
Log in

Affine equivalence and non-linearity of permutations over \(\mathbb Z_n\)

  • Original Paper
  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract

In this paper, we explore further the non-linearity and affine equivalence as proposed by Mishra et al. (Non-linearity and affine equivalence of permutations. 2014. http://eprint.iacr.org/2014/974.pdf). We propose an efficient algorithm in order to compute affine equivalent permutation(s) of a given permutation of length n, of complexity \(O(n^4)\) in worst case and \(O(n^2)\) in best case. Also in the affirmative in a special case \(n = p\), prime, it is of complexity \(O(n^3)\). We also propose an upper bound of non-linearity of permutation(s) whose length satisfies a special condition. Further, behaviour of non-linearity on direct sum and skew sum of permutation has been analysed. Also the distance of an affine permutation from the other affine permutations has also been studied. The cryptographic implication of this work is on permutation based stream ciphers like RC4 and its variants. In this paper, we have applied this study on RC4 cipher. The analysis shows that increasing the key size for RC4 does not mean that increase in the security or saturation after a limit but security may falls as key size increases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  2. Beth, Ding, C.: On almost perfect nonlinear permutations. In: Advances in Cryptology-Eurocrypt’93, Lecture Notes in Computer Science, pp. 65–76. Springer (1994)

  3. Golomb, S.W., Gong, G.: Signal Design for good Correlation, for Wireless Communication, Cryptography, and Radar. Cambridge University Press, Cambridge (2005)

    Book  MATH  Google Scholar 

  4. MacWilliams, F.J., Sloane, N.J.A.: Theory of Error-Correcting codes. North Holland Publishing Company, North-Holland (1997)

  5. Carlet, C.: Boolean Models and Methods in Mathematics, Computer Science, and Engineering. Cambridge University Press, Cambridge (2010). (Chapter Boolean Functions for Cryptography and Error Correcting Codes)

    Google Scholar 

  6. Budaghyan, L.: Construction and Analysis of Cryptographic Functions. Springer, Berlin (2014)

    Book  MATH  Google Scholar 

  7. Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3), 1141–1152 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  8. Cusik, T.W., Stanica, P.: Cryptographic Boolean Functions and Applications, 1st edn. Academic Press, Cambridge (2009)

    Google Scholar 

  9. Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for des-like cryptosystems. Des. Codes Cryptogr 15(2), 125–156 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  10. Pott, A., Zhou, Y.: CCZ and EA equivalenc between mappings over finite abelian groups. Des. Codes Cryptogr 66(1–3), 99–109 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  11. Kumar, P.V., Scholtz, R.A., Welch, L.R.: Generalized bent functions and their properties. J. Comb. Theory A 40, 90–107 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  12. Pless, V.S., Huffman, W.C.: Handbook of Coding Theory. Elsevier, Amsterdam (1998)

    MATH  Google Scholar 

  13. Carlet, C., Ding, C.: Highly nonlinear mappings. J. Complex. 20(2–3), 205244 (2004)

    MathSciNet  MATH  Google Scholar 

  14. Logachev, O.A., Salnikov, A.A., Yashchenko, V.V.: Boolean Functions in Coding Theory and Cryptography. American Mathematical Society, Providence (2012)

    MATH  Google Scholar 

  15. Mishra, P.R., Gupta, I., Pillai N.R.: Non-linearity and affine equivalence of permutations. http://eprint.iacr.org/2014/974.pdf (2014)

  16. Carlet, C.: Recent results on bent functions. In: Proceedings of the International Conference on Conbinatorics, Information Theory and Statistics, Portland, Maine, pp. 275–291 (1999)

  17. McKague, M.E.: Design and analysis of RC4-like stream ciphers. A Master of Mathematics Thesis, University of Waterloo, Combinatorics and Optimization (2005)

  18. Maitra, S., Paul, G.: Analysis of RC4 and proposal of additional layers for better security margin. In: INDOCRYPT 2008, Volume 5365 of Lecture Notes in Computer Science, pp. 27–39. Springer (2008)

  19. Zoltak B.: VMPC one-way function and stream cipher. In: FSE 2004, volume 3017 of Lecture Notes in Computer Science, pp. 210–225. Springer (2004)

  20. Kitaev, S.: Patterns in Permutations and Words Monographs in Theoretical Computer Science. An EATCS Series. Springer, Berlin (2011)

    Google Scholar 

  21. Paul, G., Maitra, S.: RC4 Stream Cipher and its Variants, 1st edn. CRC Press, Boca Raton (2012)

    MATH  Google Scholar 

  22. Koblitz, Neal: A Course in Number Theory and Cryptography, 2nd edn. Springer, New York (1994)

    Book  MATH  Google Scholar 

  23. Dickson, L.E.: History of the Theory of Numbers, vol. II. Carnegie Institution of Washington, Washington (1920)

    MATH  Google Scholar 

Download references

Acknowledgements

The authors are extremely thankful to the referee for his valuable comments and suggestions. This led to the over all improvement in quality and presentation of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yogesh Kumar.

Appendix

Appendix

figure d

Note: inv at line no. 3 is actually inverse of a / d in \(\mathbb Z_{b/d}^*\). The function \(EX\_GCD(a, b)\) compute GCD of a, b and xy such that \(d=ax+by\).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, Y., Mishra, P.R., Pillai, N.R. et al. Affine equivalence and non-linearity of permutations over \(\mathbb Z_n\) . AAECC 28, 257–279 (2017). https://doi.org/10.1007/s00200-016-0307-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00200-016-0307-6

Keywords

Mathematics Subject Classification

Navigation