CRYPTOGRAPHICALLY SIGNIFICANT MDS MATRICES OVER FINITE FIELDS: A BRIEF SURVEY AND SOME GENERALIZED RESULTS

被引:24
作者
Gupta, Kishan Chand [1 ]
Pandey, Sumit Kumar [2 ]
Ray, Indranil Ghosh [3 ]
Samanta, Susanta [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, 203 BT Rd, Kolkata 700108, India
[2] Ashoka Univ, Sonepat, Haryana, India
[3] City Univ London, Sch Engn & Math Sci, London EC1V 0HB, England
关键词
Diffusion; involutory matrix; MDS matrix; orthogonal matrix; branch number; Cauchy matrix; Vandermonde matrix; CONSTRUCTION; CODES;
D O I
10.3934/amc.2019045
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A matrix is MDS or super-regular if and only if every square sub-matrices of it are nonsingular. MDS matrices provide perfect diffusion in block ciphers and hash functions. In this paper we provide a brief survey on cryptographically significant MDS matrices - a first to the best of our knowledge. In addition to providing a summary of existing results, we make several contributions. We exhibit some deep and nontrivial interconnections between different constructions of MDS matrices. For example, we prove that all known Van-dermonde constructions are basically equivalent to Cauchy constructions. We prove some folklore results which are used in MDS matrix literature. Wherever possible, we provide some simpler alternative proofs. We do not discuss efficiency issues or hardware implementations; however, the theory accumulated and discussed here should provide an easy guide towards efficient implementations.
引用
收藏
页码:779 / 843
页数:65
相关论文
共 69 条
[1]   Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes [J].
Augot, Daniel ;
Finiasz, Matthieu .
FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 :3-17
[2]  
Augot D, 2013, IEEE INT SYMP INFO, P1551, DOI 10.1109/ISIT.2013.6620487
[3]  
Barreto P. S. L. M., 2000, P 1 NESSIE WORKSH
[4]  
Barreto P.S.L.M., 2000, KHAZAD LEGACY LEVEL
[5]  
Barreto Paulo, 2000, 1 OP NESSIE WORKSH
[6]   Lightweight Multiplication in GF(2n) with Applications to MDS Matrices [J].
Beierle, Christof ;
Kranz, Thorsten ;
Leander, Gregor .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :625-653
[7]  
Berger Thierry P., 2013, Progress in Cryptology - INDOCRYPT 2013. 14th International Conference on Cryptology in India. Proceedings: LNCS 8250, P274, DOI 10.1007/978-3-319-03515-4_18
[8]  
Berger T.P., 2004, P ACCT 2009, P40
[9]   The Magma algebra system .1. The user language [J].
Bosma, W ;
Cannon, J ;
Playoust, C .
JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) :235-265
[10]   ON REPEATED-ROOT CYCLIC CODES [J].
CASTAGNOLI, G ;
MASSEY, JL ;
SCHOELLER, PA ;
VONSEEMANN, N .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1991, 37 (02) :337-342