• Title/Summary/Keyword: 치환다항식

Search Result 7, Processing Time 0.023 seconds

A Historical Note on Permutation Polynomials over Finite Fields (유한체상의 치환다항식에 관한 역사적 고찰)

  • Park Hong Goo
    • Journal for History of Mathematics
    • /
    • v.18 no.2
    • /
    • pp.117-126
    • /
    • 2005
  • In this paper, we analyze the basic concepts of permutation polynomials over finite fields, and the historical background through the use of the major classes of permutation polynomials over the fields. And also, we find a method of the polynomial representation with respect to cycles on the fields.

  • PDF

Modification of Finite Field Based S-box and Its Transform Domain Analysis (유한체 연산 기반의 치환상자 설계 및 변환 영역 특성 분석)

  • Jin, Seok-Yong;Baek, Jong-Min;Song, Hong-Yeop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.3-15
    • /
    • 2007
  • In this paper, we propose a simple scheme which produces a new S-box from a given S-box. We use well-known conversion technique between the polynomial functions over a finite field $F_{2^n}$ and the boolean functions from $F_2^n$ to $F_2$. We have applied this scheme to Rijndael S-box and obtained 29 new S-boxes, whose linear complexities are improved. We investigate their cryptographic properties via transform domain analysis.

High-Speed Algebraic Decoding of the Golay Codes (대수적 복호에 의한 Golay 부호의 고속 복호기 설계)

  • 김창규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.1
    • /
    • pp.53-60
    • /
    • 1996
  • 오증 요소로부터 오류위치다항식의 계수를 계산함으로서 (23,12) Golay 부호를 복호할 수 있는 대수적 복호법이 최근 증명되었다. GF(2)상에서의 3중 오류정정 BCH부호의 복호법을 이 부호에 완벽하게 적용하여 해석하는 것을 소개한다. 그리고 GF(2)에 대한 최적의 정규기저를 구하여 이를 유한체 연산에 적용하며 단계별로 복호 회로의 구성을 제시한다. 이는 기존의 복호기보다 논리회로적으로 간단하며, 복호된 정보를 얻기까지 35번의 치환이 필요하다.

A Characterization of Isomorphism Problem of Combinatorial objects and the Historical Note (조합대상의 동형사상 문제의 특성화와 역사적 고찰)

  • Park, Hong-Goo
    • Journal for History of Mathematics
    • /
    • v.19 no.1
    • /
    • pp.33-42
    • /
    • 2006
  • In this paper, we study the theoretical and historical backgrounds with respect to isomorphism problem of combinatorial objects which is one of major problems in the theory of Combinatorics. And also, we introduce a partial result for isomorphism problem of Cayley objects over a finite field.

  • PDF

The Optimal Normal Elements for Massey-Omura Multiplier (Massey-Omura 승산기를 위한 최적 정규원소)

  • 김창규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.41-48
    • /
    • 2004
  • Finite field multiplication and division are important arithmetic operation in error-correcting codes and cryptosystems. The elements of the finite field GF($2^m$) are represented by bases with a primitive polynomial of degree m over GF(2). We can be easily realized for multiplication or computing multiplicative inverse in GF($2^m$) based on a normal basis representation. The number of product terms of logic function determines a complexity of the Messay-Omura multiplier. A normal basis exists for every finite field. It is not easy to find the optimal normal element for a given primitive polynomial. In this paper, the generating method of normal basis is investigated. The normal bases whose product terms are less than other bases for multiplication in GF($2^m$) are found. For each primitive polynomial, a list of normal elements and number of product terms are presented.

Finite Difference Model of Unsaturated Soil Water Flow Using Chebyshev Polynomials of Soil Hydraulic Functions and Chromatographic Displacement of Rainfall (Chebyshev 다항식에 의한 토양수분특성 및 불포화 수리전도도 추정과 부분 치환 원리에 의한 강우 분포를 이용한 토양수분 불포화 이동 유한차분 수리모형)

  • Ro, Hee-Myong;Yoo, Sun-Ho;Han, Kyung-Hwa;Lee, Seung-Heon;Lee, Goon-Taek;Yun, Seok-In;Noh, Young-Dong
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.36 no.4
    • /
    • pp.181-192
    • /
    • 2003
  • We developed a mathematical simulation model to portray the vertical distribution of soil water from the measured weather data and the known soil hydraulic properties, and then compared simulation results with the periodically measured soil water profiles obtained on Jungdong sandy loam to verify the model, In this model, we solved potential-based Richards' equation by the implicit finite difference method superimposed on the predictor-corrector scheme. We presumed that: soil hydraulic properties are homogeneous; soil water flows isothermally; hysteresis is not considered; no vapor flows; no heat transfers into the soil profiles; and water added to soil surface is distributed along the soil profile following partial displacement principle. The input data were broadly classified into two groups: (1) daily weather data such as rainfall, maximum and minimum air temperatures, relative humidity and solar radiation and (2) soil hydraulic data to approximate unsaturated hydraulic conductivity and water retention. Each hydraulic polynomial function approximated using the Chebyshev polynomial and least square difference technique in tandem showed a fairly good fit of the given set of data. Vertical distribution of soil water as approximations to the Richards' equation subject to changing surface and phreatic boundaries was solved numerically during 53 days with a comparatively large time increment, and this pattern agreed well with field neutron scattering data, except for the surface 0.1 m slab.

Experimental Design of S box and G function strong with attacks in SEED-type cipher (SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적 설계)

  • 박창수;송홍복;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.123-136
    • /
    • 2004
  • In this paper, complexity and regularity of polynomial multiplication over $GF({2^n})$ are defined by using Hamming weight of rows and columns of the matrix ever GF(2) which represents polynomial multiplication. It is shown experimentally that in order to construct the block cipher robust against differential cryptanalysis, polynomial multiplication of substitution layer and the permutation layer should have high complexity and high regularity. With result of the experiment, a way of constituting S box and G function is suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with a nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over $GF({2^8})$ which has neither a fixed pout, whose input and output are the same except 0 and 1, nor an opposite fixed number, whose output is one`s complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes linear transform with 4 S-box outputs using the matrix of 4${\times}$4 over $GF({2^8})$. The components in the matrix of linear transformation have high complexity and high regularity. Furthermore, G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, and there can be no weak input where a fixed point an opposite fixed point, and output can be two`s complement of input. The primitive polynomials of nonlinear function affine transform and linear transformation are different each other. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.