• Title/Summary/Keyword: Dickson Polynomials

Search Result 4, Processing Time 0.02 seconds

The design of a secure hash function using Dickson polynomial

  • Nyang, Dae-Hun;Park, Seung-Joon;Song, Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.200-210
    • /
    • 1995
  • Almost all hash functions suggested up till now provide security by using complicated operations on fixed size blocks, but still the security isn't guaranteed mathematically. The difficulty of making a secure hash function lies in the collision freeness, and this can be obtained from permutation polynomials. If a permutation polynomial has the property of one-wayness, it is suitable for a hash function. We have chosen Dickson polynomial for our hash algorithm, which is a kind of permutation polynomials. When certain conditions are satisfied, a Dickson polynomial has the property of one-wayness, which makes the resulting hash code mathematically secure. In this paper, a message digest algorithm will be designed using Dickson polynomial.

  • PDF

DICKSON INVARIANTS HIT BY THE STEENROD SQUARE

  • Tan, K.F.;Xu, Kai
    • Bulletin of the Korean Mathematical Society
    • /
    • v.37 no.4
    • /
    • pp.779-790
    • /
    • 2000
  • Let $D_3$ be the Dickson invariant algebra of $F_2[X_1,\; X_2,\; X_3] \; by \; GL(3,\; F_2)$. In this paper, we provide an elementary proof of Theorem 3.2 of [2]; each element in $D_3$ is hit by the Steenrod square in $F_2[X_1,\; X_2,\; X_3]$.

  • PDF