Recursive MDS matrices effective for implementation from Reed-Solomnon codes and direct exponent transformation
DOI:
https://doi.org/10.54654/isj.v1i16.235Keywords:
MDS matrix, recursive MDS matrices, RS codesTóm tắt
Abstract— Nowaday, many block ciphers have used MDS matrices for their diffusion layer. However, the MDS matrices are always the components that cause large implementation cost for ciphers. Recursive MDS matrices will help to deal with this problem because they can be the power of a simple Companion matrix that is very sparse. In this paper, the ability to generate different efficient recursive MDS matrices for implementation from an original efficient recursive MDS matrix by direct exponential transformation is shown. These recursives MDS matrices are meaningful in hardware implementation. These matrices can be used in the diffusion layer of some block ciphers and hash functions ciphers and hash functions especially lightweight block ciphers and hash functions to save resources and implementation cost.
Downloads
References
. S. Vaudenay, On the need for multipermutations: cryptanalysis of MD4 and SAFER. In: Preneel B. (eds) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, vol. 1008. Springer, Berlin, Heidelberg, pp. 286-297, 1994.
. C. Schnorr and S. Vaudenay. Black box cryptanalysis of hash networks based on multipermutations. In A. De Santis, editor, Advances in Cryptology - EU-ROCRYPT ’94. Proceedings, volume 950 of LNCS, pages 47–57. Springer-Verlag, 1995.
. M. Sajadieh, M. Dakhilalian, H. Mala, and P. Sepehrdad, “Recursive diffusion layers for block ciphers and hash functions,” in Fast Software Encryption. Springer, 2012, pp. 385-401.
. S. Wu, M. Wang, and W. Wu, “Recursive diffusion layers for (lightweight) block ciphers and hash functions,” in Selected Areas in Cryptography. Springer, 2013, pp. 43-60.
. D. Augot and M. Finiasz, “Exhaustive search for small dimension recursive mds diffusion layers for block ciphers and hash functions,” in 2013 IEEE International Symposium on Information Theory Proceedings (ISIT). IEEE, 2013, pp.1551-1555.
. S. Kolay, D. Mukhopadhyay, “Lightweight diffusion layer from the kth root of the mds matrix”, IACR Cryptology ePrint Archive, vol. 498, 2014.
. D. Augot, M. Finiasz, “Direct construction of recursive mds diffusion layers using shortened bch codes”, 21st International Workshop on Fast Software Encryption, FSE 2014, Springer, 2014.
. Tran Thi Luong, “Constructing effectively mds and recursive mds matrices by reed-solomon codes”, Journal of Science and Technology on Information Security, Vol. 3, No. 2, pp. 10–16, 2016.
. Tran Thi Luong, Nguyen Ngoc Cuong and Hoang Duc Tho, Constructing Recursive MDS Matrices Effective for Implementation from Reed-Solomon Codes and Preserving the Recursive Property of MDS Matrix of Scalar Multiplication, Journal of Informatics and Mathematical Sciences, Vol. 11, No. 2, pp. 155–177, 2019.
. G. Murtaza, N. Ikram, “Direct Exponent and Scalar Multiplication Classes of an MDS Matrix”, [EB/OL], National University of Sciences and Technology, Pakistan, (2011-01-10), pp. 2-5.
. T. T. Luong, N. N. Cuong, L. T. Dung, “The preservation of good cryptographic properties of MDS matrix under direct exponent transformation”, Journal of Computer Science and Cybernetics, vol.31, no.4, pp. 291–303, 2015.
. T. T. Luong, N. N. Cuong, L. T. Dung, “A new statement about direct exponent of an MDS matrix in block ciphers”, in 2015 IEEE the Seventh International Conference on Knowledge and Systems Engineering (KSE), IEEE, pp. 340–343, 2015. (Date Added to IEEE Xplore: 07 January 2016).
. Kishan Chand Gupta, Indranil Ghosh Ray, On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography, In: Cuzzocrea A., Kittl C., Simos D.E., Weippl E., Xu L. (eds) Security Engineering and Intelligence Informatics. CD-ARES 2013. Lecture Notes in Computer Science, vol 8128. Springer, Berlin, Heidelberg.
. Thi Luong Tran, Ngoc Cuong Nguyen, Duc Trinh Bui, 4×4 recursive MDS matrices effective for implementation from Reed-Solomon code over GF(q) field, Proceedings of the 4th International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences - MCO 2021, Springer.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).