A new construction for involutions over finite fields

Zhaohui ZHANG , Qunying LIAO

Front. Math. China ›› 2022, Vol. 17 ›› Issue (4) : 553 -565.

PDF (803KB)
Front. Math. China ›› 2022, Vol. 17 ›› Issue (4) : 553 -565. DOI: 10.1007/s11464-022-1023-0
RESEARCH ARTICLE
RESEARCH ARTICLE

A new construction for involutions over finite fields

Author information +
History +
PDF (803KB)

Abstract

In 2020, Niu et al. [Cryptogr. Commun., 2020, 12(2): 165−185] studied the fixed points of involutions over the finite field with q-elements. This paper further discusses the relationship between the fixed points set and the non-fixed points set of two involutions f1(x ) and f2(x ) over the finite field Fq, and then obtains a necessary and sufficient condition for that the composite function f1 f2(x ) is also an involution over Fq. In particular, a special class of involutions over some finite fields is determined completely.

Keywords

Permutation polynomial / involution / fixed point / non-fixed point

Cite this article

Download citation ▾
Zhaohui ZHANG, Qunying LIAO. A new construction for involutions over finite fields. Front. Math. China, 2022, 17(4): 553-565 DOI:10.1007/s11464-022-1023-0

登录浏览全文

4963

注册一个新账户 忘记密码

1 Introduction and main results

Let q be a prime power, Fq be the finite field with q elements, and Fq denote its multiplicative group. A polynomial f(x) Fq [x] is called a permutation polynomial when the mapping defined by f:af (a) is a one-by-one mapping from Fq to itself. Moreover, f(x) is called an involution over Fq if the compositional inverse of f(x) is also f(x)(i.e., for any x Fq, f f(x)=x). From the definition of the permutation polynomial, it's easy to see that for any given permutation polynomial f(x)Fq[x], f(x) corresponds to an element f in the group Sym( Fq). In particular, if f(x)Fq[x] is an involution, then ord(f )=2. It's well-known that permutation polynomials are widely used in cryptography, coding theory and combinatorial designs, thus they are particularly important for constructing permutation polynomials with special properties. In many situations, both permutation polynomials and their compositional inverses are required (it’s well-known that a polynomial can be regarded as a function). Therefore, if both the permutation and its compositional inverse are efficient in terms of implementation, it is extremely convenient for practical applications. Especially, the involution with itself the composition inverse are widely used, such as in AES, P RI NC E [2], Midori [1]. In AES, the permutation polynomial on F2 8 used by S-box is an involution. In PRINCE, a linear involution was used to construct the core cipher. More typically, in M id or i, the encryption and the decryption can be performed basing on non-linear involutions over linear spaces with minimal tweaks in the circuit. Recently, Canteaut and Roué [3] have shown that involutions are the best candidates against several cryptanalytic attacks by analyzing the behaviors of the permutation of an affine equivalent class with respect to these attacks. The involution over finite fields can also be used to design codes and construct Bent functions [7, 10]. For instance, Gallager [9] used an involution to update check nodes to obtain the low-complexity hardware implementation of the sum product algorithm which was used for decoding.

To the best of our knowledge, the known involutions over finite fields are a few. In 2016, Charpin et al. [5, 6] firstly studied the explicit expression of the involution, and gave a method to construct new involutions from known involutions by using the combination method and skills for discussing Dickson polynomials in the even characteristic field. In 2017, Castro et al. [4] gave a necessary and sufficient condition for a monomial with a specific number of fixed points to be an involution over finite fields. In 2018, Fu and Feng [8] investigated all of differentially 4-uniform permutations that are known in the literature and determined whether they can be involutory. In 2019, Zheng et al. [12] used the idea of cyclotomic polynomials to give several necessary and sufficient conditions for a special form of polynomials to be an involution. In 2020, Niu et al. [11] gave several necessary and sufficient conditions for another special form of polynomials to be an involution basing on the AGW criterion.

In this paper, basing on the work of Niu et al. and the relationship between the set of fixed points and the set of non-fixed points, we obtain a necessary and sufficient condition for that the composition of two involutions is also an involution. According to the property of an involution's truth table over Fq, we can obtain involutions by using Lagrange Interpolation Formula. Regretly, basing on Lagrange Interpolation Formula, we only obtain an involution once a time and the calculation is complex. Using the necessary and sufficient condition in this paper, two new involutions can be obtained from a known involution by using Lagrangian Interpolation Formula only once.

For convenience, let Af denote the set of fixed points of a polynomial f(x)Fq[x].

Lemma 1.1 [11]  Let f(x) be an involution over Fq, | Af|=n(nN). Then qn is even. In particularly, when q is odd, | Af|1.

According to Lemma 1.1, if f(x) is an involution, then | FqAf| is even. Let

| Fq Af |=2 h(h Z+) ,FqAf={α1,α2,,αh,β1,β 2,, βh}.

Because f(x) is an involution over Fq, Fq Af is the set of non-fixed points of f(x) over Fq, we can set βi=f(α i)(i=1,2,,h) and ( αi: βi)(i=1,2,,h ) be the 2-cycle (i.e., the transposition).

• Denote Bf={( α1: β1),,(αh:βh)}.

Based on the above results, and the relationship between the fixed points set and the non-fixed points set of two involutions over Fq, we obtain a necessary and sufficient condition for that the composition of two involutions is also an involution, and then a special class of involutions is constructed, namely, we prove the following main results.

Theorem 1.1  Let f1(x), f2(x) Fq[ x] be involutions over Fq. Then f 1f2(x) is an involution over Fq if and only if for any x Af 1, f2(x)Af1, and for any (x: f1( x))Bf1, one of the following holds:

(1) x,f1(x) A f2;

(2) (x:f1(x)) Bf2;

(3) there exists some ( x1: x2) B f1 such that (x:x1 ),(f1(x) :x2)Bf2 and (x:x1 )(f1(x) :x2).

By the definition, we have Af2 Af1 when Bf1Bf2. And for any x Af 1, if x Af 1 Af 2, then f2(x)=x Af2 Af1; if x Af 1 Af 2, then (x:f2 (x))Bf2, note that x Af 1, and so (x:f2 (x)) Bf 1(i.e., x, f2( x) Af 1). Now we can get the following corollary by Theorem 1.1.

Corollary 1.1  Let f1(x), f2(x) Fq[ x] be involutions over Fq and Bf1Bf2. Then f 1f2(x) is an involution over Fq.

On the other hand, if Af1= Af 2 and Bf1=Bf2, then f1(x)= f2(x), thus we have

Corollary 1.2  Let f1(x), f2(x) Fq[ x] be involutions over Fq, and A f1=Af2, Bf1= Bf 2. Then f1 f2(x) is an involution over Fq, and for any x Fq, f1 f2(x)= x.

Remark 1.1 From the group’s point of view, for f1,f2 Sym(Fq ), if ord(f1)=or d(f 2)= 2. Then ord(f1f2)=2 if and only if f1f 2=f2f1.

Theorem 1.1 can be used to judge whether f1f2(x) is an involution according to the set of fixed points and the set of non-fixed points of two involutions f1(x),f2(x); Remark 1.1 can be used to judge whether f1 f2(x) is an involution according to f1 f2(x)= f2 f1(x) or not. When the fixed points set and the non-fixed points set of two involutions are determined, it's more convenient to judge whether f1f2(x) is an involution by Theorem 1.1; when the explicit formulas of two involutions are determined, it's more convenient to judge whether f1 f2(x) is an involution by Remark 1.1.

For f3(x)=f1f2(x), if f1(x)=x or f2(x)=x, then f3(x)=f2(x) or f3(x)=f1(x) correspondingly; if f1(x)x and f2(x)x, then f3(x)f1(x) and f3(x)f2(x). According to Theorem 1.1, f3(x) is a new involution over Fq.

Corollary 1.3

Af3= Af 1 Af2{α | βFq ,(α:β)Bf1 Bf2},

Bf3={( α:f3(α))| α FqAf3}.

For some special q and special involutions f1(x),f2(x)Fq, the number of the involution f1f2(x) over Fq can be accurately calculated. Let's consider the involutions of the following form

fi(x)= fr ,ai, bi(x) =aibi2xq 12+r+ai+b i2xrFq[x] (fi(x)x, i=1,2 ),

where 12 is viewed as the inverse of 2 modulo q1 if q is even.

Corollary 1.4 (1) There are exactly 26 involutions in the formf1f2(x)over F7listed inTab.1.

(2) There are exactly 158 involutions in the form f1f2(x) over F13 listed in Tab.2.

2 Proofs for main results

Proof for Theorem 1.1 We prove the necessity first. For any x Fq, there are two cases because of Fq=A f1˙(Fq A f1)=Af2˙(Fq A f2).

Case 1 For any x Af 1, since f1f2(x) is an involution over Fq, we have

f1 f2 f1 f2(x)= x.

Note that Af1 is the set of fixed points of f1(x), so we have f2f1f2(x)=x. Note that f2(x) is also an involution over Fq, so we have f1f2(x)=f2(x) and

f2(x) Af1.

Case 2 For x Fq Af 1, it's easy to show that f1(x) Fq Af 1 and (x:f1 (x))Bf1.

(1) For the case

x,f1 (x)Af2,

the conclusion is immediately.

(2) For the case xAf2 and f1(x) Af2, there exists some x FqAf2 such that xf1(x) and ( f1(x): x ) B f2. So

f1 f2 f1 f2(x)= f1 f2 f1(x)= f1(x).

Since f1f2(x) is an involution over Fq, f1f2f1f2(x)=x, which means f1(x)=x. Note that f1(x) is an involution over Fq, so x=f1(x), which contradicts to the fact xf1(x). Similarly, x Af2 and f1(x)Af2 are both not true.

(3) For the case x,f1(x)A f2, it's easy to see that x, f1( x) Fq Af 2.

(i) If

(x:f1(x)) B f2,

then the conclusion is true.

(ii) If there exist some x1, x2FqAf2 such that (x:x1 ),(f1(x) :x2)Bf2 and (x: x1) (f 1(x ):x 2), then we can conclude (x1 :x2)Bf1.

In fact, since f1 f2(x) is an involution over Fq, if x1Af1, then we can get

x=f1f2f1f2(x)=f1f2f1(x 1)= f1 f2(x1)=f1(x),

which means xAf1. This contradicts to the fact x Fq Af 1. Similarly, x2Af1. Thus we have x1,x2 Fq A f1.

Noting that any two elements in Fq Af 1 can form a transposition, there exist some x3, x4FqAf1 such that ( x1: x3) , (x2:x4 )B f1. On the one hand, since f1f2(x) is an involution over Fq, we have

x=f1f2f1f2(x)=f1f2f1(x 1)= f1 f2(x3).

Since f1(x),f2(x) are both involutions over Fq, we can use f1 to act on both sides of the formula above to get f2( x3) =f1(x) first, and then use f2 to act on both sides to get f2 f1(x)= x3. On the other hand, since (f1(x):x2) is a transposition and (f1(x):x2) Bf 2, we can get f2f1(x)=x2 and x3= x2. Similarly, we have x4=x 1. And so

(x1:x2 )B f1.

Next, we prove the sufficiency. Noting that Fq=A f1 ˙(Fq A f1), for any x Fq, there are two cases.

Case 1 For the case x Af 1, noting that f2(x)Af1 and f2(x) Fq is an involution over Fq, we can get

f1 f2 f1 f2(x)= f1 f2 f2(x)= f1(x)= x.

Case 2 For the case x Fq Af 1, we have f1(x)FqAf1 and (x:f1 (x))Bf1.

(1) For x,f1(x)Af2, noting that f1(x)Fq is an involution over Fq and Af2 is the set of fixed points of f2(x) over Fq, we can get

f1 f2 f1 f2(x)= f1 f2 f1(x)= f1 f1(x)= x.

(2) For (x: f1( x))Bf2, noting that f1(x),f2(x)Fq[x] are both involutions over Fq and f2(x)=f1(x), we can get

f1 f2 f1 f2(x)= f1 f2 f1 f1(x)= f1 f2(x)= f1 f1(x)= x.

(3) If there exists some (x1:x2 )B f1 such that (x:x1 ),(f1(x) :x2)Bf2 and (x: x1) (f 1(x ):x 2), then

f1 f2 f1 f2(x)= f1 f2 f1(x1)=f1f2(x 2)= f1 f1(x)= x.

Now from (2.1)-(2.4), for any x Fq, f1 f2 f1 f2(x)= x. And then f1 f2(x) is an involution over Fq by the definition.

3 Examples

In this section, we give some examples to further check Theorem 1.1. Example 3.1 is for the case q=7; Examples 3.2−3.4 are for the case q=13; Example 3.5 is for the case q=23.

For convenience, we first give the following

Lemma 3.1 [12]  Let a,bFq ,rZ+ ,f r,a,b(x) =ab2xq 12+r+a +b2 xrFq[x]. Then fr ,a,b(x) is an involution over Fq if and only if the following conditions are true simultaneously.

(1) r21 (mod q12);

(2) ab2 aq12+r+ a+b 2ar =1;

(3) (1) ra b2b q12+r+ a+b2br= (1 ) 2( r21 )q1.

From Lemma 3.1, we have the following two corollaries.

Corollary 3.1  For q=13, fr,a,b( x) is an involution over F13 if and only if r, a, b are given as follows:

And the corresponding truth table is asTable 3.

Corollary 3.2  For q=7, fr,a,b( x) is an involution over F7 if and only if r, a, b are given as follows:

And the corresponding truth table is listed in Tab.6.

Example 3.1 Let f1(x)=4x5+3 x4+4 x2+4 x. Then the truth table of f1(x) is as follows.

From the truth table, we can show that f1(x) is an involution over F7 and

Af1={0, 1,3, 2,1,}, Bf1={(2: 3)}.

Let f2(x)=x5. Then the truth table of f2(x) is as follows.

From the truth table, we know that f2(x) is an involution over F7 and

Af2={0, 1,1},Bf2={(2: 3),(3: 2)}.

On the one hand, from f1 f2(x)= x5(4x5 +3x3+4x2+4) and the following truth table, we know that f1f2(x) is an involution over F7.

On the other hand, from

Af1={0, 1,3, 2,1,}, Bf1={(2: 3)},

Af2={0, 1,1},Bf2={(2: 3),(3: 2)},

we can get

Bf1 Bf2.

Now by Corollary 1.1, f1 f2(x) is an involution over F7.

Example 3.2 Let f1(x)=5x11+10x10+ 4x9+ 2x8+ 4x7+ 7x5+ 2x4+ 8x3+ 7x2+ 7x. Then the truth table of f1(x) is as follows.

From the truth table, we can show that f1(x) is an involution over F13 and

Af1={0, 5,5,6,4 ,2,1},Bf1={(1 :4), (2: 6),(3: 3)}.

Let f2(x)=x5( 52x6+32)=9 x11+8x 5. Then the truth table of f2(x) is as follows.

From the truth table, we know that f2(x) is an involution over F13 and

Af2={0}, Bf2={( 1:4) ,(2: 6),(3: 3),(5: 5),(6: 2),(4: 1)}.

On the one hand, from f1 f2(x)= x5(11x11+ 5x 10+6 x9+7 x8+4 x6+3 x5+9 x4+11 x3+9 x2+1 ) and the following truth table, we know that f1 f2(x) is an involution over F13.

On the other hand, from

Af1={0, 5,5,6,4 ,2,1},Bf1={(1 :4), (2: 6),(3: 3)},

Af2={0}, Bf2={( 1:4) ,(2: 6),(3: 3),(5: 5),(6: 2),(4: 1)},

we can get

Bf1 Bf2.

Now by Corollary 1.1, f1 f2(x) is an involution over F13

Example 3.3 Let f1(x)=9x7+11x. Then the truth table of f1(x) is as follows.

From the truth table, we can show that f1(x) is an involution over F13 and

A1={0}, Bf1={( 1:6),( 2:4) ,(3: 5),(5: 3),(6: 1),(4:2)} .

Let f2(x)=x7. Then the truth table of f2(x) is as follows.

From the truth table, we know that f2(x) is an involution over F13 and

Af2={0, 1,3,4 ,4,3,1}, Bf2={(2: 2),(5: 5),(6: 6)}.

On the one hand, from f1 f2(x)= x7(9x6 +11) and the following truth table, we know that f1f2(x) is a permutation polynomial over F13, but not an involution over F13.

On the other hand, from

Af1={0}, Bf1={( 1:6),( 2:4) ,(3: 5),(5: 3),(6: 1),(4:2)} ,

Af2={0, 1,3,4 ,4,3,1}, Bf2={(2: 2),(5: 5),(6: 6)},

we know that f1 f2(x) is not an involution over F13 by Theorem 1.1.

Example 3.4 Let f1(x)=4x72x. Then the truth table of f1(x) is as follows.

From the truth table, we can show that f1(x) is an involution over F13 and

Af1={0}, Bf1={( 1:2) ,(3: 6),(4: 5),(5: 4),(6: 3),(1:2)} .

Let f2(x)=5 x11. Then the truth table of f2(x) is as follows.

From the truth table, we know that f2(x) is an involution over F13 and

Af2={0}, Bf2={( 1:5) ,(2: 4),(3: 6),(4: 2),(6: 3),(5:1)} .

On the one hand, from f1 f2(x)= 3x 11+6 x5 and the following truth table, we know that f1 f2(x) is an involution over F13.

On the other hand, from

Af1={0}, Bf1={( 1:2) ,(3: 6),(4: 5),(5: 4),(6: 3),(1:2)} ,

Af2={0}, Bf2={( 1:5) ,(2: 4),(3: 6),(4: 2),(6: 3),(5:1)} ,

we know that f1 f2(x) is an involution over F13 by Theorem 1.1.

Example 3.5 Let γ F2 3 be a primitive element of F2 3. Then the minimum polynomial of γ over F2 is x3+x+1, and γ3=γ+1.

Let f1(x)=γ6x6+γ4x5+γ2 x3+γ 4. Then the truth table of f1(x) is as follows.

From the truth table, we can show that f1(x) is an involution over F23 and

Af1={1, γ},B f1={(0 :γ4),( γ2: γ3),(γ5:γ6) }.

Let f2(x)=γ x6. Then the truth table of f2(x) is as follows.

From the truth table, we know that f2(x) is an involution over F23 and

Af2={0, γ4}, Bf2={( 1:γ),(γ2:γ6) ,(γ 3:γ5)}.

On the one hand, from f1 f2(x)= γ5x 4+γ2x2+γ5x+γ4 and the following truth table, we know that f1f2(x) is an involution over F23.

On the other hand, from

Af1={1, γ},B f1={(0 :γ4),( γ2: γ3),(γ5:γ6) },

Af2={0, γ4}, Bf2={( 1:γ),(γ2:γ6) ,(γ 3:γ5)},

we know that f1 f2(x) is an involution over F23 by Theorem 1.1.

References

[1]

BanikSBogdanov AIsobeT, . Midori: A block cipher for low energy. In: Advances in Cryptology—ASIACRYPT 2015, Part II, Lecture Notes in Comput Sci, Vol 9453. Heidelberg: Springer, 2015, 411–436

[2]

BorghoffJCanteaut AGüneysuT, . PRINCE—a low-latency block cipher for pervasive computing applications. In: Advances in Cryptology—ASIACRYPT 2012, Lecture Notes in Comput Sci, Vol 7658. Heidelberg: Springer, 2012, 208–225

[3]

CanteautARoué J. On the behaviors of affine equivalent S-boxes regarding differential and linear attacks. In: Advances in Cryptology—EUROCRYPT 2015, Part I, Lecture Notes in Comput Sci, Vol 9056. Heidelberg: Springer, 45–74

[4]

Castro F N, Corrada-Bravo C, Pacheco-Tallaj N. . Explicit formulas for monomial involutions over finite fields. Adv Math Commun 2017; 11(2): 301–306

[5]

CharpinPMesnager SSarkarS. Dickson polynomials that are involutions. In: Contemporary Developments in Finite Fields and Applications. Hackensack, NJ: World Sci Publ, 2016, 22: 22–47

[6]

Charpin P, Mesnager S, Sarkar S. Involutions over the Galois field F2n. IEEE Trans Inform Theory 2016; 62(4): 2266–2276

[7]

Coulter R S, Mesnager S. Bent functions from involutions over F2n. IEEE Trans Inform Theory 2018; 64(4): part 2, 2979–2986

[8]

Fu S H, Feng X T. Involutory differentially 4-uniform permutations from known constructions. Des Codes Cryptogr 2019; 87(1): 31–56

[9]

Gallager R G. Low-density parity-check codes. IRE Trans Inform Theory 1962; 8(1): 21–28

[10]

MesnagerS. On constructions of bent functions from involutions. In: 2016 IEEE International Symposium on Information Theory, IEEE, 2016: 110–114.

[11]

Niu TL, Li K Q, Qu L J. . New constructions of involutions over finite fields. Cryptogr Commun 2020; 12(2): 165–185

[12]

Zheng D B, Yuan M, Li N. . Constructions of involutions over finite fields. IEEE Trans Inform Theory 2019; 65(12): 7876–7883

RIGHTS & PERMISSIONS

Higher Education Press 2022

AI Summary AI Mindmap
PDF (803KB)

661

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/