College of Mathematical Science, Sichuan Normal University, Chengdu 610066 China
qunyingliao@sicnu.edu.cn
Show less
History+
Received
Accepted
Published
Issue Date
Revised Date
2022-12-13
PDF
(803KB)
Abstract
In 2020, Niu et al. [Cryptogr. Commun., 2020, 12(2): 165−185] studied the fixed points of involutions over the finite field with -elements. This paper further discusses the relationship between the fixed points set and the non-fixed points set of two involutions and over the finite field , and then obtains a necessary and sufficient condition for that the composite function is also an involution over . In particular, a special class of involutions over some finite fields is determined completely.
Zhaohui ZHANG, Qunying LIAO.
A new construction for involutions over finite fields.
Front. Math. China, 2022, 17(4): 553-565 DOI:10.1007/s11464-022-1023-0
Let be a prime power, be the finite field with elements, and denote its multiplicative group. A polynomial is called a permutation polynomial when the mapping defined by is a one-by-one mapping from to itself. Moreover, is called an involution over if the compositional inverse of is also (i.e., for any , ). From the definition of the permutation polynomial, it's easy to see that for any given permutation polynomial , corresponds to an element in the group . In particular, if is an involution, then . It's well-known that permutation polynomials are widely used in cryptography, coding theory and combinatorial designs, thus they are particularly important for constructing permutation polynomials with special properties. In many situations, both permutation polynomials and their compositional inverses are required (it’s well-known that a polynomial can be regarded as a function). Therefore, if both the permutation and its compositional inverse are efficient in terms of implementation, it is extremely convenient for practical applications. Especially, the involution with itself the composition inverse are widely used, such as in , [2], [1]. In , the permutation polynomial on used by S-box is an involution. In , a linear involution was used to construct the core cipher. More typically, in , the encryption and the decryption can be performed basing on non-linear involutions over linear spaces with minimal tweaks in the circuit. Recently, Canteaut and Roué [3] have shown that involutions are the best candidates against several cryptanalytic attacks by analyzing the behaviors of the permutation of an affine equivalent class with respect to these attacks. The involution over finite fields can also be used to design codes and construct Bent functions [7, 10]. For instance, Gallager [9] used an involution to update check nodes to obtain the low-complexity hardware implementation of the sum product algorithm which was used for decoding.
To the best of our knowledge, the known involutions over finite fields are a few. In 2016, Charpin et al. [5, 6] firstly studied the explicit expression of the involution, and gave a method to construct new involutions from known involutions by using the combination method and skills for discussing Dickson polynomials in the even characteristic field. In 2017, Castro et al. [4] gave a necessary and sufficient condition for a monomial with a specific number of fixed points to be an involution over finite fields. In 2018, Fu and Feng [8] investigated all of differentially 4-uniform permutations that are known in the literature and determined whether they can be involutory. In 2019, Zheng et al. [12] used the idea of cyclotomic polynomials to give several necessary and sufficient conditions for a special form of polynomials to be an involution. In 2020, Niu et al. [11] gave several necessary and sufficient conditions for another special form of polynomials to be an involution basing on the AGW criterion.
In this paper, basing on the work of Niu et al. and the relationship between the set of fixed points and the set of non-fixed points, we obtain a necessary and sufficient condition for that the composition of two involutions is also an involution. According to the property of an involution's truth table over , we can obtain involutions by using Lagrange Interpolation Formula. Regretly, basing on Lagrange Interpolation Formula, we only obtain an involution once a time and the calculation is complex. Using the necessary and sufficient condition in this paper, two new involutions can be obtained from a known involution by using Lagrangian Interpolation Formula only once.
For convenience, let denote the set of fixed points of a polynomial .
Lemma 1.1 [11] Letbe an involution over , . Thenis even. In particularly, when is odd, .
According to Lemma 1.1, if is an involution, then is even. Let
Because is an involution over , is the set of non-fixed points of over , we can set and be the 2-cycle (i.e., the transposition).
• Denote .
Based on the above results, and the relationship between the fixed points set and the non-fixed points set of two involutions over , we obtain a necessary and sufficient condition for that the composition of two involutions is also an involution, and then a special class of involutions is constructed, namely, we prove the following main results.
Theorem 1.1Letbe involutions over . Thenis an involution over if and only if for any , , and for any , one of the following holds:
(1)
(2)
(3) there exists some such thatand .
By the definition, we have when . And for any , if , then ; if , then , note that , and so (i.e., ). Now we can get the following corollary by Theorem 1.1.
Corollary 1.1Letbe involutions overand . Then is an involution over .
On the other hand, if and , then , thus we have
Corollary 1.2Let be involutions over , and , . Then is an involution over , and for any , .
Remark 1.1 From the group’s point of view, for , if . Then if and only if .
Theorem 1.1 can be used to judge whether is an involution according to the set of fixed points and the set of non-fixed points of two involutions ; Remark 1.1 can be used to judge whether is an involution according to or not. When the fixed points set and the non-fixed points set of two involutions are determined, it's more convenient to judge whether is an involution by Theorem 1.1; when the explicit formulas of two involutions are determined, it's more convenient to judge whether is an involution by Remark 1.1.
For , if or , then or correspondingly; if and , then and . According to Theorem , is a new involution over .
Corollary 1.3
For some specialand special involutions , the number of the involutionovercan be accurately calculated. Let's consider the involutions of the following form
whereis viewed as the inverse of 2 moduloif is even.
Corollary 1.4 (1) There are exactly 26 involutions in the formoverlisted inTab.1.
(2) There are exactly 158 involutions in the form over listed in Tab.2.
2 Proofs for main results
Proof for Theorem 1.1 We prove the necessity first. For any , there are two cases because of .
Case 1 For any , since is an involution over , we have
Note that is the set of fixed points of , so we have . Note that is also an involution over , so we have and
Case 2 For , it's easy to show that and .
(1) For the case
the conclusion is immediately.
(2) For the case and , there exists some such that and . So
Since is an involution over , , which means . Note that is an involution over , so , which contradicts to the fact . Similarly, and are both not true.
(3) For the case , it's easy to see that .
(i) If
then the conclusion is true.
(ii) If there exist some such that and , then we can conclude .
In fact, since is an involution over , if , then we can get
which means . This contradicts to the fact . Similarly, . Thus we have .
Noting that any two elements in can form a transposition, there exist some such that . On the one hand, since is an involution over , we have
Since are both involutions over , we can use to act on both sides of the formula above to get first, and then use to act on both sides to get . On the other hand, since is a transposition and , we can get and . Similarly, we have . And so
Next, we prove the sufficiency. Noting that , for any , there are two cases.
Case 1 For the case , noting that and is an involution over , we can get
Case 2 For the case , we have and .
(1) For , noting that is an involution over and is the set of fixed points of over , we can get
(2) For , noting that are both involutions over and , we can get
(3) If there exists some such that and , then
Now from (2.1)-(2.4), for any , . And then is an involution over by the definition.
3 Examples
In this section, we give some examples to further check Theorem 1.1. Example 3.1 is for the case ; Examples 3.2−3.4 are for the case ; Example 3.5 is for the case .
For convenience, we first give the following
Lemma 3.1 [12] Let . Then is an involution over if and only if the following conditions are true simultaneously.
From Lemma 3.1, we have the following two corollaries.
Corollary 3.1For , is an involution over if and only if , , are given as follows:
And the corresponding truth table is asTable 3.
Corollary 3.2For , is an involution over if and only if , , are given as follows:
And the corresponding truth table is listed in Tab.6.
Example 3.1 Let . Then the truth table of is as follows.
From the truth table, we can show that is an involution over and
Let . Then the truth table of is as follows.
From the truth table, we know that is an involution over and
On the one hand, from and the following truth table, we know that is an involution over .
On the other hand,
we can get
Now by Corollary , is an involution over .
Example 3.2 Let . Then the truth table of is as follows.
From the truth table, we can show that is an involution over and
Let . Then the truth table of is as follows.
From the truth table, we know that is an involution over and
On the one hand, from and the following truth table, we know that is an involution over .
On the other hand,
we can get
Now by Corollary , is an involution over
Example 3.3 Let . Then the truth table of is as follows.
From the truth table, we can show that is an involution over and
Let . Then the truth table of is as follows.
From the truth table, we know that is an involution over and
On the one hand, from and the following truth table, we know that is a permutation polynomial over , but not an involution over .
On the other hand,
we know that is not an involution over by Theorem .
Example 3.4 Let . Then the truth table of is as follows.
From the truth table, we can show that is an involution over and
Let . Then the truth table of is as follows.
From the truth table, we know that is an involution over and
On the one hand, from and the following truth table, we know that is an involution over .
On the other hand,
we know that is an involution over by Theorem .
Example 3.5 Let be a primitive element of . Then the minimum polynomial of over is , and .
Let . Then the truth table of is as follows.
From the truth table, we can show that is an involution over and
Let . Then the truth table of is as follows.
From the truth table, we know that is an involution over and
On the one hand, from and the following truth table, we know that is an involution over .
BanikSBogdanovAIsobeT, . Midori: A block cipher for low energy. In: Advances in Cryptology—ASIACRYPT 2015, Part II, Lecture Notes in Comput Sci, Vol 9453. Heidelberg: Springer, 2015, 411–436
[2]
BorghoffJCanteautAGüneysuT, . PRINCE—a low-latency block cipher for pervasive computing applications. In: Advances in Cryptology—ASIACRYPT 2012, Lecture Notes in Comput Sci, Vol 7658. Heidelberg: Springer, 2012, 208–225
[3]
CanteautARouéJ. On the behaviors of affine equivalent S-boxes regarding differential and linear attacks. In: Advances in Cryptology—EUROCRYPT 2015, Part I, Lecture Notes in Comput Sci, Vol 9056. Heidelberg: Springer, 45–74
[4]
Castro F N, Corrada-Bravo C, Pacheco-Tallaj N. . Explicit formulas for monomial involutions over finite fields. Adv Math Commun2017; 11(2): 301–306
[5]
CharpinPMesnagerSSarkarS. Dickson polynomials that are involutions. In: Contemporary Developments in Finite Fields and Applications. Hackensack, NJ: World Sci Publ, 2016, 22: 22–47
[6]
Charpin P, Mesnager S, Sarkar S. Involutions over the Galois field F2n. IEEE Trans Inform Theory2016; 62(4): 2266–2276
[7]
Coulter R S, Mesnager S. Bent functions from involutions over F2n. IEEE Trans Inform Theory2018; 64(4): part 2, 2979–2986
[8]
Fu S H, Feng X T. Involutory differentially 4-uniform permutations from known constructions. Des Codes Cryptogr2019; 87(1): 31–56
[9]
Gallager R G. Low-density parity-check codes. IRE Trans Inform Theory1962; 8(1): 21–28
[10]
MesnagerS. On constructions of bent functions from involutions. In: 2016 IEEE International Symposium on Information Theory, IEEE, 2016: 110–114.
[11]
Niu TL, Li K Q, Qu L J. . New constructions of involutions over finite fields. Cryptogr Commun2020; 12(2): 165–185
[12]
Zheng D B, Yuan M, Li N. . Constructions of involutions over finite fields. IEEE Trans Inform Theory2019; 65(12): 7876–7883
RIGHTS & PERMISSIONS
Higher Education Press 2022
AI Summary 中Eng×
Note: Please be aware that the following content is generated by artificial intelligence. This website is not responsible for any consequences arising from the use of this content.