Javascript must be enabled to continue!
METHODS FOR CONSTRUCTING PERMUTATIONS OF AN ARBITRARY FINITE FIELD AND THEIR LINEAR CHARACTERISTICS
View through CrossRef
Permutations in a finite field (bijective transformations) are actively studied in many applications, including in information security theory. Permutations are often used as elements for building information processing nodes. In the middle of the 20th century, K. Shannon theoretically justified the basic requirements for mapping performed on such nodes. Currently, when constructing bijective transformations, these requirements are provided by the composition of nonlinear representations given by the table in the field GF(2). The presented paper summarizes the results of work [1] on methods for increasing the dimension of stationary functional systems. Namely, in this paper, approaches to the construction of new permutations from the initial permutations in the finite field are investigated. The linear characteristic is calculated for the constructed permutations. The problem of constructing permutations given by coordinate functions is difficult. The relevance of the topic of the paper is determined by the need to search for new theoretically sound methods for constructing s permutation classes in multidimensional spaces with the required combinatorial-algebraic properties. The paper considers several methods for constructing substitutions of finite fields from initial permutations acting on vectors of smaller dimension. In the binary case, this allows us to find the nonlinearity of the substitutions under consideration, characterizing the proximity of linear combinations of coordinate functions of permutations to the entire class of affine functions. The results of the presented work somewhat expand the possibilities of constructing permutations for an arbitrary finite field.
Kazakh-British Technical University
Title: METHODS FOR CONSTRUCTING PERMUTATIONS OF AN ARBITRARY FINITE FIELD AND THEIR LINEAR CHARACTERISTICS
Description:
Permutations in a finite field (bijective transformations) are actively studied in many applications, including in information security theory.
Permutations are often used as elements for building information processing nodes.
In the middle of the 20th century, K.
Shannon theoretically justified the basic requirements for mapping performed on such nodes.
Currently, when constructing bijective transformations, these requirements are provided by the composition of nonlinear representations given by the table in the field GF(2).
The presented paper summarizes the results of work [1] on methods for increasing the dimension of stationary functional systems.
Namely, in this paper, approaches to the construction of new permutations from the initial permutations in the finite field are investigated.
The linear characteristic is calculated for the constructed permutations.
The problem of constructing permutations given by coordinate functions is difficult.
The relevance of the topic of the paper is determined by the need to search for new theoretically sound methods for constructing s permutation classes in multidimensional spaces with the required combinatorial-algebraic properties.
The paper considers several methods for constructing substitutions of finite fields from initial permutations acting on vectors of smaller dimension.
In the binary case, this allows us to find the nonlinearity of the substitutions under consideration, characterizing the proximity of linear combinations of coordinate functions of permutations to the entire class of affine functions.
The results of the presented work somewhat expand the possibilities of constructing permutations for an arbitrary finite field.
Related Results
Distribution of Segment Lengths in Genome Rearrangements
Distribution of Segment Lengths in Genome Rearrangements
The study of gene orders for constructing phylogenetic trees was introduced by Dobzhansky and Sturtevant in 1938. Different genomes may have homologous genes arranged in different...
ALGORITHMS TO REALIZE AN ARBITRARY BPC PERMUTATION IN CHORDAL RING NETWORKS WITH FAILURES
ALGORITHMS TO REALIZE AN ARBITRARY BPC PERMUTATION IN CHORDAL RING NETWORKS WITH FAILURES
A family of regular graphs of degree 3, called chordal rings is presented as a possible candidate for the implementation of a distributed system and for fault-tolerant architecture...
The locally crooked permutations and the complete permutations over F2n
The locally crooked permutations and the complete permutations over F2n
Abstract
The crooked function has a fixed point $0$ and all its difference set is the complement of the hyperplane. In this paper, we proposed the locally crooked permutati...
A lower bound for general t-stack sortable permutations via pattern avoidance
A lower bound for general t-stack sortable permutations via pattern avoidance
There is no formula for general t-stack sortable permutations. Thus, we attempt to study them by establishing lower and upper bounds. Permutations that avoid certain pattern sets p...
MATRIKS BAKU UNTUK TRANSFORMASI LINIER PADA RUANG VEKTOR DIMENSI TIGA
MATRIKS BAKU UNTUK TRANSFORMASI LINIER PADA RUANG VEKTOR DIMENSI TIGA
The linear transformation is a function relating the vector ke . If , then the transformation is called a linear operator. Several examples of linear operators have been introduc...
Three Problems in the Asymptotic Order of Group Elements
Three Problems in the Asymptotic Order of Group Elements
This thesis investigates three distinct questions concerning the asymptotic average order of certain group theoretic objects. The three main chapters can be read independently. In ...
Low-Velocity Non-Linear Numerical Simulation in Tight Sandstone Oil Reservoirs
Low-Velocity Non-Linear Numerical Simulation in Tight Sandstone Oil Reservoirs
Abstract
Micro and nano throats are widely distributed in tight sandstone oil reservoirs and non-linear flow characteristics are obvious. However, no existing non-li...
Axiomatization of modal logic with counting
Axiomatization of modal logic with counting
Abstract
Modal logic with counting is obtained from basic modal logic by adding cardinality comparison formulas of the form $ \#\varphi \succsim \#\psi $, stating th...

