Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The state diagram of $$\chi $$

View through CrossRef
AbstractIn symmetric cryptography, block ciphers, stream ciphers and permutations often make use of a round function and many round functions consist of a linear and a non-linear layer. One that is often used is based on the cellular automaton that is denoted by$$\chi $$χas a Boolean map on bi-infinite sequences,$${\mathbb {F}}_2^{{\mathbb {Z}}}$$F2Z. It is defined by$$\sigma \mapsto \nu $$σ↦νwhere each$$\nu _i = \sigma _i + (\sigma _{i+1}+1)\sigma _{i+2}$$νi=σi+(σi+1+1)σi+2. A map$$\chi _n$$χnis a map that operates onn-bit arrays with periodic boundary conditions. This corresponds with$$\chi $$χrestricted to periodic infinite sequences with period that dividesn. This map$$\chi _n$$χnis used in various permutations, e.g.,Keccak-f (the permutation in SHA-3), ASCON (the NIST standard for lightweight cryptography), Xoodoo, Rasta and Subterranean (2.0). In this paper, we characterize the graph of$$\chi $$χon periodic sequences. It turns out that$$\chi $$χis surjective on the set ofallperiodic sequences. We will show what sequences will give collisions after one application of$$\chi $$χ. We prove that, for oddn, the order of$$\chi _n$$χn(in the group of bijective maps on$${\mathbb {F}}_2^n$$F2n) is$$2^{\lceil {\text {lg}}(\frac{n+1}{2})\rceil }$$2⌈lg(n+12)⌉. A given periodic sequence lies on a cycle in the graph of$$\chi $$χ, or it can be represented as a polynomial. By regarding the divisors of such a polynomial one can see whether it lies in a cycle, or after how many iterations of$$\chi $$χit will. Furthermore, we can see, for a given$$\sigma $$σ, the length of the cycle in its component in the state diagram. Finally, we extend the surjectivity of$$\chi $$χto$${\mathbb {F}}_2^{{\mathbb {Z}}}$$F2Z, thus to include non-periodic sequences.
Springer Science and Business Media LLC
Title: The state diagram of $$\chi $$
Description:
AbstractIn symmetric cryptography, block ciphers, stream ciphers and permutations often make use of a round function and many round functions consist of a linear and a non-linear layer.
One that is often used is based on the cellular automaton that is denoted by$$\chi $$χas a Boolean map on bi-infinite sequences,$${\mathbb {F}}_2^{{\mathbb {Z}}}$$F2Z.
It is defined by$$\sigma \mapsto \nu $$σ↦νwhere each$$\nu _i = \sigma _i + (\sigma _{i+1}+1)\sigma _{i+2}$$νi=σi+(σi+1+1)σi+2.
A map$$\chi _n$$χnis a map that operates onn-bit arrays with periodic boundary conditions.
This corresponds with$$\chi $$χrestricted to periodic infinite sequences with period that dividesn.
This map$$\chi _n$$χnis used in various permutations, e.
g.
,Keccak-f (the permutation in SHA-3), ASCON (the NIST standard for lightweight cryptography), Xoodoo, Rasta and Subterranean (2.
0).
In this paper, we characterize the graph of$$\chi $$χon periodic sequences.
It turns out that$$\chi $$χis surjective on the set ofallperiodic sequences.
We will show what sequences will give collisions after one application of$$\chi $$χ.
We prove that, for oddn, the order of$$\chi _n$$χn(in the group of bijective maps on$${\mathbb {F}}_2^n$$F2n) is$$2^{\lceil {\text {lg}}(\frac{n+1}{2})\rceil }$$2⌈lg(n+12)⌉.
A given periodic sequence lies on a cycle in the graph of$$\chi $$χ, or it can be represented as a polynomial.
By regarding the divisors of such a polynomial one can see whether it lies in a cycle, or after how many iterations of$$\chi $$χit will.
Furthermore, we can see, for a given$$\sigma $$σ, the length of the cycle in its component in the state diagram.
Finally, we extend the surjectivity of$$\chi $$χto$${\mathbb {F}}_2^{{\mathbb {Z}}}$$F2Z, thus to include non-periodic sequences.

Related Results

North Syrian Mortaria and Other Late Roman Personal and Utility Objects Bearing Inscriptions of Good Luck
North Syrian Mortaria and Other Late Roman Personal and Utility Objects Bearing Inscriptions of Good Luck
<span style="font-size: 11pt; color: black; font-family: 'Times New Roman','serif'">&Pi;&Eta;&Lambda;&Iota;&Nu;&Alpha; &Iota;&Gamma;&Delta...
L᾽«unilinguisme» officiel de Constantinople byzantine (VIIe-XIIe s.)
L᾽«unilinguisme» officiel de Constantinople byzantine (VIIe-XIIe s.)
&nbsp; <p>&Nu;ί&kappa;&omicron;&sigmaf; &Omicron;&iota;&kappa;&omicron;&nu;&omicron;&mu;ί&delta;&eta;&sigmaf;</...
Aplikasi Pengelolaan Perpustakaan di SMPN 1 Cibeber
Aplikasi Pengelolaan Perpustakaan di SMPN 1 Cibeber
Perpustakaan SMPN 1 Cibeber merupakan unit penyedia fasilitas pengadaan dan peminjaman buku. Dalam pelaksanaan tugas pokoknya, terdapat kegiatan yaitu pendataan daftar buku, peminj...
Venn diagrams in bioinformatics
Venn diagrams in bioinformatics
AbstractVenn diagrams are widely used tools for graphical depiction of the unions, intersections and distinctions among multiple datasets, and a large number of programs have been ...
Algorithms for drawing trees (abstract)
Algorithms for drawing trees (abstract)
In several application areas of software engineering intermediate and final products of the design activity are represented by means of diagrams. Diagrams present several advantage...
Karakteristik Madden-Julian Oscillation (MJO) Ketika El-Nino Southern Oscillation (ENSO)
Karakteristik Madden-Julian Oscillation (MJO) Ketika El-Nino Southern Oscillation (ENSO)
Perkembangan peristiwa El-Nino Southern Oscillation (ENSO) menunjukkan peran penting bagi Madden-Julian Oscillation (MJO). Variasi angin permukaan (UWND) dan konveksi (OLR) intramu...
25th anniversary study: the anomalous electromagnetic signals appear before the 21 September 1999 M7.7 Chi-Chi earthquake
25th anniversary study: the anomalous electromagnetic signals appear before the 21 September 1999 M7.7 Chi-Chi earthquake
Electromagnetic anomalous variations of the geomagnetic field, lightning activity, ionospheric F2-peak plasma frequency, GPS total electron content (TEC), etc. have been observed a...

Back to Top