Title of article :
Cryptological Applications of Permutation Polynomials
Author/Authors :
Gupta، نويسنده , , Indivar and Narain، نويسنده , , Laxmi and Veni Madhavan، نويسنده , , C.E.، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2003
Pages :
1
From page :
91
To page :
91
Abstract :
Permutation polynomials(PP) are of great interest in the study of finite fields and their applications in cryptography and coding. A polynomial P(x) = a0 + a1x + a2x2 +…+ adxd with coefficients a1 in a ring R is said to be a PP if P permutes the elements of R. nditions for an arbitrary polynomial to be a PP over finite fields are however rather complicated. Lidl and Mullen [1] discuss a number of open problems regarding PP. Among these problems, is the problem of determining Nd(q), the number of PP over Fq of degree d where 1 ≤ d ≤ q − 2 and d q − 1. Recently Rivest[2] proposed a simple characterization of PP modulo n = 2W. We deduce a result on the enumeration of Nd(q) based on this. s paper we bring to focus certain properties of permutation polynomials (PP) that have been exploited for cryptological applications. We develop a methodology to completely cryptanalyse an encryption scheme proposed by Levine and Brawley [3] and similar symmetric key based schemes. We also consider the design of asymmetric cryptosystems based on permutation polynomials analogous to RSA. The function composition of permutation polynomials plays the role of modular exponentiation. We evaluate the complexity of this function composition based encryption. We show that PP based scheme is slower by a constant factor.
Journal title :
Electronic Notes in Discrete Mathematics
Serial Year :
2003
Journal title :
Electronic Notes in Discrete Mathematics
Record number :
1453546
Link To Document :
بازگشت