Quantcast
Channel: Active questions tagged bijection - Cryptography Stack Exchange
Browsing latest articles
Browse All 28 View Live

Selecting bijective functions for permutations

How would one go about selecting an appropriate bijective function for introducing permutations into a cipher or hash?For example, $f(x) = x+1 \space mod \space n$ is a bijective function, but isn't...

View Article



Are there any bijective one-way functions not based on number-theoretic...

I'm trying to find a bijective function $y=F(x)$ which should be easy to compute in one direction but hard to compute in the other, where the one-way property is not based on a number theoretic...

View Article

Need 32-bit mixing function that has perfect avalanche between octets

for my hobby tinkering project, I need a mixing function that takes 32-bit input and has 32-bit output (and will, most likely, run in a 32-bit C environment) and the following property (independent of...

View Article

Image may be NSFW.
Clik here to view.

Why is a Feistel network bijective?

EDIT: Fixed for clarity of intentionI was reading "The FFX Mode of Operation for Format-Preserving Encryption" when I came across Figure 1 (see below). It's obvious why it's reversible (top-down then...

View Article

I read ECB is bad because the same plaintext outputs the same ciphertext....

In the Wikipedia article on Block Ciphers, it says about the Electronic Code Block mode:The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext...

View Article


Image may be NSFW.
Clik here to view.

Create a bijective and invertible table that are depending on the cipher key

I'm creating my own symmetric-key algorithm that in many ways are similar to DES. My key is 16 bits long and is random generated, I will encrypt blocks of 16 bit strings that are split into two 8 bit...

View Article

Are non bijective sboxes weaker (on feistel networks)?

I have heard it anecdotically that non-bijective sboxes are potentially weaker to be used in designs like feistel networks. (since by design, it is allowed for the sbox to be non-reversible)Is that a...

View Article

Does there exist a deterministic, invertible function $\{0,1\}^n \rightarrow...

One of the requirements for a function to be a PRP isFor any $K \in \{0,1\}^s$, $F$ is a bijection from $\{0,1\}^n \rightarrow \{0,1\}^n$.Taken from WikipediaDoes this have to be explicitly said? Is it...

View Article


Is triple-CRC-32 a bad (or not) idea for generating a uniform distribution...

I have an input of 288 bits (comprising 4 × 32-bit and 10 × 16-bit integers). I need to hash this to 96 bits with as few collisions as possible.I'm aware that CRC is a bijective hash, thus ensuring...

View Article


Random semantic security and bijective PRGs

I'm working through Boneh and Shoup's "Graduate Course in Applied Cryptography", and have just finished reading the chapter on stream ciphers and PRGs.The first exercise for this chapter introduces the...

View Article

Key-Bijective Secure Symmetric Encryption Methods

In AES, an N-bit message is mapped 1-to-1 message-to-output (for a fixed key).If we use a key with N bits, however, the key is not mapped 1-to-1 key-to-output(for a fixed message).So, is there any...

View Article

Symmetric property of DDT of inverse function

Given a bijective function $F: \mathbb{F}_2^n \rightarrow \mathbb{F}_2^n$.The entry of the Difference Distribution Table (DDT) at row $\alpha$ and column $\beta$ is defined as$$DDT_{F}(\alpha,\beta) =...

View Article

Rekeying procedure - how "far" from bijection?

Imagine that I want to change the key in order to prevent side-channel attacks on key and to protect against big load on the one key. It is desirable that key change procedure would look like random...

View Article


A bijective hash function

Suppose:$H: \{0,1\}^{n} \rightarrow \{0,1\}^{n}$.$H$ is bijective.It is difficult to derive $x$ from $H(x)$.Is this type of function possible? What would the strength of it be?I realize that RSA and...

View Article

Are bijective polynomials of degree $2 \bmod 2^m$ efficiently inverted?

Take a bijective polynomial of degree $2 \bmod 2^{64}$ like:$m = (n(n+1)/2)\ \bmod 2^{64}$It is bijective and can trivially be inverted for numbers up to $2^{32}$ by calculating...

View Article


Why $f(x)=x^e$ is a bijection i.f.f $e\in{\mathbf{Z^*_{\phi(N)}}}$?

I understand that if $e\in{\mathbf{Z^*_{\phi(N)}}}$ then $\gcd(e,\phi(N))=1$and if $e\not\in{\mathbf{Z^*_{\phi(N)}}}$ than $\gcd(e,\phi(N))\neq{}1$.But I couldn't figure out why this implies bijection...

View Article

Is it reasonable to consider that an encryption scheme must be invertible?

I am in a dispute regarding a test question in an exam.The question is something like that:What would happen if one were to use RSA with $n=100$ and $e=13$ toencrypt a message $m$?a) You would be able...

View Article


Proving that RSA encryption function with non-square free modulus is not a...

Here is a backgroung for the question on hand. While studying RSA I came up to the question about what happens if $p$ and $q$ involved in modulus computation are not actually primes? There is already a...

View Article

Bijective function with unknown reciprocal function

I have a use case where I need to build a unique identifier for my users with the email address and the "family member number". However, the two personal informations used to build the identifier must...

View Article

How is the 'Algebraic Degree' calculated in the paper about analysing the...

This paper proposed a new attack on the initial white-box AES implementation of Chow et al.In order to determine the good solution, we use theparticular structure of the function $S_{0}$.$S^{-1} \circ...

View Article

How is it possible to prove that Shanon entropy does not change applying any...

I was wondering how is it possible to mathematically prove that Shannon entropy does not change when applying any bijective function to X? For instance H(X) = H(f(X)) assuming that f is invertible and...

View Article


How to prove that permutation and substitution ciphers satisfy H(X) = H(Y) in...

I was not able to mathematically prove that all permutation and substitution ciphers satisfy H(X)=H(Y) if we say that Y is the set of ciphertexts while X is the corresponding set of plaintexts in...

View Article


Hash functions, bijectiveness, and entropy

For those who don't know, a bijective function is one for which each input yields one and only one output. A block cipher, for example, is guaranteed to be bijective or you could not decrypt.When a...

View Article

Explain mixing bijection with an example

I am reading whitebox AES. "Mixing Bijection" is one of the important definition. For example, I copy one paragraph here:The look-up tables that incorporate bytes of round keys can be considered...

View Article

Does an binary elliptic curve like sect571r1 support a bijective asymmetric...

I'm wondering if a binary elliptic curve (such as sect571r1 aka B-571) supports pairs of asymmetric operations (for example, either sign/verify or encrypt/decrypt) on a fixed bit or byte input size in...

View Article


How are the cipher, the key and the initial message (that is not encrypted)...

Suppose that $m$ is a message that someone player $i$ wants to send to a network of other players $j\neq -i$. The player to prevent his message from cheating by others uses an encyrpstion scheme. Say...

View Article

Find two hard to reverse functions f and h such that f ∘ h ∘ g = h (f and h...

I am looking from 3 functions $f,g,h$ from $\mathbb N \to \mathbb N$ (they can be bijections, they need to be injective at least), such that:$$f \circ h \circ g = h $$and $f$ is hard to reverse...

View Article

Public one-way bijection

What methods do we know to construct a function $f:D\to D$with domain $D=[0,n)\cap\mathbb N$ (thus $n\in\mathbb N$ elements);demonstrably surjective (thus bijective since $D$ is finite);with definition...

View Article
Browsing latest articles
Browse All 28 View Live




Latest Images