The Quasigroup Block Cipher and Its Analysis Matthew .J Battey University of Nebraska at Omaha
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Sketch Notes — Rings and Fields
Sketch Notes — Rings and Fields Neil Donaldson Fall 2018 Text • An Introduction to Abstract Algebra, John Fraleigh, 7th Ed 2003, Adison–Wesley (optional). Brief reminder of groups You should be familiar with the majority of what follows though there is a lot of time to remind yourself of the harder material! Try to complete the proofs of any results yourself. Definition. A binary structure (G, ·) is a set G together with a function · : G × G ! G. We say that G is closed under · and typically write · as juxtaposition.1 A semigroup is an associative binary structure: 8x, y, z 2 G, x(yz) = (xy)z A monoid is a semigroup with an identity element: 9e 2 G such that 8x 2 G, ex = xe = x A group is a monoid in which every element has an inverse: 8x 2 G, 9x−1 2 G such that xx−1 = x−1x = e A binary structure is commutative if 8x, y 2 G, xy = yx. A group with a commutative structure is termed abelian. A subgroup2 is a non-empty subset H ⊆ G which remains a group under the same binary operation. We write H ≤ G. Lemma. H is a subgroup of G if and only if it is a non-empty subset of G closed under multiplication and inverses in G. Standard examples of groups: sets of numbers under addition (Z, Q, R, nZ, etc.), matrix groups. Standard families: cyclic, symmetric, alternating, dihedral. 1You should be comfortable with both multiplicative and additive notation. 2More generally any substructure. 1 Cosets and Factor Groups Definition. -
On Free Quasigroups and Quasigroup Representations Stefanie Grace Wang Iowa State University
Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2017 On free quasigroups and quasigroup representations Stefanie Grace Wang Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Mathematics Commons Recommended Citation Wang, Stefanie Grace, "On free quasigroups and quasigroup representations" (2017). Graduate Theses and Dissertations. 16298. https://lib.dr.iastate.edu/etd/16298 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. On free quasigroups and quasigroup representations by Stefanie Grace Wang A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Mathematics Program of Study Committee: Jonathan D.H. Smith, Major Professor Jonas Hartwig Justin Peters Yiu Tung Poon Paul Sacks The student author and the program of study committee are solely responsible for the content of this dissertation. The Graduate College will ensure this dissertation is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2017 Copyright c Stefanie Grace Wang, 2017. All rights reserved. ii DEDICATION I would like to dedicate this dissertation to the Integral Liberal Arts Program. The Program changed my life, and I am forever grateful. It is as Aristotle said, \All men by nature desire to know." And Montaigne was certainly correct as well when he said, \There is a plague on Man: his opinion that he knows something." iii TABLE OF CONTENTS LIST OF TABLES . -
Quasigroup Identities and Mendelsohn Designs
Can. J. Math., Vol. XLI, No. 2, 1989, pp. 341-368 QUASIGROUP IDENTITIES AND MENDELSOHN DESIGNS F. E. BENNETT 1. Introduction. A quasigroup is an ordered pair (g, •), where Q is a set and (•) is a binary operation on Q such that the equations ax — b and ya — b are uniquely solvable for every pair of elements a,b in Q. It is well-known (see, for example, [11]) that the multiplication table of a quasigroup defines a Latin square, that is, a Latin square can be viewed as the multiplication table of a quasigroup with the headline and sideline removed. We are concerned mainly with finite quasigroups in this paper. A quasigroup (<2, •) is called idempotent if the identity x2 = x holds for all x in Q. The spectrum of the two-variable quasigroup identity u(x,y) = v(x,y) is the set of all integers n such that there exists a quasigroup of order n satisfying the identity u(x,y) = v(x,y). It is particularly useful to study the spectrum of certain two-variable quasigroup identities, since such identities are quite often instrumental in the construction or algebraic description of combinatorial designs (see, for example, [1, 22] for a brief survey). If 02? ®) is a quasigroup, we may define on the set Q six binary operations ®(1,2,3),<8)(1,3,2),®(2,1,3),®(2,3,1),(8)(3,1,2), and 0(3,2,1) as follows: a (g) b = c if and only if a <g> (1,2, 3)b = c,a® (1, 3,2)c = 6, b ® (2,1,3)a = c, ft <g> (2,3, l)c = a, c ® (3,1,2)a = ft, c ® (3,2, \)b = a. -
Right Product Quasigroups and Loops
RIGHT PRODUCT QUASIGROUPS AND LOOPS MICHAEL K. KINYON, ALEKSANDAR KRAPEZˇ∗, AND J. D. PHILLIPS Abstract. Right groups are direct products of right zero semigroups and groups and they play a significant role in the semilattice decomposition theory of semigroups. Right groups can be characterized as associative right quasigroups (magmas in which left translations are bijective). If we do not assume associativity we get right quasigroups which are not necessarily representable as direct products of right zero semigroups and quasigroups. To obtain such a representation, we need stronger assumptions which lead us to the notion of right product quasigroup. If the quasigroup component is a (one-sided) loop, then we have a right product (left, right) loop. We find a system of identities which axiomatizes right product quasigroups, and use this to find axiom systems for right product (left, right) loops; in fact, we can obtain each of the latter by adjoining just one appropriate axiom to the right product quasigroup axiom system. We derive other properties of right product quasigroups and loops, and conclude by show- ing that the axioms for right product quasigroups are independent. 1. Introduction In the semigroup literature (e.g., [1]), the most commonly used definition of right group is a semigroup (S; ·) which is right simple (i.e., has no proper right ideals) and left cancellative (i.e., xy = xz =) y = z). The structure of right groups is clarified by the following well-known representation theorem (see [1]): Theorem 1.1. A semigroup (S; ·) is a right group if and only if it is isomorphic to a direct product of a group and a right zero semigroup. -
Problems from Ring Theory
Home Page Problems From Ring Theory In the problems below, Z, Q, R, and C denote respectively the rings of integers, JJ II rational numbers, real numbers, and complex numbers. R generally denotes a ring, and I and J usually denote ideals. R[x],R[x, y],... denote rings of polynomials. rad R is defined to be {r ∈ R : rn = 0 for some positive integer n} , where R is a ring; rad R is called the nil radical or just the radical of R . J I Problem 0. Let b be a nilpotent element of the ring R . Prove that 1 + b is an invertible element Page 1 of 14 of R . Problem 1. Let R be a ring with more than one element such that aR = R for every nonzero Go Back element a ∈ R. Prove that R is a division ring. Problem 2. If (m, n) = 1 , show that the ring Z/(mn) contains at least two idempotents other than Full Screen the zero and the unit. Problem 3. If a and b are elements of a commutative ring with identity such that a is invertible Print and b is nilpotent, then a + b is invertible. Problem 4. Let R be a ring which has no nonzero nilpotent elements. Prove that every idempotent Close element of R commutes with every element of R. Quit Home Page Problem 5. Let A be a division ring, B be a proper subring of A such that a−1Ba ⊆ B for all a 6= 0 . Prove that B is contained in the center of A . -
On Semilattice Structure of Mizar Types
FORMALIZED MATHEMATICS Volume 11, Number 4, 2003 University of Białystok On Semilattice Structure of Mizar Types Grzegorz Bancerek Białystok Technical University Summary. The aim of this paper is to develop a formal theory of Mizar types. The presented theory is an approach to the structure of Mizar types as a sup-semilattice with widening (subtyping) relation as the order. It is an abstrac- tion from the existing implementation of the Mizar verifier and formalization of the ideas from [9]. MML Identifier: ABCMIZ 0. The articles [20], [14], [24], [26], [23], [25], [3], [21], [1], [11], [12], [16], [10], [13], [18], [15], [4], [2], [19], [22], [5], [6], [7], [8], and [17] provide the terminology and notation for this paper. 1. Semilattice of Widening Let us mention that every non empty relational structure which is trivial and reflexive is also complete. Let T be a relational structure. A type of T is an element of T . Let T be a relational structure. We say that T is Noetherian if and only if: (Def. 1) The internal relation of T is reversely well founded. Let us observe that every non empty relational structure which is trivial is also Noetherian. Let T be a non empty relational structure. Let us observe that T is Noethe- rian if and only if the condition (Def. 2) is satisfied. (Def. 2) Let A be a non empty subset of T . Then there exists an element a of T such that a ∈ A and for every element b of T such that b ∈ A holds a 6< b. -
Cryptanalysis of a Reduced Version of the Block Cipher E2
Cryptanalysis of a Reduced Version of the Block Cipher E2 Mitsuru Matsui and Toshio Tokita Information Technology R&D Center Mitsubishi Electric Corporation 5-1-1, Ofuna, Kamakura, Kanagawa, 247, Japan [email protected], [email protected] Abstract. This paper deals with truncated differential cryptanalysis of the 128-bit block cipher E2, which is an AES candidate designed and submitted by NTT. Our analysis is based on byte characteristics, where a difference of two bytes is simply encoded into one bit information “0” (the same) or “1” (not the same). Since E2 is a strongly byte-oriented algorithm, this bytewise treatment of characteristics greatly simplifies a description of its probabilistic behavior and noticeably enables us an analysis independent of the structure of its (unique) lookup table. As a result, we show a non-trivial seven round byte characteristic, which leads to a possible attack of E2 reduced to eight rounds without IT and FT by a chosen plaintext scenario. We also show that by a minor modification of the byte order of output of the round function — which does not reduce the complexity of the algorithm nor violates its design criteria at all —, a non-trivial nine round byte characteristic can be established, which results in a possible attack of the modified E2 reduced to ten rounds without IT and FT, and reduced to nine rounds with IT and FT. Our analysis does not have a serious impact on the full E2, since it has twelve rounds with IT and FT; however, our results show that the security level of the modified version against differential cryptanalysis is lower than the designers’ estimation. -
Historical Ciphers • A
ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont. -
The Characteristics of Some Kinds of Special Quasirings *
ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 1, No. 5, 2006, pp. 295-302 The Characteristics of Some Kinds of Special Quasirings * Ping Zhu1, Jinhui Pang 2, Xu-qing Tang3 1 School of Science, Southern Yangtze University, Wuxi, Jiangsu 214122, P. R. China + 2 School of Management & Economics, Beijing Institute Of Technology, Beijing, 100081, P. R. China 3 Key Laboratory of Intelligent Computing &Signal Processing of Ministry of Education, Anhui University, Hefei, 230039, P. R. China ( Received July 02, 2006, Accepted September 11, 2006 ) Abstract. By using quasi-group, we introduce some kinds of special quasi-rings and discuss their characteristics. According to the concept of monogenic semigroup we introduce definition of monogenic semiring and discuss the numbers and structures of monogenic semiring .Then we display their relations as following: Ø {integral domain }(∉ { strong biquasiring }) {}division ring Ø {}({int})strong biquasiring∉ egral domain Ø {}ring ØØØ{}biquasiring {}{} quasiring semiring Ø {}monogenic semiring Keywords: Semiring, Quasiring, Biquasiring, Strong Biquasiring, Monogenic Semiring AMS: Subject Classification (2000): 20M07, 20M10 1. Introduction A semiring[1] S = (S,+,•) is an algebra where both the additive reduct (S,+) and the multiplicative reduct (S,•) are semigroups and such that the following distributive laws hold: x( y + z) = xy + xz, (x + y)z = xz + yz . A semiring (,,)S + • is called a nilsemiring if there are additive idempotent 0 and for any a∈S ,there are n∈N , such that na = 0 . An ideal (prime ideal) of a semiring (S,+,•) is the ideal (prime ideal) of the (S,•). An ideal I of a semiring S is called a K-ideal[1], if ∀a,b ∈ S, a ∈ I and (a + b ∈ I or b + a ∈ I ) ⇒ b ∈ I . -
A Guide to Self-Distributive Quasigroups, Or Latin Quandles
A GUIDE TO SELF-DISTRIBUTIVE QUASIGROUPS, OR LATIN QUANDLES DAVID STANOVSKY´ Abstract. We present an overview of the theory of self-distributive quasigroups, both in the two- sided and one-sided cases, and relate the older results to the modern theory of quandles, to which self-distributive quasigroups are a special case. Most attention is paid to the representation results (loop isotopy, linear representation, homogeneous representation), as the main tool to investigate self-distributive quasigroups. 1. Introduction 1.1. The origins of self-distributivity. Self-distributivity is such a natural concept: given a binary operation on a set A, fix one parameter, say the left one, and consider the mappings ∗ La(x) = a x, called left translations. If all such mappings are endomorphisms of the algebraic structure (A,∗ ), the operation is called left self-distributive (the prefix self- is usually omitted). Equationally,∗ the property says a (x y) = (a x) (a y) ∗ ∗ ∗ ∗ ∗ for every a, x, y A, and we see that distributes over itself. Self-distributivity∈ was pinpointed already∗ in the late 19th century works of logicians Peirce and Schr¨oder [69, 76], and ever since, it keeps appearing in a natural way throughout mathematics, perhaps most notably in low dimensional topology (knot and braid invariants) [12, 15, 63], in the theory of symmetric spaces [57] and in set theory (Laver’s groupoids of elementary embeddings) [15]. Recently, Moskovich expressed an interesting statement on his blog [60] that while associativity caters to the classical world of space and time, distributivity is, perhaps, the setting for the emerging world of information. -
The QARMA Block Cipher Family
The QARMA Block Cipher Family Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes Roberto Avanzi Qualcomm Product Security, Munich, Germany [email protected], [email protected] Abstract. This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of software exploitation, and the con- struction of keyed hash functions. QARMA is inspired by reflection ciphers such as PRINCE, to which it adds a tweaking input, and MANTIS. However, QARMA differs from previous reflector constructions in that it is a three-round Even-Mansour scheme instead of a FX-construction, and its middle permutation is non-involutory and keyed. We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to {0, 1}-matrices. The purpose of all these design choices is to harden the cipher against various classes of attacks. We also describe new S-Box search heuristics aimed at minimising the critical path. QARMA exists in 64- and 128-bit block sizes, where block and tweak size are equal, and keys are twice as long as the blocks. We argue that QARMA provides sufficient security margins within the constraints de- termined by the mentioned applications, while still achieving best-in-class latency. Implementation results on a state-of-the art manufacturing process are reported. -
Math 250A: Groups, Rings, and Fields. H. W. Lenstra Jr. 1. Prerequisites
Math 250A: Groups, rings, and fields. H. W. Lenstra jr. 1. Prerequisites This section consists of an enumeration of terms from elementary set theory and algebra. You are supposed to be familiar with their definitions and basic properties. Set theory. Sets, subsets, the empty set , operations on sets (union, intersection, ; product), maps, composition of maps, injective maps, surjective maps, bijective maps, the identity map 1X of a set X, inverses of maps. Relations, equivalence relations, equivalence classes, partial and total orderings, the cardinality #X of a set X. The principle of math- ematical induction. Zorn's lemma will be assumed in a number of exercises. Later in the course the terminology and a few basic results from point set topology may come in useful. Group theory. Groups, multiplicative and additive notation, the unit element 1 (or the zero element 0), abelian groups, cyclic groups, the order of a group or of an element, Fermat's little theorem, products of groups, subgroups, generators for subgroups, left cosets aH, right cosets, the coset spaces G=H and H G, the index (G : H), the theorem of n Lagrange, group homomorphisms, isomorphisms, automorphisms, normal subgroups, the factor group G=N and the canonical map G G=N, homomorphism theorems, the Jordan- ! H¨older theorem (see Exercise 1.4), the commutator subgroup [G; G], the center Z(G) (see Exercise 1.12), the group Aut G of automorphisms of G, inner automorphisms. Examples of groups: the group Sym X of permutations of a set X, the symmetric group S = Sym 1; 2; : : : ; n , cycles of permutations, even and odd permutations, the alternating n f g group A , the dihedral group D = (1 2 : : : n); (1 n 1)(2 n 2) : : : , the Klein four group n n h − − i V , the quaternion group Q = 1; i; j; ij (with ii = jj = 1, ji = ij) of order 4 8 { g − − 8, additive groups of rings, the group Gl(n; R) of invertible n n-matrices over a ring R.