Linear Permutations and Their Compositional Inverses Over Fqn by the Use of Units in Rq,N; Equivalently Conventional Q−Associates of Linear Permu- Tations in Ln (Fq)

Linear Permutations and Their Compositional Inverses Over Fqn by the Use of Units in Rq,N; Equivalently Conventional Q−Associates of Linear Permu- Tations in Ln (Fq)

i Linear Permutations and their Compositional Inverses over Fqn Gustavo Terra Bastos Abstract The use of permutation polynomials has appeared, along to their compositional inverses, as a good choice in the implementation of cryptographic systems. Hence, there has been a demand for constructions of these polynomials which coefficients belong to a finite field. As a particular case of permutation polynomial, involution is highly desired since its compositional inverse is itself. In this work, we present an effective way of how to construct several linear permutation polynomials Fq[x] over Fqn as well as their compositional inverses using a decomposition of based on its hxn − 1i primitive idempotents. As a consequence, an immediate construction of involutions is presented. Index Terms Finite fields, linear permutations, permutation polynomials, involutions. I. INTRODUCTION ET Fq be a finite field with q elements, in which q is prime or a prime power. Fqn L denotes a finite extension field of Fq, which may be seen as a n−dimensional vector space over Fq. A polynomial f(x) ∈ Fqn [x] is called a permutation polynomial of Fqn if the induced arXiv:2005.14349v1 [math.NT] 29 May 2020 mapping by it φ : F n → F n f q q (1) x 7→ φf (x)= f(x) is a bijection of Fqn on itself. Note that it is always possible to obtain f(x) ∈ Fqn [x] from φf by the Lagrange interpolation method. From the finiteness of Fqn , simple conditions determine if f(x) is a permutation polyno- mial; for instance, if f(x) is one-to-one. Nonetheless, making explicit conditions over the coefficients of f(x) so that it is a permutation one is not an easy task. Given f(x) a bijection/permutation polynomial of Fqn , the (unique) compositional inverse −1 of f(x) is denoted f (x) ∈ Fqn [x], in which n f(x) ◦ f −1(x) ≡ f −1(x) ◦ f(x) ≡ x mod xq − x. (2) ii Recently, in [25] the authors have presented the compositional inverses of all permutation polynomials of degree ≤ 6 over Fqn and inverses of permutation polynomial of degree 7 in characteristic 2. Based on the concept of complete mappings for groups, complete permutation polyno- mials [15] are defined. If f(x) ∈ Fqn [x] is a permutation polynomial over Fqn in which f(x)+ x is also a permutation one, so f(x) is called complete permutation polynomial (or complete mapping polynomial). In [15] several families of complete permutation polynomials have been presented and, in particular, all complete permutation polynomials which degree is less than 6 have been classified. Later [2], λ−complete permutation polynomials, which are the natural extension of complete permutation polynomial have been defined, namely, given λ ∈ Fqn , f(x) is a λ−complete permutation polynomial if f(x) and f(x)+ λx are permutation polynomials over Fqn . In [21] it has been presented the compositional inverses of linear permutations (particular 2 x ∗ n n case of permutation polynomials) of the form x+x +Tr2 a , in which a ∈ F2n and Tr2 (·) denotes the Trace map over F2n . In [20], the authors have exhibited compositional inverses of some linear permutation binomials beyond some λ−complete permutation polynomials. In particular, permutation polynomials, which compositional inverses are themselves, are 2 qn called involutions, i.e, f(x) ∈ Fqn [x] is an involution if (f ◦f)(x)= f (x) ≡ x mod x −x. Describing explicit families of permutation polynomials and their compositional inverses is a current research problem both to theoretic aspect and from application perspective due to so many interesting issues in error-correcting codes, cryptography and combinatorial designs. Just quoting a reference about the relevance of permutation polynomial studies, it is worth mentioning [11] in which, in 1970s, the authors already used permutation polynomials/rational functions over finite fields in order to propose some cryptographic systems. Currently, per- mutation polynomials may be applied to S-boxes in cryptosystems acting as extra protection layer, and their compositional inverses working on decryption process. The use of involutions in this context appears as interesting solution once the system is not required to storage the different permutations to the encryption-decryption process. For more recent references, see PRINCE [3] (Use of linear involutions) and iSCREAM [8] (Use of non-linear involutions). Based on applications of involutions in cryptography problems and even the development of the own theory properly, in [4] the authors have developed a mathematical background for involutions providing several constructions over 2−characteristic finite fields, making use of linear polynomials and b−linear translators as some of the algebraic tools used in that paper. Moreover, an analysis about fixed points for some involutions is also addressed. In [18] the author has proposed some families of linear permutations over Fqn by making use of a new class of linear polynomials called nilpotent linear polynomials which are defined next: Given a positive integer t ≥ 2, L(x) ∈ Fqn [x] is a nilpotent linear polynomial if n Lt(x)=(L ◦ L ◦ ... ◦ L)(x) ≡ 0 mod xq − x. He has also proposed constructions of binary t−times linear involutions with no fixed points. | {z } r s A characterization of when x h (x ) is an involution over Fq has been developed in [26] iii under some restrictions over r, s and h(x). It is obtained from involutions over the set of d−th roots of unity, in which ds = q − 1, and congruent and linear equation systems. r q−1 From the AGW-Criterion [1], in [16] some involutions with form x h(x ) over Fq2 have been constructed. Moreover, the authors have approached how to explicit the com- positional inverse and, in particular cases, the involutory property of polynomial f(x) = g xqi − x + δ + cx. Finally, the fixed points of some polynomials described in this paper have also been analyzed. This work aims to study the behaviour of conventional q−associates of linear permutations F [x] on the simple components of the F −algebra R := q from the primitive idempotent q q,n hxn − 1i perspective. In particular cases, primitive idempotents are easily described via Fq−algebra isomorphism between Rq,n and the group algebra FqC, in which C is n−order cyclic group. Based on in this new perspective and from the possession of some units in Rq,n, it is offered an easy implementation technique which allow us to describe families of linear permutations and their respective (linear) compositional inverses. In particular, families of involutions are also described, which elements can be used once more in order to provide new involutions. In Section II, we review the mathematical background needed for understanding linear polynomials (and the particular cases: linear permutations and involutions) and the relationship between linear polynomials and their conventional q−associates. Such relationship is explored throughout this work. Further, we define primitive idempotents and analyze some properties. In Section III, we study the cyclic shifts of linear permutations, that are linear ones as well, and which applications will be used in Section IV. In this Section, we present linear permutations over Fqn which coefficients are in Fq from a rereading of the famous Chinese Remainder Theorem based on primitive idempotents. As a particular case, it is possible to get several linear involutions over Fqn . Finally, conclusions and future problems are drawn in Section V. II. BASICS A. Linear Polynomials Given f(x) ∈ Fqn [x] a permutation polynomial over Fqn , there exists g(x) ∈ Fqn [x] which n qn degree is less than q and f(c)= g(c) for all c ∈ Fqn , namely, f(x) ≡ g(x) mod x − x. Thus, it is possible to represent every permutation polynomials in a reduced degree version, i.e., permutation polynomials which degree is less than qn. From now on, we will implicitly work only with reduced degree polynomials. In this work, we focus on the class of the linear/linearized polynomials (also called q- polynomials) over Fqn , which also represent the Fq−linear mappings from Fqn to itself, seen as n−dimensional Fq−vector space. Such polynomials are described as n−1 [i] F (x)= fix ∈ Fqn [x], (3) i=0 X iv in which [i] = qi, for 0 ≤ i ≤ n − 1. We refer to permutation linear polynomials simply as linear permutations. The following properties are verified for linear polynomials over Fqn (i) F (α + β)= F (α)+ F (β) and (ii) F (aα)= aF (α), for all α, β ∈ Fqm and a ∈ Fq, in which Fqm is an arbitrary extension of Fqn . For a seminal reference over finite fields and, in particular, polynomials over finite fields see [12]. Besides the applications of (permutation) linear polynomials in block codes, cryptography and combinatorial designs, currently one of their subclass called subspace polynomials has been applied in the context of random network coding [9] in order to obtain good constant dimension codes, which are k−dimensional subspace codes. See [24] for one of the most recent constructions and the references therein. Let Fqn [x] L (F n ) := (4) n q hxqn − xi [n−1] [0] := fn−1x + ... + f0x : fi ∈ Fqn be the set of linear polynomials over Fqn . In particular, the subset of Ln (Fqn ) formed by polynomials which coefficients belong to Fq is denoted as Ln (Fq). Since the ordinary multiplication of two linear polynomials, in general, do not provide a linear polynomial, then one define the symbolic multiplication between two linear polynomials F (x) and G(x) as F (x) ◦ G(x) = F (G(x)), namely, the symbolic multiplication is, in fact, the composition operation. In this sense, considering F (x),G(x) ∈Ln (Fqn ), G(x) divides symbolically F (x) if there is a linear polynomial H(x) ∈Ln (Fqn ) so that G(x) ◦ H(x)= F (x).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us