On CCZ-equivalence of the inverse function

08/19/2020
βˆ™
by   Lukas KΓΆlsch, et al.
βˆ™
0
βˆ™

The inverse function x ↦ x^-1 on 𝔽_2^n is one of the most studied functions in cryptography due to its widespread use as an S-box in block ciphers like AES. In this paper, we show that, if nβ‰₯ 5, every function that is CCZ-equivalent to the inverse function is already EA-equivalent to it. This confirms a conjecture by Budaghyan, Calderini and Villa. We also prove that every permutation that is CCZ-equivalent to the inverse function is already affine equivalent to it. The majority of the paper is devoted to proving that there are no permutation polynomials of the form L_1(x^-1)+L_2(x) over 𝔽_2^n if nβ‰₯ 5, where L_1,L_2 are nonzero linear functions. In the proof, we combine Kloosterman sums, quadratic forms and tools from additive combinatorics.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
βˆ™ 09/18/2020

On the Boomerang Uniformity of Permutations of Low Carlitz Rank

Finding permutation polynomials with low differential and boomerang unif...
research
βˆ™ 09/13/2020

Kim-type APN functions are affine equivalent to Gold functions

The problem of finding APN permutations of 𝔽_2^n where n is even and n>6...
research
βˆ™ 06/23/2023

On the Functions Which are CCZ-equivalent but not EA-equivalent to Quadratic Functions over 𝔽_p^n

For a given function F from 𝔽_p^n to itself, determining whether there e...
research
βˆ™ 03/31/2020

On subspaces of Kloosterman zeros and permutations of the form L_1(x^-1)+L_2(x)

Permutations of the form F=L_1(x^-1)+L_2(x) with linear functions L_1,L_...
research
βˆ™ 04/13/2020

A power APN function CCZ-equivalent to Kasami function in even dimension

Let n be an even number such that n≑ 0 4. We show that a power function ...
research
βˆ™ 05/09/2018

On the Annihilator Ideal of an Inverse Form. A Simplification

We simplify an earlier paper of the same title by not using syzygy polyn...
research
βˆ™ 11/03/2020

On the primitivity of Lai-Massey schemes

In symmetric cryptography, the round functions used as building blocks f...

Please sign up or login with your details

Forgot password? Click here to reset