Construction of all MDS and involutory MDS matrices

Yogesh Kumar,P.R.Mishra,Susanta Samanta,Kishan Chand Gupta,Atul Gaur
DOI: https://doi.org/10.3934/amc.2024033
2024-08-13
Abstract:In this paper, we propose two algorithms for a hybrid construction of all $n\times n$ MDS and involutory MDS matrices over a finite field $\mathbb{F}_{p^m}$, respectively. The proposed algorithms effectively narrow down the search space to identify $(n-1) \times (n-1)$ MDS matrices, facilitating the generation of all $n \times n$ MDS and involutory MDS matrices over $\mathbb{F}_{p^m}$. To the best of our knowledge, existing literature lacks methods for generating all $n\times n$ MDS and involutory MDS matrices over $\mathbb{F}_{p^m}$. In our approach, we introduce a representative matrix form for generating all $n\times n$ MDS and involutory MDS matrices over $\mathbb{F}_{p^m}$. The determination of these representative MDS matrices involves searching through all $(n-1)\times (n-1)$ MDS matrices over $\mathbb{F}_{p^m}$. Our contributions extend to proving that the count of all $3\times 3$ MDS matrices over $\mathbb{F}_{2^m}$ is precisely $(2^m-1)^5(2^m-2)(2^m-3)(2^{2m}-9\cdot 2^m+21)$. Furthermore, we explicitly provide the count of all $4\times 4$ MDS and involutory MDS matrices over $\mathbb{F}_{2^m}$ for $m=2, 3, 4$.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to construct all \(n\times n\) MDS (Maximum Distance Separable) matrices and self - inverse MDS matrices, which are defined over the finite field \(F_{p^m}\). Specifically: 1. **Construction of MDS matrices**: MDS matrices play an important role in cryptography, especially in the design of diffusion layers. The existing literature lacks an effective method to generate all \(n\times n\) MDS matrices. Therefore, this paper proposes two algorithms for the hybrid construction of all \(n\times n\) MDS matrices and self - inverse MDS matrices respectively. 2. **Reducing the search space**: By introducing representative forms of MDS matrices, the paper effectively narrows the search space, making it more efficient to generate all \(n\times n\) MDS matrices. In particular, all \(n\times n\) MDS matrices can be generated by searching all \((n - 1)\times(n - 1)\) MDS matrices. 3. **Exact counting**: The paper also provides exact formulas to calculate the number of MDS matrices of a specific size. For example, for \(3\times3\) MDS matrices, the number is: \[ (2^m - 1)^5(2^m - 2)(2^m - 3)(2^{2m}-9\cdot2^m + 21) \] And it gives the specific numbers of \(4\times4\) MDS and self - inverse MDS matrices when \(m = 2,3,4\). 4. **Self - inverse condition**: The paper also discusses how to ensure that the generated MDS matrices are self - inverse, that is, they satisfy the condition \(M^2=I\). This involves verifying specific conditions of the representative matrix \(M_1\) and determining the forms of the corresponding diagonal matrices \(D_1\) and \(D_2\). In conclusion, the main contribution of this paper lies in providing a systematic method to generate and count all \(n\times n\) MDS and self - inverse MDS matrices, filling the gaps in the existing literature and providing a theoretical basis for the design of diffusion layers in cryptography.