On MDS Property of g-Circulant Matrices

Tapas Chatterjee,Ayantika Laha
2024-06-22
Abstract:Circulant Maximum Distance Separable (MDS) matrices have gained significant importance due to their applications in the diffusion layer of the AES block cipher. In $2013$, Gupta and Ray established that circulant involutory matrices of order greater than $3$ cannot be MDS. This finding prompted a generalization of circulant matrices and the involutory property of matrices by various authors. In $2016$, Liu and Sim introduced cyclic matrices by changing the permutation of circulant matrices. In $1961,$ Friedman introduced $g$-circulant matrices which form a subclass of cyclic matrices. In this article, we first discuss $g$-circulant matrices with involutory and MDS properties. We prove that $g$-circulant involutory matrices of order $k \times k$ cannot be MDS unless $g \equiv -1 \pmod k.$ Next, we delve into $g$-circulant semi-involutory and semi-orthogonal matrices with entries from finite fields. We establish that the $k$-th power of the associated diagonal matrices of a $g$-circulant semi-orthogonal (semi-involutory) matrix of order $k \times k$ results in a scalar matrix. These findings can be viewed as an extension of the results concerning circulant matrices established by Chatterjee {\it{et al.}} in $2022.$
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to explore the MDS (Maximum Distance Separable) property and the involutory property of g - circulant matrices. Specifically, researchers hope to understand under what conditions these matrices can possess both properties simultaneously, and whether such matrices can be constructed in a finite field. ### Research Background 1. **Importance of MDS Matrices** - MDS matrices play an important role in cryptography, especially in the diffusion layer of block ciphers. They can provide optimal diffusion effects, thereby enhancing the security and efficiency of encryption algorithms. - As mentioned in the paper, many block ciphers (such as AES, LED, SHARK, etc.) and hash functions (such as PHOTON, WHIRLPOOL, etc.) use MDS matrices to implement the diffusion layer. 2. **Limitations of Existing Research** - Previous research has shown that for certain types of matrices (such as circulant matrices), it is difficult to find matrices that simultaneously possess MDS and involutory properties. For example, Gupta and Ray proved that circulant involutory matrices with an order greater than 3 cannot be MDS matrices. - This has prompted researchers to explore broader types of matrices in search of possible solutions. ### Main Contributions of the Paper 1. **Structure of g - circulant Matrices** - The paper first discusses the structure of g - circulant matrices and proves that when \( g \not\equiv - 1\pmod{k} \), the \( k\times k \) order g - circulant involutory matrix cannot be an MDS matrix. - Specifically, the author shows, by analyzing the square of the matrix \( A^2 \), that in some cases, these matrices cannot meet the requirements of MDS. 2. **Semi - involutory and Semi - orthogonal Matrices** - The paper also explores the semi - involutory and semi - orthogonal properties of g - circulant matrices. The author proves that for the \( k\times k \) order g - circulant semi - involutory or semi - orthogonal matrix, the \( k\)-th power of its corresponding diagonal matrix will form a scalar matrix. - These results can be regarded as an extension of previous research results on circulant matrices. 3. **Non - existence Results** - The paper further proves that under certain specific conditions, g - circulant matrices cannot simultaneously possess MDS and involutory properties. For example, for the \( 2^d\times 2^d \) order g - circulant matrix, if \( g^2\equiv 1\pmod{2^d} \), then even if the matrix is involutory, it cannot be an MDS matrix. ### Conclusion Through in - depth research on g - circulant matrices, this paper reveals the challenges in constructing matrices with both MDS and involutory properties in a finite field and provides some new theoretical results and proofs. These findings contribute to promoting research on the design of efficient diffusion layers in the field of cryptography.