Cryptographic analysis and construction of complete permutations using a recursive approach
Shuang Xiang,Yingqi Tang,Yan Tong,Jinzhou Huang
DOI: https://doi.org/10.1504/ijahuc.2024.136833
2024-02-23
International Journal of Ad Hoc and Ubiquitous Computing
Abstract:This paper proposes a novel recursive approach for constructing generalised complete permutations over finite fields and analyses their cryptographic properties. The method can generate complete, strong complete, K -strong complete, and S -complete permutations by recursively combining component permutations and arbitrary mappings. Compared to prior recursive techniques, the approach provides larger classes of permutations with superior cryptographic strengths like higher algebraic degree, etc. Algebraic degree, nonlinearity, differential/boomerang uniformity, and other properties are investigated. For instance, constructed complete permutations can achieve optimal algebraic degrees to resist structural attacks. The analysis also derives tight lower and upper bounds on ( c -)differential uniformity, ( c -)boomerang uniformity and nonlinearity. Results demonstrate improved algebraic degree, differential and boomerang uniformities over previous recursive methods. Overall, this work makes significant contributions around complete permutation generation and analysis in cryptography.
computer science, information systems,telecommunications