Skip to main content

Questions tagged [permutation]

A way, esp. one of several possible variations, in which a set or number of things can be ordered or arranged.

Filter by
Sorted by
Tagged with
0 votes
0 answers
27 views

Combining an LFSR with a permutation

LFSRs of length $L$, by themselves, are considered insecure because their state can be recovered with at $2 \times L$ bits. However, LFSRs are still get attention in cryptographic designs because they ...
Melab's user avatar
  • 3,905
0 votes
0 answers
52 views

What are the security implications of having inverse_sbox -> XOR tweak -> forward_sbox?

I have an application in mind that requires only the 32-bit sub-permutation from AES [x86; AESENC] (but skip shift rows step) but it turns out that the transposition step to undo shift rows (x86; ...
user874845643's user avatar
0 votes
0 answers
39 views

ARX vs. AR when performance of XOR = ADD = 1 cycle

ARX ciphers are in large part implemented for the benefit of software & modern CPU's. Literature also suggests that AR ciphers are not as efficient as ARX when it comes to gate count - efficiency ...
Lamira Ya's user avatar
  • 241
4 votes
1 answer
182 views

Is a secure 8-bit cipher possible?

Firstly, a sanity check: $\log_2((2^8)!) = 1684.$ There are $2^{1684}$ possible $\{0,1\}^8 \rightarrow \{0,1\}^8$ permutations. However a fixed permutation would be highly vulnerable to known-...
Laughlin's user avatar
5 votes
2 answers
124 views

Why do popular ARX ciphers have large states?

salsa20/chacha20/blake/blake2/blake3 all utilize a 4x4 grid of words on which transformations occur row-wise and then column/diagonal-wise. State size varies between 512 and 1024 bits based on word ...
thenighday's user avatar
0 votes
0 answers
56 views

Order of Enigma's rotors does not increase total number of keys

I have a question about “order of rotors”. I read about Enigma but I do not understand this point. If the machine has 3 rotors, for example 1_2_3, so it has 26×26×26 total keys. If we change the ...
hellobc's user avatar
  • 27
2 votes
0 answers
50 views

I just want a post-quantum permutation and I don't care about efficiency. Can multivariate reciprocals help me?

Let's say there's an application that require a public-key permutation, and we can throw all other requirements away, and design one out of reciprocal multivariate system. Is this viable? If yes, how ...
DannyNiu's user avatar
  • 10.1k
3 votes
2 answers
166 views

What are advantages/disadvantages of an invertible tweak schedule in a tweakable block cipher?

I have been doing research on a tweakable block cipher called BipBip. This is a rather niche cipher so I'll give a few facts about it for background before asking my question: The structure is based ...
Tw1ZZLER's user avatar
0 votes
0 answers
50 views

I'm curious on what the downsides of the public-key encryption method from my research project could be

As part of my final BS degree research project, I had to work with an encryption method based on research done in my university. What surprised me, is that while the method is very simple, I can't ...
H-a-y-K's user avatar
  • 125
0 votes
0 answers
47 views

How to attack the shuffling of correlated numbers?

Suppose I have a function that accepts vector input $x$ and outputs vector $y=f(x)$. I want to protect the output $y$ through shuffling numbers in it. I hope the shuffling can confuse the attacker by ...
Hobbit's user avatar
  • 67
0 votes
0 answers
49 views

Inverse Permutation in Sequential Manner Per-XOR (𝑃𝑥−1)

I'm trying to understand a protocol proposed in a research paper. There is a step that involves computing inverse Per-XOR. The explanation along with solved example is given below: "Perform ...
Fakhr Ali's user avatar
0 votes
1 answer
76 views

Per-‌XOR computation

I have an assignment where I have to understand a protocol proposed in a research paper. The first step involves computing Per-XOR, but I can't seem to understand the explanation given. Below is the ...
Fakhr Ali's user avatar
2 votes
1 answer
96 views

Rationale for BLAKE2 message schedule?

BLAKE2 uses a message schedule I did not see before. It uses permutations of pieces of the message block. The BLAKE2 book did not state the rationale for such a choice and how it contrasts with the ...
LightTunnelEnd's user avatar
4 votes
0 answers
112 views

Impossibility of uniform generation in random world

I was reading Limits on the provable consequences of one way permutations by Impagliazzo and Rudich when I got stuck on a sentence. First of all, they define a polynomial relation that is any relation ...
Pur2all's user avatar
  • 60
0 votes
1 answer
174 views

What is the inverse of this variant of the Gimli SP-box?

Consider a slightly modified variant of the Gimli SP-box: ...
lyrically wicked's user avatar

15 30 50 per page
1
2 3 4 5
13