• Title/Summary/Keyword: primitive polynomials

Search Result 27, Processing Time 0.028 seconds

A Study on primitive polynomial in stream cipher (스트림암호에서 원시다항식에 대한 고찰)

  • Yang, Jeong-mo
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • Stream cipher is an one-time-pad type encryption algorithm that encrypt plaintext using simple operation such as XOR with random stream of bits (or characters) as symmetric key and its security depends on the randomness of used stream. Therefore we can design more secure stream cipher algorithm by using mathematical analysis of the stream such as period, linear complexity, non-linearity, correlation-immunity, etc. The key stream in stream cipher is generated in linear feedback shift register(LFSR) having characteristic polynomial. The primitive polynomial is the characteristic polynomial which has the best security property. It is used widely not only in stream cipher but also in SEED, a block cipher using 8-degree primitive polynomial, and in Chor-Rivest(CR) cipher, a public-key cryptosystem using 24-degree primitive polynomial. In this paper we present the concept and various properties of primitive polynomials in Galois field and prove the theorem finding the number of irreducible polynomials and primitive polynomials over $F_p$ when p is larger than 2. This kind of research can be the foundation of finding primitive polynomials of higher security and developing new cipher algorithms using them.

  • PDF

Relation between the Irreducible Polynomials that Generates the Same Binary Sequence Over Odd Characteristic Field

  • Ali, Md. Arshad;Kodera, Yuta;Park, Taehwan;Kusaka, Takuya;Nogmi, Yasuyuki;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.3
    • /
    • pp.166-172
    • /
    • 2018
  • A pseudo-random sequence generated by using a primitive polynomial, trace function, and Legendre symbol has been researched in our previous work. Our previous sequence has some interesting features such as period, autocorrelation, and linear complexity. A pseudo-random sequence widely used in cryptography. However, from the aspect of the practical use in cryptographic systems sequence needs to generate swiftly. Our previous sequence generated by utilizing a primitive polynomial, however, finding a primitive polynomial requires high calculating cost when the degree or the characteristic is large. It’s a shortcoming of our previous work. The main contribution of this work is to find some relation between the generated sequence and irreducible polynomials. The purpose of this relationship is to generate the same sequence without utilizing a primitive polynomial. From the experimental observation, it is found that there are (p - 1)/2 kinds of polynomial, which generates the same sequence. In addition, some of these polynomials are non-primitive polynomial. In this paper, these relationships between the sequence and the polynomials are shown by some examples. Furthermore, these relationships are proven theoretically also.

THE ARITHMETIC OF CARLITZ POLYNOMIALS

  • Bae, Sung-Han
    • Journal of the Korean Mathematical Society
    • /
    • v.35 no.2
    • /
    • pp.341-360
    • /
    • 1998
  • Some interesting properties of Carlitz cyclotomic polynomials analogous to those of classical cyclotomic polynomials are given.

  • PDF

MINIMAL QUADRATIC RESIDUE CYCLIC CODES OF LENGTH $2^{n}$

  • BATRA SUDHIR;ARORA S. K.
    • Journal of applied mathematics & informatics
    • /
    • v.18 no.1_2
    • /
    • pp.25-43
    • /
    • 2005
  • Let F be a finite field of prime power order q(odd) and the multiplicative order of q modulo $2^{n}\;(n>1)\;be\; {\phi}(2^{n})/2$. If n > 3, then q is odd number(prime or prime power) of the form $8m{\pm}3$. If q = 8m - 3, then the ring $R_{2^n} = F[x]/ < x^{2^n}-1 >$ has 2n primitive idempotents. The explicit expressions for these primitive idempotents are obtained and the minimal QR cyclic codes of length $2^{n}$ generated by these idempotents are completely described. If q = 8m + 3 then the expressions for the 2n - 1 primitive idempotents of $R_{2^n}$ are obtained. The generating polynomials and the upper bounds of the minimum distance of minimal QR cyclic codes generated by these 2n-1 idempotents are also obtained. The case n = 2,3 is dealt separately.

Some Properties of Maximum Length Cellular Automata

  • Cho, Sung-Jin;Kim, Han-Doo;Choi, Un-Sook
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.3 no.2
    • /
    • pp.137-145
    • /
    • 1999
  • In this paper, We consider two-dimensional Maximum Length Cellular Automata (2-D MLCA) as an extension of the 1-D MLCA. 2-D MLCA can display much better random patterns than those generated by 1-D CA and LFSR. To generate random pattern, a CA should have a maximum length cycle. So, it is necessary to find MLCA that the characteristic polynomial of the transition matrix is primitive. New boundary conditions of 3 types are proposed and some rules having primitive polynomials of 2-D MLCA are found.

  • PDF

IRREDUCIBILITY OF HURWITZ POLYNOMIALS OVER THE RING OF INTEGERS

  • Oh, Dong Yeol;Seo, Ye Lim
    • Korean Journal of Mathematics
    • /
    • v.27 no.2
    • /
    • pp.465-474
    • /
    • 2019
  • Let ${\mathbb{Z}}$ be the ring of integers and ${\mathbb{Z}}[X]$ (resp., $h({\mathbb{Z}})$) be the ring of polynomials (resp., Hurwitz polynomials) over ${\mathbb{Z}}$. In this paper, we study the irreducibility of Hurwitz polynomials in $h({\mathbb{Z}})$. We give a sufficient condition for Hurwitz polynomials in $h({\mathbb{Z}})$ to be irreducible, and we then show that $h({\mathbb{Z}})$ is not isomorphic to ${\mathbb{Z}}[X]$. By using a relation between usual polynomials in ${\mathbb{Z}}[X]$ and Hurwitz polynomials in $h({\mathbb{Z}})$, we give a necessary and sufficient condition for Hurwitz polynomials over ${\mathbb{Z}}$ to be irreducible under additional conditions on the coefficients of Hurwitz polynomials.