Primitivity of the group of a cipher involving the action of the key-schedule
Journal of Algebra and its Applications, ISSN: 0219-4988, Vol: 20, Issue: 5
2021
- 3Citations
- 1Captures
Metric Options: Counts1 Year3 YearSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Article Description
The algebraic structure of the group generated by the encryption functions of a block cipher depends on the key schedule algorithm used for generating the round keys. For such a reason, in general, studying this group does not appear to be an easy task. Previous works, focusing on the algebraic properties of groups associated to a cipher, have studied the group generated by the round functions of the cipher considering independent round keys. In this paper, we want to study the more realistic group generated by the encryption functions, where the key schedule satisfies certain requirements. In this context, we are able to identify sufficient conditions that permit to guarantee the primitivity of this group and the security of the cipher with respect to the partition-based trapdoor. This type of trapdoor has been recently introduced by Bannier et al. in 2016 and it is a generalization of that introduced by Paterson in 1999.
Bibliographic Details
World Scientific Pub Co Pte Lt
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know