2012
DOI: 10.1007/s10623-012-9668-4
|View full text |Cite
|
Sign up to set email alerts
|

On CCZ-equivalence of addition mod 2 n

Abstract: Abstract. We show that addition mod 2 n is CCZ-equivalent to a quadratic vectorial Boolean function. We use this to reduce the solution of systems differential equations of addition to the solution of a system of linear equations and to derive a fully explicit formula for the correlation coefficients, which leads to new results about the Walsh transform of addition mod 2 n . The results have applications in the cryptanalysis of cyptographic primitives which use addition mod 2 n .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(29 citation statements)
references
References 8 publications
0
29
0
Order By: Relevance
“…In order to avoid the recursive expression, an explicit result on calculating the correlation of linear approximations in modular addition is proven by SchulteGeers [21]. Despite the recursive property of the carry, modular addition is CCZequivalent to a vectorial quadratic boolean function.…”
Section: Propagation Of Masks Through Modular Additionmentioning
confidence: 99%
“…In order to avoid the recursive expression, an explicit result on calculating the correlation of linear approximations in modular addition is proven by SchulteGeers [21]. Despite the recursive property of the carry, modular addition is CCZequivalent to a vectorial quadratic boolean function.…”
Section: Propagation Of Masks Through Modular Additionmentioning
confidence: 99%
“…The DP and LC of modular addition have been thoroughly studied in the literature and optimal methods for their computation have been proposed by several authors: [17,33,22] (for xdp + ) and [32,26,20,27,10,33] (for xlc + ). All cited methods are linear in the size of the differences (resp.…”
Section: Preliminariesmentioning
confidence: 99%
“…1. It has three parts: first round (lines (4)- (14)), middle rounds (lines (16)- (25)) and last round (lines (27)- (37)). Every part is composed of two blocks corresponding to the two levels of recursion.…”
Section: Best Trail Search For Speckmentioning
confidence: 99%
“…Some authors have studied the properties of the components of these ciphers from theoretical aspects [15][16][17][18][19][20][21][22][23][24]. In [15,16], linear and differential properties of SIMON-like ciphers were investigated, from the mathematical viewpoint, and an efficient formula for computing linear and differential probabilities of SIMON was presented.…”
Section: Introductionmentioning
confidence: 99%
“…In [19,20], upon some theoretical studies, upper bounds for differential probabilities and squared correlations for SIMON-like ciphers were provided, and provably optimal differential trails for various versions of SIMON were presented. In [21][22][23][24], linear properties of addition mod 2 n were investigated, from the mathematical viewpoint.…”
Section: Introductionmentioning
confidence: 99%