Three theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module \(2^w\)

  • Atsushi IwasakiEmail author
  • Ken Umeno
Original Paper Area 1


Odd degree Chebyshev polynomials over a ring of modulo \(2^w\) have two kinds of period. One is an “orbital period”. Odd degree Chebyshev polynomials are bijection over the ring. Therefore, when an odd degree Chebyshev polynomial iterates affecting a factor of the ring, we can observe an orbit over the ring. The “ orbital period ” is a period of the orbit. The other is a “degree period”. It is observed when changing the degree of Chebyshev polynomials with a fixed argument of polynomials. Both kinds of period have not been completely studied. In this paper, we clarify completely both of them. The knowledge about them enables us to efficiently solve degree decision problem of Chebyshev polynomial over the ring, and so a key-exchange protocol with Chebyshev polynomial over the ring is not secure. In addition, we generalize the discussion and show that a key-exchange protocol with more generalized permutation polynomials which belong to a certain class is not secure.


Chebyshev polynomial Permutation polynomial Ring of modulo \(2^w\) Cryptography Key-exchange 

Mathematics Subject Classification



  1. 1.
    Rivest, R.L.: Permutation polynomials modulo \(2^w\). Finite Fields Appl. 7, 287–292 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 Block Ciphe . Accessed 9 Oct 2017
  3. 3.
    Umeno, K., Kim, S., Hasegawa, A.: 128bit VSC specification. Accessed 9 Oct 2017 (In Japanese)
  4. 4.
    Iwasaki, A., Umeno, K.: Improving security of vector stream cipher. Nonlinear Theory Appl. IEICE E7–N, 30–37 (2016)CrossRefGoogle Scholar
  5. 5.
    Umeno, K.: Key exchange by Chebyshev polynomials modulo \(2^w\). In: Proc. of INA-CISC, pp. 95–97 (2005)Google Scholar
  6. 6.
    Kocarev, L., Tasev, Z.: Public-key encription based on Chebyshev maps. In: Proc. IEEE Symp. Circuits and Systems (ISCAS’03) vol. 3, pp. 28–31 (2003)Google Scholar
  7. 7.
    Bergamo, P., D’Arco, P., Santis, A.S., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Circuits Syst. I Regul. Pap. 52(7), 1382–1393 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Ishii, M., Yoshimoto, A.: Applications for cryptography of the structure of the group of reduced residue classes of residue ring of \(\mathbb{Z}/2^w{\mathbb{Z}} \). Trans. JSIAM 19(2), 57–71 (2009). (In Japanese)Google Scholar
  9. 9.
    Ishii, M.: Periodicity of Chebyshev polynomials over the residue ring of \(\mathbb{Z}/2^r{\mathbb{Z}}\) and an electronic signature. Trans. JSIA 18(2), 257–265 (2008). (In Japanese)Google Scholar
  10. 10.
    Yoshioka, D., Dainobu, Y.: On some properties of Chebyshev polynomial sequences modulo \(2^k\). Nonlinear Theory Appl. IEICE 6(3), 443–452 (2015)CrossRefGoogle Scholar
  11. 11.
    Iwasaki, A., Umeno, K.: Periodical property of Chebyshev polynomials on the residue class rings of modulo \(2^w\). IEICE Technical Report, CAS2014-67, NLP2014-61, pp. 81–86 (2014) (In Japanese)Google Scholar
  12. 12.
    Iwasaki, A., Umeno, K.: Period of orbit and degree of Chebyshev polynomial on a ring of modulo \(2^w\) ”. IEICE Technical Report, NLP2015-61, pp. 129–134 (2015) (In Japanese)Google Scholar
  13. 13.
    Kawano, K., Yoshioka, D.: A solution on the degree determination problem of Chebyshev polynomials over the residue ring \(\mathbb{Z}/2^k\mathbb{Z}\). IEICE Technical Report, NLP2015-77, pp. 53–56 (2015) (In Japanese)Google Scholar
  14. 14.
    Yoshioka, D., Kawano, K.: Periodic properties of Chebyshev polynomial sequences over the residue ring \(\mathbb{Z}/2^k\mathbb{Z}\). IEEE Trans. Circuits Syst. II 63, 778–782 (2016)CrossRefGoogle Scholar

Copyright information

© The JJIAM Publishing Committee and Springer Japan KK 2017

Authors and Affiliations

  1. 1.Fukuoka Institute of TechnologyFukuokaJapan
  2. 2.Kyoto UniversityKyotoJapan

Personalised recommendations