Skip to main content

Introduction to Mirror Theory

  • Chapter
  • First Online:
Feistel Ciphers

Abstract

“Mirror Theory” is the theory that evaluates the number of solutions of affine systems of equalities ( = ) and non equalities ( ≠ ) in finite groups. It is deeply related to the security and attacks of many generic cryptographic secret-key schemes, like random Feistel schemes (balanced or unbalanced), Misty schemes, Xor of two pseudo-random bijections to generate a pseudo-random function etc. In this chapter we will assume that the groups are abelian. Most of the time in cryptography the group is \(((\mathbb{Z}/2\mathbb{Z})^{n},\oplus )\) and this chapter concentrates on these cases. We present here general definitions, some theorems, and many examples and computer simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hall, M., Jr.: A combinatorial problem on abelian groups. In: Proceedings of the American Mathematical Society, vol. 3(4), pp. 584–587 (1952)

    MathSciNet  MATH  Google Scholar 

  2. Hall, M., Jr.: A problem in combinatorial group theory. Ars Combinatoria 7, 3–5 (1979)

    MathSciNet  Google Scholar 

  3. Patarin, J.: On linear systems of equations with distinct variables and small block size. In: WON, D., Kim, S. (eds.), Information and Communications Security – ICISC ’05, vol. 3935, Lecture Notes in Computer Science, pp. 299–321. Springer, Heidelberg (2005)

    Google Scholar 

  4. Patarin, J.: A Proof of Security in O(2\(^{\mbox{ n}}\)) for the Xor of Two Random Permutations. In: Safavi-Naini, R. (ed.), Information and Communications Security – ICITS 2008, vol. 5155, Lecture Notes in Computer Science, pp. 232–248. Springer, Heidelberg (2008)

    Google Scholar 

  5. Patarin J.: The “Coefficients H” technique. In: Avanzi, R., Keliher, L., Sica, F. (ed.), Selected Areas in Cryptography – SAC ’08, vol. 5381, Lecture Notes in Computer Science, pp. 328–345. Springer, Heidelberg (2009)

    Google Scholar 

  6. Patarin, J.: A Proof of Security in O(2\(^{\mbox{ n}}\)) for the Xor of two random permutations∖∖ - Proof with the H σ technique-, in Cryptology ePrint Archive: Report 2008/010

    Google Scholar 

  7. Patarin, J.: Introduction to mirror theory: analysis of systems of linear equalities and linear non equalities for cryptography, in Cryptology ePrint Archive: Report 2010/287

    Google Scholar 

  8. Patarin, J.: Security of balanced and unbalanced Feistel schemes with linear non equalities, in Cryptology ePrint Archive: Report 2010/293

    Google Scholar 

  9. Patarin, J.: Security in O(2\(^{\mbox{ n}}\)) for the Xor of two random permutations ∖∖ - Proof with the standard H technique -, in Cryptology ePrint Archive: Report 2013/368

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Nachef, V., Patarin, J., Volte, E. (2017). Introduction to Mirror Theory. In: Feistel Ciphers. Springer, Cham. https://doi.org/10.1007/978-3-319-49530-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49530-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49528-6

  • Online ISBN: 978-3-319-49530-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics