Abstract
Multivariate Public key cryptosystems are widely spread and ever evolving domain. This study aims to find new techniques to characterize and detect permutation polynomials over finite fields, which enable us to find trapdoor, one way, functions that are essential to build robust cryptosystems. Let \(f\) be a polynomial over \(F_{q}\), a finite field of order \(q\), where \(q = p^{m}\), \(p\) is a prime number. If \(f\) induces a bijective mapping, one-to-one mapping, of \(F_{q}\), we call \(f\) a permutation polynomial over \(F_{q}\). In order to detect these polynomials, we constructed a program implementing multiple algorithms based on Galois field arithmetic. As a result, we have the number of all possible permutation polynomials in the fields \( F_{4}\), \(F_{8}\) and \(F_{16}\).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Apostol, T.M.: Introduction to Analytic Number Theory. Springer, New York (1976)
Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer, Berlin (2009)
Bini, G., Flamini, F.: Finite Commutative Rings and their Applications. Kluwer Academic Publishers, Boston (2002)
Hermite, Ch.: Sur les fonctions de sept lettres. C. R. Acad. Sci. 57, 750–757 (1863)
Katz, J., Lindell Y.: Introduction to Modern Cryptography. Chapman and Hall/CRC, Boca Raton (2008)
Levine, J., Brawley, J.V.: Some cryptographic applications of permutation polynomials. Cryptologia 1, 76–92 (1977)
Lidl, R., Müller, W.B.: Permutation polynomials in RSA-cryptosystems. In: Chaum, D. (eds.) Advances in Cryptology, Crypto 83, pp. 293–301. Plenum Press, New York (1984)
Lidl, R., Niederriter, H.: Finite Fields (2nd edn). Cambridge University Press, Cambridge (1997)
Lidl, R., Niederriter, H.: Introduction to Finite Fields and their Applications. Cambridge University Press, Cambridge (1986)
Masuda, A., Panario, D., Wang, Q.: The number of permutation binomials over \(F_{4p+1}\) where \(p\) and \(4p+1\) are primes. Electron. J. Comb. 13 (2006)
Müller, W.B., Nöbauer, W.: Some remarks on public-key cryptosystems. Studia Sci. Math. Hungar. 16, 71–76 (1981)
Partow, A.: Galois Field Arithemetic Library. http://www.partow.net/projects/galois/index.html
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on quantum computers. In: 35th Annual Symposium on Foundations of Computer, Science (1994)
Stewart, I.: Galois Theory. Chapman and Hall, London (1989)
Wang, Q., Akbary, A.: On some permutation polynomials over finite fields. Int. J. Math. Math. Sci. 16, 2631–2640 (2005)
Witno, A.: Theory of Numbers. BookSurge Publishing, Charleston (2008)
Wolf, C.: Introduction to multivariate quadratic public key systems and their applications. In: Proceedings of YACC, pp. 44–55. (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gharibah, M. (2014). On the Detection of Permutation Polynomials . In: Makhlouf, A., Paal, E., Silvestrov, S., Stolin, A. (eds) Algebra, Geometry and Mathematical Physics. Springer Proceedings in Mathematics & Statistics, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55361-5_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-55361-5_39
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55360-8
Online ISBN: 978-3-642-55361-5
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)