Abstract
Two new systematic authentication codes based on the Gray map over a Galois ring are introduced. The first introduced code attains optimal impersonation and substitution probabilities. The second code improves space sizes, but it does not attain optimal probabilities. Additionally, it is conditioned to the existence of a special class of bent maps on Galois rings.
MSC:
Primary: 11T71; Secondary: 14G50; 94A60; 94A62
1. Introduction
Resilient maps were introduced in 1985 by Chor et al. [1] and independently by Bennett et al. [2], in the context of key distribution and quantum cryptography protocols. Resilient maps have also been used in the generation of random sequences aimed to stream ciphering [3].
The current paper deals with the notion of systematic authentication codes without secrecy as defined in [4] and considered in [5,6]. Within the systematic authentication codes, two main problems arise: the first problem consists of getting optimal minimal attack probabilities, the second problem consists of keeping the size of the key spaces as low as possible in comparison with the size of the message space—namely, the product of the sizes of the source state space and the tag space. These two goals are conflicting, and thus a trade-off strategy is required. Theorems 2.3 and 3.1 in [7] state that when optimal values for the impersonation and the substitution probabilities , are reached, then some relations among the sizes of the spaces arise (see also Theorem 14 in [8]).
In this paper, two new systematic authentication codes based on the Gray map on a Galois ring are introduced with the purpose of optimally reducing the impersonation and substitution probabilities. In the context of authentication codes, the substitution and impersonation probabilities are important characteristics. We build a first code with optimal values for these probabilities but at the cost of huge key and source spaces. A second code is introduced with convenient spaces sizes, but the corresponding substitution probability is not optimal.
The first code presented here is another example of a previously constructed code using the Gray map on Galois rings and modules over these rings [9]. The construction in [9] is based on rational non-degenerated maps. Here, through the generalized Gray map and resilient maps on Galois rings we obtain minimal upper bounds for the attack probabilities, thus improving former codes. Indeed, the obtained impersonation and substitution probabilities are optimal. However, the introduced code has a smaller source state space in comparison with the key space. We introduce precise definitions over Galois rings of the notions of resilient maps and the generalized Gray map. The introduced construction over Galois rings is translated into finite fields via the Gray map, thus providing similar codes on Galois fields.
In [10] a family of bent maps is introduced over Galois rings of characteristic , with p a prime number. The class of these maps is closed under multiplication by units in the Galois ring, under the assumption that there exists a similar class of bent functions in Galois rings of characteristic , with . For this hypothetical code we obtain spaces of acceptable size, similar to sizes in former constructions but with improved impersonation and substitution probabilities. In fact, the probabilities are lower than those in other authentication codes with no optimal probabilities.
The paper is organized as follows: In Section 2 the basic construction of the Gray map is recalled. In Section 3 a new systematic authentication code based on the Gray map is introduced and its main properties are determined. In Section 3.1 the general construction of a systematic authentication code is recalled, and the new code is treated in Section 3.2 and Section 3.3. In Section 3.4 we introduce the second code on the assumption of the existence of an appropriate class of bent functions. In Section 4 we make a succinct comparison with formerly introduced systematic authentication codes, and in Section 5 we state some conclusions. The existence of the required bijection between the key space and the set of encoding maps is proved exhaustively and the current proof is rather long (hence, tedious). However, the reader can find it in [11].
2. The Gray Map over Galois Rings
Let be the ring of integers modulo , where p is a prime and r a positive integer. A monic polynomial is called monic basic irreducible (primitive) if its reduction modulo p is an irreducible (primitive) polynomial over . The Galois ring of characteristic is defined as
where is a monic basic irreducible polynomial of degree l and is the ideal of generated by . The polynomial can be taken such that it is a divisor of .
The Galois ring is local with maximal ideal and residue field isomorphic to where . This ring has characteristic , is a chain ring, and . The group of units of R is , where G is a group of order , has order , and . The Teichmüller set of representatives of R is . Any has a unique p-adic (multiplicative) representation: where for . The ring R has the structure of a -module: For details and further properties we refer the reader to ([12], [Chapter XVI]) and [13].
Let p be a prime number, , and . Let and be the corresponding Galois rings of degrees ℓ and . The ring A is an extension of , and B is an extension of A. Let , and be the corresponding trace maps, and let and denote the maximal ideals of zero divisors of A and B, respectively.
Firstly, let us recall some well-known facts [9], as follows.
Lemma 1.
Let . Then the following assertions hold:
- 1.
- 2.
- 3.
From this point forward we assume that . The homogeneous weight on the ring A is the map [14] , where
and, according to Lemma 1,
Indeed, the map , is a metric on A. The ring A can also be considered as the metric space .
Let be the q-dimensional vector space over the Galois field , and “⊗” denote the Kroenecker product , We iterate this product “on the right” as: Let be the j-th vector in the canonical basis of , where is the Kroenecker delta, is the vector with constant entries equal to 1, and the reduction modulus p map. Let be the set of Teichmüller representatives of in A and let For each index let
(here, for any , and ). For let . The vector is the concatenation of blocks, each one consisting of the concatenation of blocks of the form , where is the j-th coordinate of , for (see Relation (3)).
Then, the vector can be efficiently constructed: given an index k, with , let and . Then, is the -th coordinate of . In summary, for each , the vector defined by (3) can be expressed as:
where we are using the notation introduced immediately after the relation (3). As a final vector, let us define The Gray map is defined as follows:
where the elements of A are represented in their p-adic form (i.e., ).
In particular, if , we have
Then the Gray map, as defined by (5), equals, for any element of the form :
which coincides with the definition given in [9].
The vector space can be endowed with a structure of metric space with the Hamming distance : the distance between two vectors is the number of entries at which they differ.
Two important properties of the Gray map are stated by the following proposition:
Proposition 1.
The following assertions hold:
- 1.
- Isometry[14]. The Gray map is an isometry between the Galois ring A and the vector space :
- 2.
- The Gray map preserves addition:
3. A Systematic Authentication Code Based on the Gray Map
3.1. General Systematic Authentication Codes
We recall that a systematic authentication code without secrecy [4] is a structure where S is the source state space, T is the tag space, K is the key space and is a sequence of encoding rules .
A transmitter and a receiver agree to a secret key . Whenever a source must be sent, the participants proceed according to the protocol depicted in Table 1.
Table 1.
Protocol of the transmission of a source .
The communicating channel is public, thus it can be eavesdropped upon by an intruder able to perform either impersonation or substitution attacks through the public channel. The intruder’s success probabilities for impersonation and substitution are, respectively [7]:
For systematic authentication codes, lower bounds are known for and [5]:
and in order to be acceptable, both and must be as small as possible.
3.2. A New Systematic Authentication Code
In the context of finite fields of characteristic 2, for and , let be an index t-subset. The affine J-variety determined by is
A map , , is J-resilient if , the map is balanced, namely, , . The map is t-resilient if it is J-resilient for any set J such that . The notion of t-resilient maps has been studied by several authors in the context of Galois rings, assumed as the last property of the above paragraph, and well-known wider classes of t-resilient maps have been provided. For instance, from Theorem 1 in [15], for any , if B is a Galois ring and is a map such that any element at its image has more than t entries which are units in B and is any map, then the map , is a t-resilient map,
In this section, a systematic authentication code is constructed using a resilient function on a Galois ring and the Gray map on this ring.
Let be a prime number, , and . Assume the same setting as in the beginning of Section 2.
Let be the set of elements of the Galois ring B that are either units or zero. Let be another positive integer, and be a t-resilient map. The following assertions hold:
- For , the map , , is t-resilient, hence it is also balanced.
- For , the map , , is balanced (as composition of balanced maps).
- As a more general result than Corollary 2 of [16], we have that the mapis balanced whenever and either , with , or .
- Recall that the Fourier transform of the map is the functionAs shown in [15], under the same conditions as the above assertion, just because the map is balanced.
Let be the set of the Teichmüller representatives of in A. Then, . Similarly, is the set of the Teichmüller representatives of in B.
Let and . For any , let be the i-th vector in the canonical set of generators of . For any , let
Then, , , , , and also
Let us consider an -subset of ,
and
Then, and .
Let , , let be an n-sequence of (repetitions are allowed), and For each integer k, with , let
Then, and .
Now, let be a subset of , with elements, such that , and
Then, and
Let , , and
Certainly, at this point the definition of the source set S is quite unnatural. However, defined in this way, it guarantees an appropriate distance between elements (Proposition 2), leading to optimal results (Proposition 4) while keeping balanced the maps , for a t-resilient map f. This particular structure of the source space S will allow a one-to-one correspondence between keys and encoding maps (Proposition 3). From Relation (14), , and
where , , The introduced construction imposes the supplementary condition
3.3. Main Characteristics of the New Code
Let be the Gray map on A as defined in (5). We observe that for any element , with (see (10)), the evaluation of at y, according to (5), is
Also, since is even, for any generating , either or . The following implication holds: Hence, if the p-adic form of an element in A is , the p-adic form of is . Let be a t-resilient map. For each and each , consider the map , , where
(see relation (8) above). Let
Since , we have , thus we may assume .
Proposition 2.
Let be the Hamming distance on the vector space and let be a t-resilient map. For any two points , , with , and any two , the following relation holds:
Proof.
Let and . Then, the calculation of the Hamming distance of the points is displayed in (18), there equality (i) holds because is an isometry, equality (ii) follows from the defining Relation (1), and equality (iii) is due to Relation (16).
If , since f is t-resilient and is a balanced map, from (18) the claim follows:
If , also from (18) we obtain
because . ☐
For each , let be the map
The set of encoding rules in the proposed systematic authentication code is thus .
Proposition 3.
The map , , is one-to-one.
Proof.
The proposition is clearly equivalent to the following statement: ,
where is given by Relation (17).
According to (17), each element , , is the concatenation of q arrays , each of length . The index range of the element can be split as the concatenation of integer intervals
with , and each integer interval has length .
We recall at this point that Let , be the corresponding natural bijections. Then, up to these enumerations and relation (4), we can identify where
Let be two keys such that . Depending on the intervals in which these keys fall, we can consider four mutually disjoint and exhaustive cases:
- Case I:: & .
- Case II:: & & .
- Case III:: & & .
- Case IV::
The analysis of these cases, giving a full proof of the proposition, is rather extensive and certainly tedious. It is provided in full detail in [11]. ☐
Proposition 4.
For the authentication code defined by the relations (14) and (19), the following relations hold:
Proof.
☐Let and be fixed. Then, the map ,
is one-to-one. For any , we have
where is defined by relation (17). Since , then, from (6), .
Now, consider , such that . For each , and each , let and be such that . Then, equivalent conditions for a pair of encoding sources are shown in the following:
From there, it can be seen that
Now, from (7) and (23):
Observe at this point that instead of N in (14), it is possible to take the set in order to produce a new systematic authenticatication code with the same impersonation and substitution probabilities as in (22).
3.4. A Second Systematic Authentication Code
Let p be a prime number, and . Let and be the corresponding Galois rings of degrees ℓ and . Let
Observe that since , if then .
Let f be a bent function on B such that is a bent function for any unit and let be the Gray map on A. The proposed systematic authentication code, , is the following:
where for , , , , , and is the k-th projection map from onto , mapping to its k-th coordinate.
Let L be as above and let With the notation as above, a second systematic authentication code, is also proposed:
Note that the code is a slight modification of the code : in the definition of the source space S for , the set L is taken while in the definition of the source space for the set V is used.
The impersonation and substitution probabilities and can be upper-bounded.
Lemma 2.
Let be the Hamming distance on . With the notation as above, for any , and any elements , we have
Theorem 1.
With the notation as above, the function given by is bijective.
Theorem 2.
Let be the systematic authentication code as defined above. Then,
4. Parameter Comparison with Other Codes
We summarize quite succinctly in Table 2 a parameter comparison of our codes with other codes based on the Gray map. There, as in Relation (15),
D is an integer in the interval , and, as stated in [9] Prop. 3.5, N is a positive integer such that
Table 2.
Parameter comparison of the introduced code with other previously published codes.
Our first code provides optimal values for and for all parameters q, m, n, r in which the code exists. For the codes in [9] the optimal values are obtained only if . However, in our code, the cardinality of the key space is greater than the product of the cardinalities of the source and tag spaces.
In [10], it is stated that a map valued on a Galois ring is a bent function if
and it was shown that, for the special case of , whenever k and are relatively prime, then for any and any unit in A, the map , , is a bent function ().
Namely, for the special case of , a class of bent maps, closed by the multiplication of units in the Galois ring, can be used to build a systematic authentication code (SAC).
Later, the Gray map and the above-mentioned class of bent maps were used to build a new SAC, improving the impersonation and substitution probabilities. In fact, these constructions can be extended to any characteristic , with , under the assumption that there exists a similar class of bent maps, closed by the multiplication of units in the Galois ring. In this case, the obtained SAC would have the parameters displayed in Table 3.
Table 3.
Parameters of the obtained systematic authentication code (SAC) .
In comparison with the values displayed at Table 2, we have that this last hypothetical construction would have more convenient parameters for the spaces: the source space is greater than the key space, and the tag space is rather small. Even more, it has a greater difference on the cardinality of the cardinality of the key space and the product of the cardinalities of the source and tag spaces. This is an advantage even when comparing with other SACs with no optimal impersonation and substitution probabilities. For instance, this last hypothetical construction would improve the probabilities and the space sizes of the codes in [4,8], although the code in [8] does not attain the optimal values for these probabilities.
Similar constructions were performed through resilient maps and functions generalizing bent maps, for any characteristic , with .
5. Conclusions
An authentication code using the trace, the Gray maps, and the resilient functions on Galois rings were constructed. In this regard, the current construction is similar to the constructions in [9]. In order to diminish the substitution and impersonation probabilities, here we used resilient maps on Galois rings of general characteristic , with p a prime number and r an integer greater or equal to 2, in contrast to the former approach based either on non-degenerate and rational maps on Galois rings of general characteristic [9], or on bent maps on Galois rings of characteristic . The current construction provides optimal substitution and impersonation probabilities, at the expense of growth of cardinalities and an elaborated space structure. In contrast with [9], the key space in our code is of greater cardinality than the source space. Our code attains optimal probability values, but it has a key space greater than the corresponding source space.
A second authentication code was built, and this code has convenient space sizes with a significant difference between the key space and the source space, and a small cardinality in the tag space. The probabilities are rather small, but the substitution probability is not optimal. However, this second construction is conditioned to the existence of a class of bent functions closed under the multiplication by units in the corresponding Galois ring. We look towards the proof of the existence of this necessary class of bent functions.
Author Contributions
The three authors contributed equally to conceptualization and formal analysis of this paper.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Chor, B.; Goldreich, O.; Håstad, J.; Friedman, J.; Rudich, S.; Smolensky, R. The Bit Extraction Problem of t-Resilient Functions (Preliminary Version). In Proceedings of the 26th Annual Symposium on Foundations of Computer Science (FOCS), Portland, OR, USA, 21–23 October 1985; pp. 396–407. [Google Scholar]
- Bennett, C.H.; Brassard, G.; Robert, J.M. Privacy Amplification by Public Discussion. SIAM J. Comput. 1988, 17, 210–229. [Google Scholar] [CrossRef]
- Rueppel, R. Analysis and Design of Stream Ciphers; Communications and Control Engineering; Springer: Berlin, Germany, 1986. [Google Scholar]
- Ding, C.; Niederreiter, H. Systematic authentication codes from highly nonlinear functions. IEEE Trans. Inf. Theory 2004, 50, 2421–2428. [Google Scholar] [CrossRef]
- Carlet, C.; Ding, C.; Niederreiter, H. Authentication Schemes from Highly Nonlinear Functions. Des. Codes Cryptogr. 2006, 40, 71–79. [Google Scholar] [CrossRef]
- Ding, C.; Helleseth, T.; Kløve, T.; Wang, X. A Generic Construction of Cartesian Authentication Codes. IEEE Trans. Inf. Theory 2007, 53, 2229–2235. [Google Scholar] [CrossRef]
- Stinson, D.R. Combinatorial characterizations of authentication codes. Des. Codes Cryptogr. 1992, 2, 175–187. [Google Scholar] [CrossRef]
- Chanson, S.; Ding, C.; Salomaa, A. Cartesian authentication codes from functions with optimal nonlinearity. Theor. Comput. Sci. 2003, 290, 1737–1752. [Google Scholar] [CrossRef]
- Özbudak, F.; Saygi, Z. Some constructions of systematic authentication codes using Galois rings. Des. Codes Cryptogr. 2006, 41, 343–357. [Google Scholar] [CrossRef]
- Carlet, C.; Ku-Cauich, J.C.; Tapia-Recillas, H. Bent functions on a Galois ring and systematic authentication codes. Adv. Math. Commun. 2012, 6, 249–258. [Google Scholar] [CrossRef]
- Ku-Cauich, J.C.; Morales-Luna, G.; Tapia-Recillas, H. Proof of Correspondence between Keys and Encoding Maps in an Authentication Code. Technical Report. arxiv 2017, arXiv:1703.08147. [Google Scholar]
- McDonald, B. Finite Rings with Identity; Pure and Applied Mathematics Series; Marcel Dekker Incorporated: New York, NY, USA, 1974. [Google Scholar]
- Wan, Z. Lectures on Finite Fields and Galois Rings; World Scientific: Singapore, 2003. [Google Scholar]
- Greferath, M.; Schmidt, S.E. Gray isometries for finite chain rings and a nonlinear ternary (36, 312, 15) code. IEEE Trans. Inf. Theory 1999, 45, 2522–2524. [Google Scholar] [CrossRef]
- Carlet, C. More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings; EUROCRYPT; Fumy, W., Ed.; Springer: Berlin/Heidelberg, Germany, 1997; Volume 1233, pp. 422–433. [Google Scholar]
- Zhang, X.M.; Zheng, Y. Cryptographically resilient functions. IEEE Trans. Inf. Theory 1997, 43, 1740–1747. [Google Scholar] [CrossRef]
- Ku-Cauich, J.C.; Morales-Luna, G. Authentication codes based on resilient Boolean maps. Des. Codes Cryptogr. 2015, 1–15. [Google Scholar] [CrossRef]
- Ku-Cauich, J.C.; Tapia-Recillas, H. Systematic Authentication Codes Based on a Class of Bent Functions and the Gray Map on a Galois Ring. SIAM J. Discret. Math. 2013, 27, 1159–1170. [Google Scholar] [CrossRef]
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).