Skip to main content

Showing 1–4 of 4 results for author: Mishra, P R

.
  1. A New Algorithm for Computing Branch Number of Non-Singular Matrices over Finite Fields

    Authors: P. R. Mishra, Yogesh Kumar, Susanta Samanta, Atul Gaur

    Abstract: The notion of branch numbers of a linear transformation is crucial for both linear and differential cryptanalysis. The number of non-zero elements in a state difference or linear mask directly correlates with the active S-Boxes. The differential or linear branch number indicates the minimum number of active S-Boxes in two consecutive rounds of an SPN cipher, specifically for differential or linear… ▽ More

    Submitted 23 September, 2024; v1 submitted 11 May, 2024; originally announced May 2024.

  2. A Systematic Construction Approach for All $4\times 4$ Involutory MDS Matrices

    Authors: Yogesh Kumar, P. R. Mishra, Susanta Samanta, Atul Gaur

    Abstract: Maximum distance separable (MDS) matrices play a crucial role not only in coding theory but also in the design of block ciphers and hash functions. Of particular interest are involutory MDS matrices, which facilitate the use of a single circuit for both encryption and decryption in hardware implementations. In this article, we present several characterizations of involutory MDS matrices of even or… ▽ More

    Submitted 17 June, 2024; v1 submitted 12 April, 2024; originally announced April 2024.

    Journal ref: Journal of Applied Mathematics and Computing, 14 Jun 2024

  3. Construction of all MDS and involutory MDS matrices

    Authors: Yogesh Kumar, P. R. Mishra, Susanta Samanta, Kishan Chand Gupta, Atul Gaur

    Abstract: In this paper, we propose two algorithms for a hybrid construction of all $n\times n$ MDS and involutory MDS matrices over a finite field $\mathbb{F}_{p^m}$, respectively. The proposed algorithms effectively narrow down the search space to identify $(n-1) \times (n-1)$ MDS matrices, facilitating the generation of all $n \times n$ MDS and involutory MDS matrices over $\mathbb{F}_{p^m}$. To the best… ▽ More

    Submitted 13 August, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

    Journal ref: Advances in Mathematics of Communications 2024

  4. arXiv:0909.1392  [pdf, other

    cs.CR math.AC

    HF-hash : Hash Functions Using Restricted HFE Challenge-1

    Authors: Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sengupta

    Abstract: Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 with 64 variables by forcing remaining 16 variables as zero.… ▽ More

    Submitted 5 October, 2009; v1 submitted 8 September, 2009; originally announced September 2009.

    Comments: 44 pages including 32 pages appendix (list of polynomials) 2 figures, corrected Surname