Decomposition of permutations in a finite field

We describe a method to decompose any power permutation, as a sequence of power permutations of lower algebraic degree. As a result we obtain decompositions of the inversion in GF(2n) for small n from 3 up to 16, as well as for the APN functions, when n = 5. More precisely, we find decompositions into quadratic power permutations for any n not multiple of 4 and decompositions into cubic power permutations for n multiple of 4. Finally, we use the Theorem of Carlitz to prove that for 3 ≤ n ≤ 16 any n-bit permutation can be decomposed in quadratic and cubic permutations.

[1]  Amir Moradi,et al.  Side-Channel Resistant Crypto for Less than 2,300 GE , 2011, Journal of Cryptology.

[2]  Srinivas Vivek,et al.  Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures , 2014, CHES.

[3]  Cunsheng Ding,et al.  On Almost Perfect Nonlinear Permutations , 1994, EUROCRYPT.

[4]  L. Carlitz,et al.  A note on permutation functions over a finite field , 1962 .

[5]  Vincent Rijmen,et al.  Threshold Implementations of all 3x3 and 4x4 S-boxes , 2012, IACR Cryptol. ePrint Arch..

[6]  Wilfried Meidl,et al.  On the Carlitz rank of permutation polynomials , 2009, Finite Fields Their Appl..

[7]  Michael E. Zieve On a theorem of Carlitz , 2008, 0810.2834.

[8]  L. Carlitz A note on permutations in an arbitrary field , 1963 .

[9]  L. Carlitz Permutations in a finite field , 1953 .

[10]  Amir Moradi Advances in side-channel security , 2016 .

[11]  Claude Carlet,et al.  Vectorial Boolean Functions for Cryptography , 2006 .

[12]  Jacques Patarin,et al.  Generic Attacks on Feistel Schemes , 2001, ASIACRYPT.

[13]  Phuong Ha Nguyen,et al.  Enabling 3-share Threshold Implementations for any 4-bit S-box , 2012, IACR Cryptol. ePrint Arch..

[14]  Vincent Rijmen,et al.  Threshold implementations of small S-boxes , 2014, Cryptography and Communications.

[15]  Kaisa Nyberg,et al.  Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.

[16]  Srinivas Vivek,et al.  Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 , 2013, CHES.

[17]  Claude Carlet,et al.  Algebraic Decomposition for Probing Security , 2015, CRYPTO.

[18]  Claude Carlet,et al.  Higher-Order Masking Schemes for S-Boxes , 2012, FSE.

[19]  Gregor Leander,et al.  On the classification of APN functions up to dimension five , 2008, Des. Codes Cryptogr..