Towards a Better Understanding of One-Wayness: Facing Linear Permutations

The one-wayness of linear permutations, i.e., invertible linear Boolean functions F: {0,1}n → {0, 1}n, is investigated. For linear permutations with a triangular matrix description (tlinear permutations), we prove that one-wayness, C(F−1)/C(F), is non-trivially upperbounded by 16√n, where C(.) denotes unrestricted circuit complexity. We also prove that this upper bound strengthens as the complexity of the inverse function increases, limiting the one-wayness of t-linear permutations with C(F−1) = n2/(c log2(n)) to a constant, i.e., a value that is independent of n. Direct implications for linear and also non-linear permutations are discussed. Moreover, and for the first time ever, a description is given about where, in the case of linear permutations, practical one-wayness would have to come from, if it exists.

[1]  D. Ulig On the synthesis of self-correcting schemes from functional elements with a small number of reliable elements , 1974 .

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Wolfgang J. Paul Realizing Boolean Functions on Disjoint sets of Variables , 1976, Theor. Comput. Sci..

[4]  Stephen Wayne Boyack The robustness of combinatorial measures of Boolean matrix complexity , 1985 .

[5]  Jeffrey C. Lagarias,et al.  One-Way Functions and Circuit Complexity , 1986, Inf. Comput..

[6]  Ingo Wegener,et al.  The complexity of Boolean functions , 1987 .

[7]  Jeffrey C. Lagarias,et al.  One-Way Functions and Circuit Complexity , 1987, Inf. Comput..

[8]  Russell Impagliazzo,et al.  One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.

[9]  Volker Strassen,et al.  Algebraic Complexity Theory , 1991, Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity.

[10]  Don Coppersmith,et al.  Matrix multiplication via arithmetic progressions , 1987, STOC.

[11]  S. Goldwasser The Search for Provably Secure Cryptosystems , 1990 .

[12]  Zhi-Li Zhang,et al.  Efficiently inverting bijections given by straight line programs , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[13]  J. Van Leeuwen,et al.  Handbook of theoretical computer science - Part A: Algorithms and complexity; Part B: Formal models and semantics , 1990 .

[14]  Alain P. Hiltgen,et al.  Constructions of Freebly-One-Way Families of Permutations , 1992, AUSCRYPT.

[15]  Alain P. Hiltgen Cryptographically relevant contributions to combinational complexity theory , 1994 .

[16]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .