p-Adic Dynamical Systems and Cryptography
Non-Archimedean View on T-functions
Vladimir Anashin Russian State University for the Humanities Faculty of Information Security
p-Adic Dynamical Systems and Cryptography – p. 1/65
p -Adic Dynamical Systems and Cryptography Non-Archimedean View on T - - PowerPoint PPT Presentation
p -Adic Dynamical Systems and Cryptography Non-Archimedean View on T -functions Vladimir Anashin Russian State University for the Humanities Faculty of Information Security p -Adic Dynamical Systems and Cryptography p. 1/65 T -functions:
Vladimir Anashin Russian State University for the Humanities Faculty of Information Security
p-Adic Dynamical Systems and Cryptography – p. 1/65
0, α↓ 1, α↓ 2, . . .) → (Φ0(α↓ 0), Φ1(α↓ 0, α↓ 1), Φ2(α↓ 0, α↓ 1, α↓ 2), . . .).
i ∈ Bm is a Boolean columnar m-dimensional
0, . . . , α↓ i to
0, . . . , α↓ i).
p-Adic Dynamical Systems and Cryptography – p. 2/65
p-Adic Dynamical Systems and Cryptography – p. 2/65
p-Adic Dynamical Systems and Cryptography – p. 2/65
p-Adic Dynamical Systems and Cryptography – p. 2/65
p-Adic Dynamical Systems and Cryptography – p. 3/65
p-Adic Dynamical Systems and Cryptography – p. 3/65
p-Adic Dynamical Systems and Cryptography – p. 4/65
p-Adic Dynamical Systems and Cryptography – p. 4/65
p-Adic Dynamical Systems and Cryptography – p. 4/65
p-Adic Dynamical Systems and Cryptography – p. 4/65
p-Adic Dynamical Systems and Cryptography – p. 4/65
p-Adic Dynamical Systems and Cryptography – p. 5/65
p-Adic Dynamical Systems and Cryptography – p. 5/65
p-Adic Dynamical Systems and Cryptography – p. 5/65
p-Adic Dynamical Systems and Cryptography – p. 5/65
p-Adic Dynamical Systems and Cryptography – p. 5/65
p-Adic Dynamical Systems and Cryptography – p. 6/65
p-Adic Dynamical Systems and Cryptography – p. 6/65
p-Adic Dynamical Systems and Cryptography – p. 6/65
p-Adic Dynamical Systems and Cryptography – p. 7/65
p-Adic Dynamical Systems and Cryptography – p. 7/65
p-Adic Dynamical Systems and Cryptography – p. 7/65
p-Adic Dynamical Systems and Cryptography – p. 7/65
p-Adic Dynamical Systems and Cryptography – p. 7/65
p-Adic Dynamical Systems and Cryptography – p. 8/65
state update
p-Adic Dynamical Systems and Cryptography – p. 8/65
state update
p-Adic Dynamical Systems and Cryptography – p. 8/65
p-Adic Dynamical Systems and Cryptography – p. 9/65
p-Adic Dynamical Systems and Cryptography – p. 10/65
p-Adic Dynamical Systems and Cryptography – p. 11/65
p-Adic Dynamical Systems and Cryptography – p. 12/65
p-Adic Dynamical Systems and Cryptography – p. 12/65
p-Adic Dynamical Systems and Cryptography – p. 12/65
p-Adic Dynamical Systems and Cryptography – p. 12/65
p-Adic Dynamical Systems and Cryptography – p. 13/65
p-Adic Dynamical Systems and Cryptography – p. 14/65
p-Adic Dynamical Systems and Cryptography – p. 14/65
2| on [0, 1] always falls in very short
p-Adic Dynamical Systems and Cryptography – p. 14/65
2 iterations!!!
p-Adic Dynamical Systems and Cryptography – p. 14/65
p-Adic Dynamical Systems and Cryptography – p. 15/65
p-Adic Dynamical Systems and Cryptography – p. 15/65
Shujun Li. When Chaos Meets Computers (2004):
p-Adic Dynamical Systems and Cryptography – p. 16/65
p-Adic Dynamical Systems and Cryptography – p. 17/65
p-Adic Dynamical Systems and Cryptography – p. 17/65
p-Adic Dynamical Systems and Cryptography – p. 18/65
p-Adic Dynamical Systems and Cryptography – p. 18/65
p-Adic Dynamical Systems and Cryptography – p. 18/65
p-Adic Dynamical Systems and Cryptography – p. 19/65
p-Adic Dynamical Systems and Cryptography – p. 19/65
p-Adic Dynamical Systems and Cryptography – p. 19/65
p-Adic Dynamical Systems and Cryptography – p. 20/65
p-Adic Dynamical Systems and Cryptography – p. 20/65
p-Adic Dynamical Systems and Cryptography – p. 20/65
p-Adic Dynamical Systems and Cryptography – p. 20/65
2⌋ is a shift towards less significant bits;
p-Adic Dynamical Systems and Cryptography – p. 21/65
p-Adic Dynamical Systems and Cryptography – p. 22/65
p-Adic Dynamical Systems and Cryptography – p. 22/65
. . . 1 1 1 1 + . . . 0 1 . . . 0
p-Adic Dynamical Systems and Cryptography – p. 22/65
. . . 0 1 1 1 × . . . 0 1 1 . . . 0 1 1 1 + . . . 1 1 1 . . . 1 1 1 1 1 1
p-Adic Dynamical Systems and Cryptography – p. 23/65
p-Adic Dynamical Systems and Cryptography – p. 23/65
p-Adic Dynamical Systems and Cryptography – p. 24/65
p-Adic Dynamical Systems and Cryptography – p. 24/65
p-Adic Dynamical Systems and Cryptography – p. 24/65
p-Adic Dynamical Systems and Cryptography – p. 24/65
p-Adic Dynamical Systems and Cryptography – p. 24/65
p-Adic Dynamical Systems and Cryptography – p. 24/65
22 = 1 4; d2
n→∞ 2n = 0;
∞
p-Adic Dynamical Systems and Cryptography – p. 24/65
p-Adic Dynamical Systems and Cryptography – p. 25/65
p-Adic Dynamical Systems and Cryptography – p. 25/65
p-Adic Dynamical Systems and Cryptography – p. 25/65
p-Adic Dynamical Systems and Cryptography – p. 26/65
p-Adic Dynamical Systems and Cryptography – p. 26/65
F
p-Adic Dynamical Systems and Cryptography – p. 26/65
p-Adic Dynamical Systems and Cryptography – p. 27/65
p-Adic Dynamical Systems and Cryptography – p. 27/65
p-Adic Dynamical Systems and Cryptography – p. 27/65
p-Adic Dynamical Systems and Cryptography – p. 28/65
8x8 9+10x9
p-Adic Dynamical Systems and Cryptography – p. 28/65
p-Adic Dynamical Systems and Cryptography – p. 29/65
p-Adic Dynamical Systems and Cryptography – p. 29/65
p-Adic Dynamical Systems and Cryptography – p. 29/65
p-Adic Dynamical Systems and Cryptography – p. 30/65
p-Adic Dynamical Systems and Cryptography – p. 31/65
p-Adic Dynamical Systems and Cryptography – p. 31/65
p-Adic Dynamical Systems and Cryptography – p. 31/65
p-Adic Dynamical Systems and Cryptography – p. 31/65
p-Adic Dynamical Systems and Cryptography – p. 31/65
p-Adic Dynamical Systems and Cryptography – p. 32/65
p-Adic Dynamical Systems and Cryptography – p. 32/65
p-Adic Dynamical Systems and Cryptography – p. 32/65
p-Adic Dynamical Systems and Cryptography – p. 33/65
p-Adic Dynamical Systems and Cryptography – p. 33/65
2n) is
p-Adic Dynamical Systems and Cryptography – p. 34/65
p-Adic Dynamical Systems and Cryptography – p. 34/65
p-Adic Dynamical Systems and Cryptography – p. 35/65
p-Adic Dynamical Systems and Cryptography – p. 35/65
p-Adic Dynamical Systems and Cryptography – p. 35/65
p-Adic Dynamical Systems and Cryptography – p. 35/65
j=0 cj
j
p-Adic Dynamical Systems and Cryptography – p. 36/65
∞
p-Adic Dynamical Systems and Cryptography – p. 36/65
p-Adic Dynamical Systems and Cryptography – p. 37/65
p-Adic Dynamical Systems and Cryptography – p. 37/65
2j(x AND 2j) is the j-th bit
p-Adic Dynamical Systems and Cryptography – p. 37/65
p-Adic Dynamical Systems and Cryptography – p. 37/65
p-Adic Dynamical Systems and Cryptography – p. 37/65
p-Adic Dynamical Systems and Cryptography – p. 37/65
p-Adic Dynamical Systems and Cryptography – p. 37/65
p-Adic Dynamical Systems and Cryptography – p. 38/65
p-Adic Dynamical Systems and Cryptography – p. 39/65
p-Adic Dynamical Systems and Cryptography – p. 39/65
p-Adic Dynamical Systems and Cryptography – p. 39/65
p-Adic Dynamical Systems and Cryptography – p. 39/65
state update
p-Adic Dynamical Systems and Cryptography – p. 40/65
state update
p-Adic Dynamical Systems and Cryptography – p. 40/65
state update
p-Adic Dynamical Systems and Cryptography – p. 40/65
p-Adic Dynamical Systems and Cryptography – p. 41/65
p-Adic Dynamical Systems and Cryptography – p. 41/65
p-Adic Dynamical Systems and Cryptography – p. 41/65
p-Adic Dynamical Systems and Cryptography – p. 41/65
p-Adic Dynamical Systems and Cryptography – p. 42/65
p-Adic Dynamical Systems and Cryptography – p. 42/65
p-Adic Dynamical Systems and Cryptography – p. 42/65
p-Adic Dynamical Systems and Cryptography – p. 42/65
p-Adic Dynamical Systems and Cryptography – p. 42/65
Theorem 5. (Anashin, 2004) Let F = {f0, . . . , fm−1} be a finite sequence of compatible measure preserving mappings of Z2 onto itself such that (i) the sequence {(fi mod m(0)) mod 2: i = 0, 1, 2, . . .} is purely periodic, its shortest period is of length m; (ii) m−1
i=0 fi(0) ≡ 1 (mod 2);
(iii) m−1
j=0
2t−1
z=0 fj(z) ≡ 2t (mod 2t+1) for all t = 1, 2, . . . .
Then the recurrence sequence Z defined by the relation xi+1 = fi mod m(xi) is strictly uniformly distributed modulo 2n for all n = 1, 2, . . . : That is, modulo each 2n the sequence Z is purely periodic, its shortest period is of length 2nm, and each element of Z/2n occurs at the period exactly m times.
p-Adic Dynamical Systems and Cryptography – p. 43/65
p-Adic Dynamical Systems and Cryptography – p. 43/65
p-Adic Dynamical Systems and Cryptography – p. 43/65
j=0 cj ≡ 0 (mod 2)
p-Adic Dynamical Systems and Cryptography – p. 43/65
j=0 cj ≡ 0 (mod 2)
p-Adic Dynamical Systems and Cryptography – p. 43/65
xi+1 = ci + hi(xi) L(c) = 2 ∙ c ⊕ u ∙ δn−1(c); u agrees with coefficients of the polynomial u
ci+1 = L(ci)
state update
p-Adic Dynamical Systems and Cryptography – p. 44/65
xi+1 = ci,r + h(xi)
h(x) = ((((x + a0) ⊕ b0) + a1) ⊕ b1) + a2
ci+1 = L(ci)
ci = (ci,ℓ; ci,r)
S(x) = d + n−1
j=0 dj ∙ δn−j−1(x)
plain text stream encrypted text stream
p-Adic Dynamical Systems and Cryptography – p. 45/65
xi+1 = ci,r + h(xi)
h(x) = a + b ∙ (x ⊕ a1)
ci+1 = L(ci)
ci = (ci,ℓ; ci,r)
S(x) = d + n−1
j=0 dj ∙ δn−j−1(x)
ˆ S(x) = (S(x))
plain text stream encrypted text stream
p-Adic Dynamical Systems and Cryptography – p. 45/65
p-Adic Dynamical Systems and Cryptography – p. 46/65
Note: For a truly random sequence of n-bit words of length P the above inequality holds with probability > 1 −
1 2n.
p-Adic Dynamical Systems and Cryptography – p. 46/65
p-Adic Dynamical Systems and Cryptography – p. 46/65
p-Adic Dynamical Systems and Cryptography – p. 47/65
n = xi mod 2n xi+1 mod 2n xi+2 mod 2n . . .
p-Adic Dynamical Systems and Cryptography – p. 47/65
n = xi mod 2n xi+1 mod 2n xi+2 mod 2n . . .
p-Adic Dynamical Systems and Cryptography – p. 47/65
p-Adic Dynamical Systems and Cryptography – p. 48/65
p-Adic Dynamical Systems and Cryptography – p. 48/65
n is random in the sense of
p-Adic Dynamical Systems and Cryptography – p. 48/65
p-Adic Dynamical Systems and Cryptography – p. 48/65
p-Adic Dynamical Systems and Cryptography – p. 49/65
r−1
p-Adic Dynamical Systems and Cryptography – p. 49/65
r−1
pn, zi+1 pn , . . . , zi+r−1 pn ),
p-Adic Dynamical Systems and Cryptography – p. 49/65
p-Adic Dynamical Systems and Cryptography – p. 50/65
p-Adic Dynamical Systems and Cryptography – p. 50/65
p-Adic Dynamical Systems and Cryptography – p. 50/65
p-Adic Dynamical Systems and Cryptography – p. 50/65
p-Adic Dynamical Systems and Cryptography – p. 50/65
p-Adic Dynamical Systems and Cryptography – p. 50/65
p-Adic Dynamical Systems and Cryptography – p. 51/65
p-Adic Dynamical Systems and Cryptography – p. 51/65
p-Adic Dynamical Systems and Cryptography – p. 51/65
2 . Thus, the
p-Adic Dynamical Systems and Cryptography – p. 51/65
p-Adic Dynamical Systems and Cryptography – p. 51/65
p-Adic Dynamical Systems and Cryptography – p. 51/65
p-Adic Dynamical Systems and Cryptography – p. 51/65
Let γj(F, z) ∈ N0 be such a number that its base-2 expansion agrees with the first half of the period of the jth coordinate sequence produced by the T-function F with a single cycle property starting with the initial state z; that is, γj(F, z) = δj(F (0)(z)) + 2δj(F (1)(z)) + ∙ ∙ ∙ + 22j−1δj(F (2j−1)(z)). Obviously, 0 ≤ γj(F, z) ≤ 22j − 1. Theorem (Anashin, 2004) Let Γ = {γj ∈ N0 : j = 0, 1, 2, . . .} be an arbitrary sequence of non-negative rational integers such that 0 ≤ γj ≤ 22j − 1 for j = 0, 1, 2, . . .. There exists a compatible and ergodic mapping F : Z2 → Z2 and a 2-adic integer z ∈ Z2 such that γj ≡ γj(F, z) (mod 22j) (j = 0, 1, 2, . . .)
p-Adic Dynamical Systems and Cryptography – p. 52/65
Theorem (Anashin, 2004) Let Γ = {γj ∈ N0 : j = 0, 1, 2, . . .} be an arbitrary sequence of non-negative rational integers such that 0 ≤ γj ≤ 22j − 1 for j = 0, 1, 2, . . .. There exists a compatible and ergodic mapping F : Z2 → Z2 and a 2-adic integer z ∈ Z2 such that γj ≡ γj(F, z) (mod 22j) (j = 0, 1, 2, . . .) Note: A proof of this theorem also uses p-adic techniques. Note: A similar theorem holds for coordinate sequences of state sequences of counter-dependent PRNG of a maximum period length.
p-Adic Dynamical Systems and Cryptography – p. 52/65
p-Adic Dynamical Systems and Cryptography – p. 53/65
p-Adic Dynamical Systems and Cryptography – p. 53/65
p-Adic Dynamical Systems and Cryptography – p. 53/65
YES! This is how the solution looks schematically:
xi+1 = fi(xi) π permutes bits so that δ0(π(xi)) = δn−1(xi); i.e., π sends the most significant bit of xi to the least significant bit position! state update yi = Gi(π(xi))
p-Adic Dynamical Systems and Cryptography – p. 53/65
And this is how all this sounds mathematically: Proposition 1. (Anashin, 2004) Let Gi : Z2 → Z2 (i = 0, 1, 2, . . . , m − 1) be compatible and ergodic mappings (=T-functions with a single cycle property). For x ∈ {0, 1, . . . , 2n − 1} let Hi(x) = (Gi(π(x))) mod 2n, where π is a permutation of bits of x ∈ Z/2n such that δ0(π(x)) = δn−1(x). Consider a sequence H = {Hi(xi)}, where {xi} is the state update sequence of our counter-dependent PRNG (see e.g. the example circuit).Then the shortest period of the jth coordinate sequence Hj = δj(H) (j = 0, 1, 2, . . . , n − 1) is of length 2nkj for a suitable 1 ≤ kj ≤ m. Moreover, linear complexity of the sequence Hj exceeds 2n−1, λ2(Hj) > 2n−1.
p-Adic Dynamical Systems and Cryptography – p. 53/65
p-Adic Dynamical Systems and Cryptography – p. 54/65
p-Adic Dynamical Systems and Cryptography – p. 55/65
F
p-Adic Dynamical Systems and Cryptography – p. 55/65
p-Adic Dynamical Systems and Cryptography – p. 56/65
p-Adic Dynamical Systems and Cryptography – p. 56/65
F
p-Adic Dynamical Systems and Cryptography – p. 57/65
p-Adic Dynamical Systems and Cryptography – p. 57/65
F
p-Adic Dynamical Systems and Cryptography – p. 58/65
p-Adic Dynamical Systems and Cryptography – p. 59/65
p-Adic Dynamical Systems and Cryptography – p. 59/65
p-Adic Dynamical Systems and Cryptography – p. 59/65
p-Adic Dynamical Systems and Cryptography – p. 60/65
p-Adic Dynamical Systems and Cryptography – p. 60/65
x = (χ0, χ1, χ2, . . .)
F
→ (ψ0(χ0); ψ1(χ0, χ1); ψ2(χ0, χ1, χ2); . . .),
χ0 χm χ2m . . .
f0
→ ψ0(x) ψm(x) ψ2m(x) . . . χ1 χm+1 χ2m+1 . . .
f1
→ ψ1(x) ψm+1(x) ψ2m+1(x) . . . . . . . . . . . . . . . χm−1 χ2m−1 χ3m−1 . . .
fm−1
→ ψm−1(x) ψ2m−1(x) ψ3m−1(x) . . .
− → x j = (χj, χm+j, χ2m+j, . . .), (j = 0, 1, . . . , m − 1)
p-Adic Dynamical Systems and Cryptography – p. 61/65
δj(F(x)) ≡ δj(x) +
j−1
δs(x) (mod 2)
fk(− → x 0, . . . , − → x m−1) = − → x k⊕ k−1
− → x s
m−1
((− → x r+1)⊕− → x r)
− → x k ⊕ k−1
− → x s
m−1
− → x r
m−1
− → x r
Proposition 2. (Anashin, 2004) Let t, j ∈ {0, 1, . . . , m − 1}, let all f (t)
j
(resp., g(t)
j ) be univariate transitive (resp, bijective) modulo 2n
T-functions. Then the mapping F(x) = (f0(x), . . . , fm−1(x)) f0(x) = − → x 0 ⊞ m−1
(f (r)
0 (−
→ x r) ⊕ − → x r)
f1(x) = − → x 1 ⊞
1 (−
→ x 0) ∧ m−1
(f (r)
1 (−
→ x r) ⊕ − → x r)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . fm−1(x) = − → x m−1 ⊞ m−2
g(t)
m−1(−
→ x t)
m−1
(f (r)
m−1(−
→ x r) ⊕ − → x r)
where x = (− → x 0, . . . , − → x m−1), ⊞ ∈ {+, ⊕}, has a single cycle pr-ty.
p-Adic Dynamical Systems and Cryptography – p. 62/65
p-Adic Dynamical Systems and Cryptography – p. 63/65
p → Zn p be compatible, ergodic, and
p-Adic Dynamical Systems and Cryptography – p. 63/65
Note: Compare to differentiability, the differentiability modulo pk is a weaker restriction. In fact, F(u + h) − F(u) h ≈ F ′
k(u)
≈ with arbitrarily high precision ⇒ differentiability ≈ with precision not worse than p−k ⇒ differentiability mod pk
p-Adic Dynamical Systems and Cryptography – p. 63/65
p-Adic Dynamical Systems and Cryptography – p. 63/65
p-Adic Dynamical Systems and Cryptography – p. 63/65
p-Adic Dynamical Systems and Cryptography – p. 63/65
p-Adic Dynamical Systems and Cryptography – p. 64/65
j with
p-Adic Dynamical Systems and Cryptography – p. 64/65
p-Adic Dynamical Systems and Cryptography – p. 64/65
p-Adic Dynamical Systems and Cryptography – p. 64/65
z 2n+1⌋ mod 2k (a truncation
p-Adic Dynamical Systems and Cryptography – p. 64/65
2n) has to solve a
p-Adic Dynamical Systems and Cryptography – p. 64/65
p-Adic Dynamical Systems and Cryptography – p. 64/65
p-Adic Dynamical Systems and Cryptography – p. 65/65
p-Adic Dynamical Systems and Cryptography – p. 65/65
p-Adic Dynamical Systems and Cryptography – p. 65/65