International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography

Authors:
Jacques Patarin
Download:
URL: http://eprint.iacr.org/2010/287
Search ePrint
Search Google
Abstract: \begin{abstract} In this paper we will first study two closely related problems:\\ 1. The problem of distinguishing $f(x\Vert 0)\oplus f(x \Vert 1)$ where $f$ is a random permutation on $n$ bits. This problem was first studied by Bellare and Implagliazzo in~\cite{BI}.\\ 2. The so-called ``Theorem $P_i \oplus P_j$'' of Patarin (cf~\cite{P05}). Then, we will see many variants and generalizations of this ``Theorem $P_i \oplus P_j$'' useful in Cryptography. In fact all these results can be seen as part of the theory that analyzes the number of solutions of systems of linear equalities and linear non equalities in finite groups. We have nicknamed these analysis ``Mirror Theory'' due to the multiples induction properties that we have in it. \end{abstract}
BibTeX
@misc{eprint-2010-23188,
  title={Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / Xor of random permutations, Systems of linear Equalities and Linear non Equalities in finite groups, Security proofs beyond the Birthday Bound},
  url={http://eprint.iacr.org/2010/287},
  note={ valerie.nachef@u-cergy.fr 14743 received 14 May 2010, last revised 14 May 2010},
  author={Jacques Patarin},
  year=2010
}