Eqn: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>Magioladitis
m →‎External links: clean up using AWB (9689)
Line 1: Line 1:
The '''pseudo-Hadamard transform''' is a reversible transformation of a bit string that provides [[diffusion (cryptography)|cryptographic diffusion]]. See [[Hadamard transform]].
The name of the author is Figures. To collect cash is what her family and her appreciate. North Dakota is her birth place but she will have to transfer one working day or another. For many years I've been working as a payroll clerk.<br><br>Visit my blog; [http://www.pornteub.com/blog/32607 http://www.pornteub.com/blog/32607]
 
The bit string must be of even length, so it can be split into two bit strings ''a'' and ''b'' of equal lengths, each of ''n'' bits. To compute the transform, ''a''<nowiki>'</nowiki> and ''b''<nowiki>'</nowiki>, from these we use the equations:
 
:<math>a' = a + b \, \pmod{2^n}\,</math>
 
:<math>b' = a + 2b\, \pmod{2^n}\,</math>
 
To reverse this, clearly:
 
:<math>b = b' - a' \, \pmod{2^n}</math>
 
:<math>a = 2a' - b' \, \pmod{2^n}</math>
 
==Generalisation==
 
The above equations can be expressed in [[Matrix (mathematics)|matrix algebra]], by considering ''a'' and ''b'' as two elements of a vector, and the transform itself as multiplication by a matrix of the form:
 
:<math>H_1 = \begin{bmatrix} 2 & 1 \\ 1 & 1 \end{bmatrix}</math>
 
The inverse can then be derived by [[Invertible matrix|inverting]] the matrix.
 
However, the matrix can be generalised to higher dimensions, allowing vectors of any power-of-two size to be transformed, using the following recursive rule:
 
:<math>H_n = \begin{bmatrix} 2 \times H_{n-1} & H_{n-1} \\ H_{n-1} & H_{n-1} \end{bmatrix}</math>
 
For example:
 
:<math>H_2 = \begin{bmatrix} 4 & 2 & 2 & 1 \\  2 & 2 & 1 & 1 \\ 2 & 1 & 2 & 1 \\ 1 & 1 & 1 & 1 \end{bmatrix}</math>
 
==See also==
* [[SAFER]]
* [[Twofish]]
 
==References==
* James Massey, "On the Optimality of SAFER+ Diffusion", 2nd AES Conference, 1999. [http://csrc.nist.gov/archive/aes/round1/conf2/papers/massey.pdf]
* Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, "[[Twofish]]: A 128-Bit [[Block cipher|Block Cipher]]", 1998. [http://www.schneier.com/paper-twofish-paper.html]
* Helger Lipmaa. On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. [[INDOCRYPT]] 2002, LNCS 2551, pp 48-61, 2002.[http://research.cyber.ee/~lipmaa/papers/lip02c/]
 
{{crypto-stub}}
 
==External links==
 
* [http://eprint.iacr.org/2004/010.pdf Fast Pseudo-Hadamard Transforms]
 
[[Category:Theory of cryptography]]
[[Category:Transforms]]

Revision as of 10:39, 23 February 2014

The name of the author is Figures. To collect cash is what her family and her appreciate. North Dakota is her birth place but she will have to transfer one working day or another. For many years I've been working as a payroll clerk.

Visit my blog; http://www.pornteub.com/blog/32607