T-function

VEST-4 T-function followed by a transposition layer

In cryptography, a T-function is a bijective mapping that updates every bit of the state in a way that can be described as ${\displaystyle x_{i}'=x_{i}+f(x_{0},\cdots ,x_{i-1})}$, or in simple words an update function in which each bit of the state is updated by a linear combination of the same bit and a function of a subset of its less significant bits. If every single less significant bit is included in the update of every bit in the state, such a T-function is called triangular. Thanks to their bijectivity (no collisions, therefore no entropy loss) regardless of the used Boolean functions and regardless of the selection of inputs (as long as they all come from one side of the output bit), T-functions are now widely used in cryptography to construct block ciphers, stream ciphers, PRNGs and hash functions. T-functions were first proposed in 2002 by A. Klimov and A. Shamir in their paper "A New Class of Invertible Mappings". Ciphers such as TSC-1, TSC-3, TSC-4, ABC, Mir-1 and VEST are built with different types of T-functions.

Because arithmetic operations such as addition, subtraction and multiplication are also T-functions (triangular T-functions), software-efficient word-based T-functions can be constructed by combining bitwise logic with arithmetic operations. Another important property of T-functions based on arithmetic operations is predictability of their period, which is highly attractive to cryptographers. Although triangular T-functions are naturally vulnerable to guess-and-determine attacks, well chosen bitwise transpositions between rounds can neutralize that imbalance. In software-efficient ciphers, it can be done by interleaving arithmetic operations with byte-swapping operations and to a small degree with bitwise rotation operations. However, triangular T-functions remain highly inefficient in hardware.

T-functions do not have any restrictions on the types and the widths of the update functions used for each bit. Subsequent transposition of the output bits and iteration of the T-function also do not affect bijectivity. This freedom allows the designer to choose the update functions or S-boxes that satisfy all other cryptographic criteria and even choose arbitrary or key-dependent update functions (see family keying).

Hardware-efficient lightweight T-functions with identical widths of all the update functions for each bit of the state can thus be easily constructed. The core accumulators of VEST ciphers are a good example of such reasonably light-weight T-functions that are balanced out after 2 rounds by the transposition layer making all the 2-round feedback functions of roughly the same width and losing the "T-function" bias of depending only on the less significant bits of the state.

References

• A. Klimov; A. Shamir (2002). "A New Class of Invertible Mappings" .
• A. Klimov; A. Shamir (2003). Cryptographic Applications of T-functions (PDF/PostScript). Selected Areas in Cryptography, SAC 2003, LNCS 3006. Springer-Verlag. pp. 248–261.
• A. Klimov; A. Shamir (2004). New Cryptographic Primitives Based on Multiword T-functions. Fast Software Encryption, FSE 2004, LNCS 3017 (PDF/PostScript)`|format=` requires `|url=` (help). Springer-Verlag. pp. 1–15.
• Magnus Daum (2005). "Narrow T-functions" (PDF/PostScript).
• J. Hong; D. Lee; Y. Yeom & D. Han (2005). A New Class of Single Cycle T-functions. Fast Software Encryption, FSE 2005, LNCS 3557. Springer-Verlag. pp. 68–82.
• A. Klimov & A. Shamir (2005). New Applications of T-functions in Block Ciphers and Hash Functions. Fast Software Encryption, FSE 2005, LNCS 3557. Springer-Verlag. pp. 18–31. Archived from the original (gzipped PostScript) on 2007-09-26.