APPLICATION OF MATRIX REPRESENTATIONS IN CRYPTOGRAPHIC ALGORITHMS

Authors

  • Elmurod Jorayev Military Academic Lyceum "Young Border Guards"

Keywords:

vector space, linear mappings, matrix mappings, MDS matrices, finite fields, modern ciphers

Abstract

Matrix reflections are one of the main mechanisms of modern cryptographic algorithms. They play an important role in increasing the diffusion strength, creating protection against linearity, forming complex structures in lattice-based public-key schemes, and mathematically representing the evolution of the internal state in stream ciphers. This article provides an in-depth analysis of the theoretical foundations of matrix reflections, their role in block and stream ciphers, the construction of MDS matrices, as well as the cryptographic significance of basis matrices in lattice cryptosystems.

Author Biography

Elmurod Jorayev, Military Academic Lyceum "Young Border Guards"

Head of the Department of the Military Academic Lyceum "Young Border Guards"

References

L. Hill, “Cryptography in an Algebraic Context,” American Mathematical Monthly, 1929.

S. Lin and D. J. Costello, Error Control Coding, Prentice Hall, 2004.

J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, Springer, 2002.

National Institute of Standards and Technology (NIST), “FIPS-197: Advanced Encryption Standard (AES),” 2001.

T. Berger et al., “Dyadic MDS Matrices,” IEEE Trans. Inf. Theory, 2005.

S. Duval et al., “Lightweight MDS Matrices,” IACR Cryptology ePrint Archive, 2016.

B. Preneel et al., “Wide Trail Strategy and MDS Structures in Block Ciphers,” FSE, 1997.

J. Massey, “Shift-Register Synthesis and BCH Decoding,” IEEE Trans. Inf. Theory, 1969.

O. Regev, “On Lattices, Learning with Errors, and Cryptography,” STOC, 2005.

D. Micciancio and S. Goldwasser, Complexity of Lattice Problems, Springer, 2002.

N. Howgrave-Graham, “Lattice-Related Cryptanalysis,” IACR School, 2007.

Published

2025-12-18

How to Cite

Jorayev, E. (2025). APPLICATION OF MATRIX REPRESENTATIONS IN CRYPTOGRAPHIC ALGORITHMS. The Descendants of Al-Fargani, 1(4), 102–106. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/955

Issue

Section

Статьи

Categories