<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.formulasearchengine.com/index.php?action=history&amp;feed=atom&amp;title=Dupuit_assumption</id>
	<title>Dupuit assumption - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://en.formulasearchengine.com/index.php?action=history&amp;feed=atom&amp;title=Dupuit_assumption"/>
	<link rel="alternate" type="text/html" href="https://en.formulasearchengine.com/index.php?title=Dupuit_assumption&amp;action=history"/>
	<updated>2026-05-05T16:30:29Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.0-wmf.28</generator>
	<entry>
		<id>https://en.formulasearchengine.com/index.php?title=Dupuit_assumption&amp;diff=15906&amp;oldid=prev</id>
		<title>en&gt;Look2See1: Category:Aquifers</title>
		<link rel="alternate" type="text/html" href="https://en.formulasearchengine.com/index.php?title=Dupuit_assumption&amp;diff=15906&amp;oldid=prev"/>
		<updated>2010-09-30T18:40:05Z</updated>

		<summary type="html">&lt;p&gt;Category:Aquifers&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[Image:VEST Core4 LowLevel.png|thumbnail|320px|right|VEST-4 T-function followed by a transposition layer]]&lt;br /&gt;
&lt;br /&gt;
In [[cryptography]], a &amp;#039;&amp;#039;&amp;#039;T-function&amp;#039;&amp;#039;&amp;#039; is a [[bijection|bijective]] mapping that updates every bit of the [[state (computer science)|state]] in a way that can be described as &amp;lt;math&amp;gt;x_i&amp;#039; = x_i + f(x_0, \cdots, x_{i-1})&amp;lt;/math&amp;gt;, or in simple words an update function in which each bit of the state is updated by a linear combination of the same bit and a function of a subset of its less significant bits. If every single less significant bit is included in the update of every bit in the state, such a T-function is called &amp;#039;&amp;#039;&amp;#039;triangular&amp;#039;&amp;#039;&amp;#039;. Thanks to their bijectivity (no collisions, therefore no entropy loss) regardless of the used [[Boolean function]]s and regardless of the selection of inputs (as long as they all come from one side of the output bit), T-functions are now widely used in cryptography to construct [[block cipher]]s, [[stream cipher]]s, [[PRNG]]s and [[cryptographic hash function|hash functions]]. T-functions were first proposed in 2002 by [[Alexander Klimov|A. Klimov]] and [[Adi Shamir|A. Shamir]] in their paper &amp;quot;A New Class of Invertible Mappings&amp;quot;. Ciphers such as [[TSC-1]], [[TSC-3]], [[TSC-4]], [[ABC (stream cipher)|ABC]], [[Mir-1]] and [[VEST]] are built with different types of T-functions.&lt;br /&gt;
&lt;br /&gt;
Because [[arithmetic operation]]s such as [[addition]], [[subtraction]] and [[multiplication]] are also T-functions (triangular T-functions), software-efficient word-based T-functions can be constructed by combining [[bitwise logic]] with arithmetic operations. Another important property of T-functions based on arithmetic operations is predictability of their [[period (mathematics)|period]], which is highly attractive to cryptographers. Although triangular T-functions are naturally vulnerable to guess-and-determine attacks, well chosen bitwise [[transposition (mathematics)|transposition]]s between rounds can neutralize that imbalance. In software-efficient [[cipher]]s, it can be done by interleaving arithmetic operations with byte-swapping operations and to a small degree with [[bitwise rotation]] operations. However, triangular T-functions remain highly inefficient in hardware.&lt;br /&gt;
&lt;br /&gt;
T-functions do not have any restrictions on the types and the widths of the update functions used for each bit. Subsequent transposition of the output bits and [[iteration]] of the T-function also do not affect bijectivity. This freedom allows the designer to choose the update functions or [[S-box]]es that satisfy all other cryptographic criteria and even choose arbitrary or key-dependent update functions (see [[family keying]]).&lt;br /&gt;
&lt;br /&gt;
Hardware-efficient lightweight T-functions with identical widths of all the update functions for each bit of the state can thus be easily constructed. The core accumulators of VEST ciphers are a good example of such reasonably light-weight T-functions that are balanced out after 2 rounds by the transposition layer making all the 2-round feedback functions of roughly the same width and losing the &amp;quot;T-function&amp;quot; bias of depending only on the less significant bits of the state.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* {{cite paper&lt;br /&gt;
    | author = A. Klimov, A. Shamir&lt;br /&gt;
    | title = A New Class of Invertible Mappings&lt;br /&gt;
    | year = 2002&lt;br /&gt;
    | url = http://citeseer.ist.psu.edu/klimov02new.html &lt;br /&gt;
    | format = [[PDF]]/[[PostScript]] }}&lt;br /&gt;
* {{cite conference&lt;br /&gt;
    | author = A. Klimov, A. Shamir&lt;br /&gt;
    | title = Cryptographic Applications of T-functions&lt;br /&gt;
    | booktitle = [[Selected Areas in Cryptography]], SAC 2003, LNCS 3006&lt;br /&gt;
    | pages = 248–261&lt;br /&gt;
    | publisher = [[Springer-Verlag]]&lt;br /&gt;
    | date = 2003    &lt;br /&gt;
    | url = http://citeseer.ist.psu.edu/klimov03cryptographic.html&lt;br /&gt;
    | format = PDF/PostScript }}&lt;br /&gt;
* {{cite conference&lt;br /&gt;
    | author = A. Klimov, A. Shamir&lt;br /&gt;
    | title = New Cryptographic Primitives Based on Multiword T-functions&lt;br /&gt;
    | booktitle = [[Fast Software Encryption]], FSE 2004, LNCS 3017&lt;br /&gt;
    | pages = 1–15&lt;br /&gt;
    | publisher = Springer-Verlag&lt;br /&gt;
    | date = 2004&lt;br /&gt;
    | format = PDF/PostScript }}&lt;br /&gt;
* {{cite paper&lt;br /&gt;
    | author = Magnus Daum&lt;br /&gt;
    | title = Narrow T-functions&lt;br /&gt;
    | year = 2005&lt;br /&gt;
    | url = http://citeseer.ist.psu.edu/daum05narrow.html&lt;br /&gt;
    | format = PDF/PostScript }}&lt;br /&gt;
* {{cite conference&lt;br /&gt;
    | author = J. Hong, D. Lee, Y. Yeom, and D. Han&lt;br /&gt;
    | title = A New Class of Single Cycle T-functions&lt;br /&gt;
    | booktitle = Fast Software Encryption, FSE 2005, LNCS 3557&lt;br /&gt;
    | pages = 68–82&lt;br /&gt;
    | publisher = Springer-Verlag&lt;br /&gt;
    | date = 2005 }}&lt;br /&gt;
* {{cite conference&lt;br /&gt;
    | author = A. Klimov and A. Shamir&lt;br /&gt;
    | title = New Applications of T-functions in Block Ciphers and Hash Functions&lt;br /&gt;
    | booktitle = Fast Software Encryption, FSE 2005, LNCS 3557&lt;br /&gt;
    | pages = 18–31&lt;br /&gt;
    | publisher = Springer-Verlag&lt;br /&gt;
    | date = 2005&lt;br /&gt;
    | url = http://www.wisdom.weizmann.ac.il/~ask/t3.ps.gz&lt;br /&gt;
    | format = [[gzip]]ped PostScript }}&lt;br /&gt;
&lt;br /&gt;
{{Cryptography navbox | block | hash | stream}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Symmetric-key cryptography]]&lt;br /&gt;
[[Category:Cryptographic primitives]]&lt;/div&gt;</summary>
		<author><name>en&gt;Look2See1</name></author>
	</entry>
</feed>