The Lablans Conjecture: Enumeration of Structural Field Implementations over Finite Sets

Peter Lablans
LabCyfer

; Updated

Abstract

This paper introduces the Lablans Conjecture, which posits that for a finite field \(\mathrm{GF}(n)\), there exist exactly \(n!\) structurally distinct implementations of the field over a fixed set of \(n\) elements, for \(n\) being prime. Such finite fields are commonly called base fields, of which it is assumed there exists only one. This assumption is proven to be incorrect. More than one version of a base field may be constructed. These implementations differ in their concrete operation tables (addition and multiplication), as determined by permutations of element labels and the associated placement of identity elements. Although all such implementations are algebraically isomorphic, they are not structurally identical when viewed as explicit binary operation tables over a fixed base set. This distinction has implications for practical fields such as cryptographic design, hardware representation, and machine learning.

1. Introduction

In classical field theory, all finite fields of the same order are treated as isomorphic. This abstraction ignores the concrete representation of field operations over specific element sets. However, in practical applications such as cryptography and hardware implementation, fields are often realized over a fixed set of symbols \(S = \{0, 1, \dots, n-1\}\) with explicit binary operation tables.

This investigation was greatly aided by the abstract-first approach of Adamson [1], who emphasized the use of two general laws of composition rather than predefined notions of addition and multiplication. This allowed for a structural, rather than symbolic, understanding of field implementation — a perspective particularly suited for computational design.

This paper considers the question: how many distinct structural implementations of \(\mathrm{GF}(n)\) exist over such a fixed set? Here, structurally distinct means the operation tables (addition and multiplication) differ under the fixed labeling of \(S\). Each such implementation satisfies the field axioms and is isomorphic to \(\mathrm{GF}(n)\), but differs in the specific layout and mapping of the operations.

2. The Lablans Conjecture

Conjecture 1 (Lablans). Let \(S = \{s_0, s_1, \dots, s_{n-1}\}\) be a fixed set of \(n\) elements. Then the number of structurally distinct binary operation table pairs \((+, \cdot)\) on \(S\) that satisfy the field axioms and define a field isomorphic to \(\mathrm{GF}(n)\) is exactly \(n!\).

These \(n!\) implementations arise from all possible permutations of the field elements in \(S\). Each permutation results in a different placement of the additive and multiplicative identities and yields unique operation tables, even though all implementations remain algebraically isomorphic.

Importantly, two implementations are considered distinct if their addition or multiplication tables differ when elements are fixed and not relabeled. Thus, structural distinction refers to the explicit realization of the field under a fixed label assignment. The count arises from the action of the symmetric group \(S_n\) on the set of labels, preserving algebraic structure while modifying operational tables.

Remark. The Lablans Conjecture is currently supported by empirical enumeration and computational verification for small values of \(n\), with suggestive patterns observed up to moderate values. However, a general proof remains open, and the conjecture is at present inductively motivated.

3. Definitions

A structural implementation of \(\mathrm{GF}(n)\) over a set \(S\) is a pair of binary operations \(+ : S \times S \to S\) and \(\cdot : S \times S \to S\) such that:

  1. \((S, +)\) is an abelian group with identity \(e_+\).

  2. \((S \setminus \{e_+\}, \cdot)\) is an abelian group with identity \(e_\cdot\).

  3. Multiplication distributes over addition.

4. Preliminaries

4.1. Finite Fields and Their Representations

Finite fields, commonly denoted as \(\mathrm{GF}(p^m)\) for prime \(p\) and integer \(m \geq 1\), serve as the algebraic foundation for many cryptographic algorithms. The case \(m=1\) corresponds to the so-called base fields \(\mathrm{GF}(p)\), which are often treated as unique up to isomorphism.

4.1.1. Computational and Conceptual Distinctions

A computational transformation, called The Finite Lab-Transform (FLT) [2], is designed to operate over finite fields without computational distinction between base fields \(\mathrm{GF}(p)\) and their extension fields \(\mathrm{GF}(p^m)\). Numerically, the FLT applies transformations uniformly over the field arithmetic defined on the field elements, regardless of whether the field is a base or an extension field. Differences in numerical results stem primarily from the algebraic structure and representation of extension fields rather than from the FLT method itself.

Conceptually, however, the conventional notion of a base field as a unique canonical structure merits re-examination. There exist multiple structurally distinct implementations of finite fields with the same cardinality \(p\), differing in their operation tables and internal algebraic structures beyond mere isomorphism. This observation suggests that the term base field may be less definitive than traditionally assumed.

Understanding this nuance is critical both for the theoretical framework of field algebra and for practical cryptographic applications. While the FLT treats base and extension fields uniformly in computation, this article aims to alert readers to the potential variability in base field structures, which may have subtle but important implications.

Two such implementations are structurally distinct if their operation tables differ under the fixed labeling of \(S\).

5. The Intuition

The \(n\)-state functions can be represented as \(n \times n\) tables, where each entry corresponds to an output in the set \(\{0, 1, \dots, n-1\}\). These tables define the laws of composition (i.e., binary operations) for finite fields. At first glance, it might seem that applying a simple substitution or relabeling to a known operation table could produce a new valid field. However, this naive approach fails to preserve the structural requirements dictated by the field axioms.

A more structured analysis begins with the simplest case, \(n = 2\). Besides the classical addition table of \(\mathrm{GF}(2)\), there exists another 2-state, self-reversing binary function: the EQUAL function, \[\begin{bmatrix} 1 & 0 \\ 0 & 1 \end{bmatrix},\] which satisfies all the requirements of a field under addition. A compatible multiplication operation must also be found to complete the field. Since there are only \(16\) binary 2-operand functions in the \(n=2\) case, brute-force enumeration is feasible. It turns out the corresponding multiplication table is: \[\begin{bmatrix} 0 & 1 \\ 1 & 1 \end{bmatrix}.\] This pair also defines a valid field isomorphic to \(\mathrm{GF}(2)\), but is structurally distinct under fixed labeling.

The case \(n = 3\) was likewise accessible. Among the \(19,683\) possible binary functions on a 3-element set, brute-force checking confirmed the existence of exactly six structurally distinct field implementations — corresponding to \(3! = 6\).

This empirical pattern for \(n = 2\) and \(n = 3\) inspired the conjecture that there exist \(n!\) such implementations for any \(n\), hence the name Lablans Conjecture.

6. Examples for Small Fields

Case \(n = 2\)

For \(\mathrm{GF}(2)\) with \(S = \{0,1\}\), there are \(2! = 2\) structurally distinct implementations. Each corresponds to a different permutation of \(\{0,1\}\), which leads to a unique assignment of additive and multiplicative identities.

Case \(n = 3\)

For \(\mathrm{GF}(3)\) with \(S = \{0,1,2\}\), there are \(3! = 6\) structurally distinct implementations. Each of the six permutations of the set elements gives rise to a different configuration of the operation tables.

7. Implications and Applications

8. Other Work Already Done

The initial hunch behind the Lablans Conjecture arose from empirical enumeration for \(n=2\) and \(n=3\), where the number of structurally distinct field implementations matched \(n!\). For \(n \geq 4\), exhaustive computation proved impractical using brute force, despite pruning the function space through constraints such as commutativity and associativity.

To further the investigation, the notion of alternate fields \(\mathrm{aGF}(n)\) was introduced. These are valid implementations of field structures that differ from the canonical form when realized over a fixed label set. Examples were found for \(n = 4\), \(5\), and \(8\), confirming the presence of multiple structurally distinct implementations at each size. For instance, at least \(120\) such structures were constructed for \(n=5\), and more than \(600\) distinct addition tables were generated for \(n=8\) — still far fewer than \(8! = 40,320\).

A unique computational method to generate different "laws of composition" in a field \(\mathrm{GF}(n)\) was developed as the Finite Lab-Transform, or FLT [2]. A shortfall found in composite fields was not due to the nonexistence of variants but rather due to how the computational method of the Finite Lab-Transform (FLT) operates on extension fields. In such cases, FLT may project different seeds onto structurally identical outputs. Thus, while the number of unique involutive additions may fall short of \(n!\), it still grows factorially — roughly as \((n-2)!\) or at worst \((n-3)!\) — making the Lablans Conjecture essentially valid for cryptographic and mathematical purposes.

For \(n = 256\), the practical distinction between \(n!\) and \((n-3)!\) becomes irrelevant, as both values exceed \(10^{500}\).

9. Mathematical Framework for Structural Enumeration in Binary Extension Fields

To quantify the number of structurally distinct field implementations over a fixed set S = {0,1,...,n−1}, we begin with the total number of permutations of the set, which is n!. Each permutation potentially yields a different placement of identity elements and a different operation table. However, many permutations result in structurally equivalent implementations due to underlying symmetries in the field's additive group.

For fields of the form GF(2p), the additive structure forms a vector space over GF(2) of dimension p. The group of invertible linear transformations over this space is denoted GL(p,2), and its size is given by:

\[ |\mathrm{GL}(p,2)| = \prod_{i=0}^{p-1} (2^p - 2^i) \]

This group acts on the set of nonzero field elements (excluding the additive identity 0) and preserves the group structure. Therefore, the number of structurally distinct additions over GF(2p) is bounded above by:

\[ \frac{(2^p)!}{|\mathrm{GL}(p,2)|} \]

For example, in the case of GF(256) where p = 8, we compute:

\[ |\mathrm{GL}(8,2)| = (256 - 1)(256 - 2)(256 - 4)(256 - 8)(256 - 16)(256 - 32)(256 - 64)(256 - 128) \]

\[ = 255 \cdot 254 \cdot 252 \cdot 248 \cdot 240 \cdot 224 \cdot 192 \cdot 128 \approx 5.35 \times 10^{18} \]

Thus, the number of distinct additions over GF(256) is approximately:

\[ \frac{256!}{|\mathrm{GL}(8,2)|} \approx \frac{2.09 \times 10^{507}}{5.35 \times 10^{18}} \approx 3.9 \times 10^{488} \]

This provides a rigorous upper bound on the number of structurally distinct additions over GF(256), assuming equivalence under invertible linear relabelings.


10. Empirical Lower Bound in Binary Extension Fields via Inverter Analysis

Complementing the group-theoretic upper bound, an empirical approach based on reversible inverter mappings offers a conservative estimate of structural diversity. In this framework, each field element is processed through a reversible n-state inverter, and the operation tables are constructed using the Finite Lab-Transform (FLT):

\[ y = \text{rinv}_n(\text{inv}_n(a) \circ \text{inv}_n(b)) \]

Here, invn is a bijective inverter function, rinvn its reverse, and denotes the original field operation (e.g., addition). The FLT preserves group axioms while altering the concrete structure of the operation tables.

For GF(256), empirical analysis reveals that the number of structurally identical additions under inverter-based equivalence is approximately:

\[ (2^p - 1) \cdot \left(\frac{2^p}{2}\right)! = 255 \cdot 128! \approx 6.05 \times 10^{218} \]

This yields a lower bound on distinct additions:

\[ \frac{256!}{255 \cdot 128!} \approx 3.4 \times 10^{288} \]

Although this is significantly below the group-theoretic upper bound, it still represents a design space of staggering size—far beyond the reach of exhaustive search or structural modeling. The discrepancy between the bounds reflects the difference in symmetry assumptions: the group-theoretic model collapses labelings under linear transformations, while the inverter model enforces stricter structural constraints.

In particular, the empirical lower bound does not account for the full range of symmetries inherent in the additive structure of GF(2p), which behaves as a vector space over GF(2). Each field element corresponds to a p-bit word, and operations over these words are governed by linear transformations that preserve vector addition. These transformations form the group GL(p,2), whose size grows super-exponentially with p. By ignoring this structure, the inverter-based estimate underrepresents the true number of structurally distinct additions, effectively collapsing many valid implementations into the same equivalence class.

Therefore, while the empirical bound provides a conservative baseline, the group-theoretic analysis reveals that the actual diversity of field implementations is far greater. The discrepancy between the two is not a sign of cryptographic weakness, but rather a reflection of the rich algebraic geometry underlying finite field structures. Even the lower bound—on the order of 10288 for GF(256)—remains well beyond the reach of any known or foreseeable attack strategy.

11. Future Work and Open Problems

Several directions remain open for rigorous investigation:

12. Conclusion

This paper proposes the Lablans Conjecture, asserting the existence of exactly \(n!\) structurally distinct implementations of \(\mathrm{GF}(n)\) over a fixed base set of n elements and n being prime. Empirical data for small \(n\) supports this claim, and partial constructions suggest the factorial growth persists for larger \(n\). This distinction between isomorphism classes and concrete structural implementations provides a new perspective on finite fields, with significant implications for computational mathematics and cryptography.

An important result was estimating reasonable lower bounds on the number of distinct addition operations over binary extension fields \(\mathrm{GF}(2^k)\) under the Finite Lab Transform (FLT). These bounds suggest that the FLT introduces a fundamentally new solution space for encryption transforms—one where brute-force attacks become not merely impractical, but categorically infeasible.

Usage and Patent Notice

The Finite Lab-Transform (FLT) and other concepts discussed in this article are protected under issued USA patents. While this material may be freely used for educational, review, research, and testing purposes, any operational use—including commercial applications—requires compliance with the relevant patent protections. No license for operational use is provided by this publication. For further inquiries regarding licensing and implementation, please contact the author.

Acknowledgments

Adamson [1] provides foundational work on laws of composition, for separating these laws from the narrow concepts of addition and multiplication.

References

[1] A. Adamson, Introduction to Field Theory, Cambridge University Press, 1964.

[2] Peter Lablans, “Website: Finite Lab-Transform (FLT)" Lab Transform, 2022.