Heuristic methods of gradient search for the cryptographic boolean functions

被引:0
|
作者
Kuznetsov A.A. [1 ]
Moskovchenko I.V. [2 ]
Prokopovych-Tkachenko D.I. [3 ]
Kuznetsova T.Y. [3 ]
机构
[1] V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv
[2] University of Customs and Finance, 2/4Volodymyra Vernadskoho St., Dnipro
[3] I. Kozhedub Kharkiv National Air Force University, 77/79 Sumska St., Kharkiv
来源
Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika) | 2019年 / 78卷 / 10期
关键词
Cryptographic Boolean functions; Heuristic methods; Nonlinear substitute blocks; Symmetric cryptography;
D O I
10.1615/TelecomRadEng.v78.i10.40
中图分类号
学科分类号
摘要
Heuristic methods of gradient search of the cryptographic Boolean functions that satisfy the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. The proposed method of gradient descent is investigated, in particular, estimates of nonlinearity and correlation immunity of the synthesized Boolean functions are given. A method for evaluating the computational efficiency of gradient search methods is proposed, based on the construction of sample (empirical) distribution functions, which characterize the probability of the formation of the Boolean functions with persistence indicators not lower than those required. As an indicator of computational efficiency, we propose the average number of attempts that need to be performed using the heuristic method to form a cryptographic Boolean function with the required properties. It is shown that the proposed gradient descent method allows the formation of cryptographic functions with the required durability indicators in fewer steps. The results of investigations of the cryptographic properties of the formed Boolean functions in comparison with the best known assessments are given. © 2019 Begell House Inc.. All rights reserved.
引用
收藏
页码:879 / 899
页数:20
相关论文
共 50 条
  • [1] Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions
    Moskovchenko, Illarion
    Pastukhov, Mykola
    Kuznetsov, Alexandr
    Kuznetsova, Tetiana
    Prokopenko, Valeriia
    Kropyvnytskyi, Vitaliy
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 503 - 508
  • [2] Comparison of Genetic Programming Methods on Design of Cryptographic Boolean Functions
    Husa, Jakub
    GENETIC PROGRAMMING, EUROGP 2019, 2019, 11451 : 228 - 244
  • [3] A construction of Boolean functions with good cryptographic properties
    Chung, Jong H.
    Stanica, Pantelimon
    Tan, Chik-How
    Wang, Qichun
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (04) : 700 - 711
  • [4] Exact and heuristic methods for solving Boolean games
    De Clercq, Sofie
    Bauters, Kim
    Schockaert, Steven
    Mihaylov, Mihail
    Nowe, Ann
    De Cock, Martine
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2017, 31 (01) : 66 - 106
  • [5] Exact and heuristic methods for solving Boolean games
    Sofie De Clercq
    Kim Bauters
    Steven Schockaert
    Mihail Mihaylov
    Ann Nowé
    Martine De Cock
    Autonomous Agents and Multi-Agent Systems, 2017, 31 : 66 - 106
  • [6] Heuristic evaluation functions in artificial intelligence search algorithms
    Korf, Richard E.
    Minds and Machines, 1995, 5 (04): : 489 - 498
  • [7] Heuristic search of (semi-)bent functions based on cellular automata
    Mariot, Luca
    Saletta, Martina
    Leporati, Alberto
    Manzoni, Luca
    NATURAL COMPUTING, 2022, 21 (03) : 377 - 391
  • [8] Heuristic search of (semi-)bent functions based on cellular automata
    Luca Mariot
    Martina Saletta
    Alberto Leporati
    Luca Manzoni
    Natural Computing, 2022, 21 : 377 - 391
  • [9] Bad Directions in Cryptographic Hash Functions
    Bernstein, Daniel J.
    Huelsing, Andreas
    Lange, Tanja
    Niederhagen, Ruben
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 488 - 508
  • [10] Haar Spectrum of Bent Boolean Functions
    Rafiq, H. M.
    Siddiqi, M. U.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2016, 10 : 409 - 421