Heuristic Search for Nonlinear Substitutions for Cryptographic Applications

被引:1
作者
Kuznetsov O. [1 ,2 ]
Frontoni E. [1 ,3 ]
Kandiy S. [1 ]
Smirnov O. [4 ]
Ulianovska Y. [5 ]
Kobylianska O. [2 ]
机构
[1] Department of Political Sciences, Communication and International Relations, University of Macerata, Via Crescimbeni, 30/32, Macerata
[2] Department of Information and Communication Systems Security, Faculty of Comupter Science, V. N. Karazin Kharkiv National University, 4 Svobody Sq, Kharkiv
[3] Department of Information Engineering, Marche Polytechnic University, Via Brecce Bianche 12, Ancona
[4] Cybersecurity & Software Academic Department, Central Ukrainian National Technical University, 8, University Avenue, Kropyvnytskyi
[5] Department of Computer Science and Software Engineering, University of Customs and Finance, Vernadskogo Street, 2/4, Dnipro
来源
Lecture Notes on Data Engineering and Communications Technologies | 2023年 / 180卷
基金
欧盟地平线“2020”;
关键词
Cost Function; Heuristic Search; Hill Climbing Algorithm; Nonlinear Substitutions; S-boxes Generation;
D O I
10.1007/978-3-031-36115-9_27
中图分类号
学科分类号
摘要
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration of possible variants. The algorithm selects, at each iteration, an alternative with the best value for the heuristics. In this paper, we investigate the complex computational problem of finding highly nonlinear substitutions (S-boxes) in the space of 8-bit permutations. The generation of S-boxes is an important field of research, since nonlinear substitutions are widely used in various cryptographic applications. For instance, S-boxes in symmetric ciphers are responsible for cryptographic strength to linear, differential, algebraic, and other types of cryptanalysis. We propose new heuristics in the form of a cost function, calculated with the Walsh-Hadamard transform. We use the Hill Climbing Algorithm to find highly nonlinear substitutions. Our experiments demonstrate that the new heuristics give good results – it takes about 80,000 iterations of the algorithm to generate 8-bit S-boxes with a nonlinearity of 104. For the optimized parameters, the number of iterations of the algorithm is comparable to the best known results, which confirms the significance and value of the research. © The Author(s).
引用
收藏
页码:288 / 298
页数:10
相关论文
共 44 条
[1]  
Banzhaf W., Hu T., Evolutionary computation, Evolutionary Biology, (2019)
[2]  
Gilli M., Maringer D., Schumann E., Chapter 13 – Heuristics: A tutorial, Numerical Methods and Optimization in Finance, pp. 319-353, (2019)
[3]  
Gandomi A.H., Yang X.-S., Talatahari S., Alavi A.H., Metaheuristic algorithms in modeling and optimization, Metaheuristic Applications in Structures and Infrastructures, pp. 1-24, (2013)
[4]  
Cataloluk H., Celebi F.V., A heuristic algorithm for Chan-Vese model, 2018 26Th Signal Processing and Communications Applications Conference (SIU)., pp. 1-4, (2018)
[5]  
van der Stockt S.A.G., Engelbrecht A.P., Cleghorn C.W., Heuristic space diversity measures for population-based hyper-heuristics, 2020 IEEE Congress on Evolutionary Computation (CEC), pp. 1-9, (2020)
[6]  
Tunc A., Tasdemir S., Sag T., Comparison of heuristic and metaheuristic algorithms, 2022 7Th International Conference on Computer Science and Engineering (UBMK), pp. 76-81, (2022)
[7]  
Salhi S., Hybridisation search, Heuristic Search, pp. 129-156, (2017)
[8]  
Burnett L.D., Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography, (2005)
[9]  
Alvarez-Cubero J., Vector Boolean Functions: Applications in Symmetric Cryptography, (2015)
[10]  
McLaughlin J., Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components, (2012)