Heuristic Search for Nonlinear Substitutions for Cryptographic Applications

被引:1
作者
Kuznetsov O. [1 ,2 ]
Frontoni E. [1 ,3 ]
Kandiy S. [1 ]
Smirnov O. [4 ]
Ulianovska Y. [5 ]
Kobylianska O. [2 ]
机构
[1] Department of Political Sciences, Communication and International Relations, University of Macerata, Via Crescimbeni, 30/32, Macerata
[2] Department of Information and Communication Systems Security, Faculty of Comupter Science, V. N. Karazin Kharkiv National University, 4 Svobody Sq, Kharkiv
[3] Department of Information Engineering, Marche Polytechnic University, Via Brecce Bianche 12, Ancona
[4] Cybersecurity & Software Academic Department, Central Ukrainian National Technical University, 8, University Avenue, Kropyvnytskyi
[5] Department of Computer Science and Software Engineering, University of Customs and Finance, Vernadskogo Street, 2/4, Dnipro
来源
Lecture Notes on Data Engineering and Communications Technologies | 2023年 / 180卷
基金
欧盟地平线“2020”;
关键词
Cost Function; Heuristic Search; Hill Climbing Algorithm; Nonlinear Substitutions; S-boxes Generation;
D O I
10.1007/978-3-031-36115-9_27
中图分类号
学科分类号
摘要
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration of possible variants. The algorithm selects, at each iteration, an alternative with the best value for the heuristics. In this paper, we investigate the complex computational problem of finding highly nonlinear substitutions (S-boxes) in the space of 8-bit permutations. The generation of S-boxes is an important field of research, since nonlinear substitutions are widely used in various cryptographic applications. For instance, S-boxes in symmetric ciphers are responsible for cryptographic strength to linear, differential, algebraic, and other types of cryptanalysis. We propose new heuristics in the form of a cost function, calculated with the Walsh-Hadamard transform. We use the Hill Climbing Algorithm to find highly nonlinear substitutions. Our experiments demonstrate that the new heuristics give good results – it takes about 80,000 iterations of the algorithm to generate 8-bit S-boxes with a nonlinearity of 104. For the optimized parameters, the number of iterations of the algorithm is comparable to the best known results, which confirms the significance and value of the research. © The Author(s).
引用
收藏
页码:288 / 298
页数:10
相关论文
共 44 条
[31]  
Ivanov G., Nikolov N., Nikova S., Cryptographically strong s-boxes generated by modified immune algorithm, Balkancryptsec 2015. LNCS, Vol. 9540, pp. 31-42, (2016)
[32]  
Picek S., Cupic M., Rotim L., A new cost function for evolution of s-boxes, Evol. Comput., 24, pp. 695-718, (2016)
[33]  
Freyre Echevarria A., Martinez Diaz I., A New Cost Function to Improve Nonlinearity of Bijective S-Boxes, (2020)
[34]  
Kuznetsov A., Et al., WHS cost function for generating S-boxes, 2021 IEEE 8Th International Conference on Problems of Infocommunications, Science and Technology (PIC S T), pp. 434-438, (2021)
[35]  
Kuznetsov A., Et al., Optimizing the local search algorithm for generating s-boxes, 2021 IEEE 8Th International Conference on Problems of Infocommunications, Science and Technology (PIC S T), pp. 458-464, (2021)
[36]  
Kuznetsov A., Wieclaw L., Poluyanenko N., Hamera L., Kandiy S., Lohachova Y., Optimization of a simulated annealing algorithm for s-boxes generating, Sensors, 22, (2022)
[37]  
Carlet C., Vectorial Boolean functions for cryptography, Boolean Models and Methods in Mathematics, Computer Science, and Engineering, (2006)
[38]  
Sachkov V.N., Vatutin V.A., Probabilistic Methods in Combinatorial Analysis, (1997)
[39]  
Sachkov V.N., Kolchin V., Combinatorial Methods in Discrete Mathematics, (1996)
[40]  
Beletsky A., Generalized galois-fibonacci matrix generators pseudo-random sequences, IJCNIS, 13, pp. 57-69, (2021)