Evolutionary Methods for the Construction of Cryptographic Boolean Functions

被引:23
|
作者
Picek, Stjepan [1 ,3 ]
Jakobovic, Domagoj [1 ]
Miller, Julian F. [2 ]
Marchiori, Elena [3 ]
Batina, Lejla [3 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Zagreb 41000, Croatia
[2] Univ York, Dept Elect, York YO10 5DD, N Yorkshire, England
[3] Radboud Univ Nijmegen, NL-6525 ED Nijmegen, Netherlands
来源
GENETIC PROGRAMMING (EUROGP 2015) | 2015年 / 9025卷
关键词
Boolean functions; Genetic programming; Cartesian Genetic Programming; Cryptographic properties; Comparison;
D O I
10.1007/978-3-319-16501-1_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Boolean functions represent an important primitive when constructing many stream ciphers. Since they are often the only nonlinear element of such ciphers, without them the algorithm would be trivial to break. Therefore, it is not surprising there exist a substantial body of work on the methods of constructing Boolean functions. Among those methods, evolutionary computation (EC) techniques play a significant role. Previous works show it is possible to use EC methods to generate high-quality Boolean functions that even surpass those built by algebraic constructions. However, up to now, there was no work investigating the use of Cartesian Genetic Programming (CGP) for producing Boolean functions suitable for cryptography. In this paper we compare Genetic Programming (GP) and CGP algorithms in order to reach the conclusion which algorithm is better suited to evolve Boolean functions suitable for cryptographic usage. Our experiments show that CGP performs much better than the GP when the goal is obtaining as high as possible nonlinearity. Our results indicate that CGP should be further tested with different fitness objectives in order to check the boundaries of its performance.
引用
收藏
页码:192 / 204
页数:13
相关论文
共 50 条
  • [1] Evolutionary Construction of Perfectly Balanced Boolean Functions
    Mariot, Luca
    Picek, Stjepan
    Jakobovic, Domagoj
    Djurasevic, Marko
    Leporati, Alberto
    2022 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2022,
  • [2] Comparison of Genetic Programming Methods on Design of Cryptographic Boolean Functions
    Husa, Jakub
    GENETIC PROGRAMMING, EUROGP 2019, 2019, 11451 : 228 - 244
  • [3] Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties
    Picek, Stjepan
    Sisejkovic, Dominik
    Jakobovic, Domagoj
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 320 - 330
  • [4] Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions
    Moskovchenko, Illarion
    Pastukhov, Mykola
    Kuznetsov, Alexandr
    Kuznetsova, Tetiana
    Prokopenko, Valeriia
    Kropyvnytskyi, Vitaliy
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 503 - 508
  • [5] A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties
    SHAN Jinyong
    HU Lei
    ZENG Xiangyong
    LI Chunlei
    Journal of Systems Science & Complexity, 2018, 31 (04) : 1042 - 1064
  • [6] A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties
    Shan, Jinyong
    Hu, Lei
    Zeng, Xiangyong
    Li, Chunlei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 31 (04) : 1042 - 1064
  • [7] A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties
    Jinyong Shan
    Lei Hu
    Xiangyong Zeng
    Chunlei Li
    Journal of Systems Science and Complexity, 2018, 31 : 1042 - 1064
  • [8] Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation
    Wang, Zhao
    Zhang, Xiao
    Wang, Sitao
    Zheng, Zhiming
    Wang, Wenhua
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (03) : 425 - 444
  • [9] Cryptographic Boolean functions with biased inputs
    Gangopadhyay, Sugata
    Gangopadhyay, Aditi Kar
    Pollatos, Spyridon
    Stanica, Pantelimon
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (02): : 301 - 314
  • [10] Cryptographic Boolean functions with biased inputs
    Sugata Gangopadhyay
    Aditi Kar Gangopadhyay
    Spyridon Pollatos
    Pantelimon Stănică
    Cryptography and Communications, 2017, 9 : 301 - 314