Evolutionary Methods for the Construction of Cryptographic Boolean Functions

被引:23
作者
Picek, Stjepan [1 ,3 ]
Jakobovic, Domagoj [1 ]
Miller, Julian F. [2 ]
Marchiori, Elena [3 ]
Batina, Lejla [3 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Zagreb 41000, Croatia
[2] Univ York, Dept Elect, York YO10 5DD, N Yorkshire, England
[3] Radboud Univ Nijmegen, NL-6525 ED Nijmegen, Netherlands
来源
GENETIC PROGRAMMING (EUROGP 2015) | 2015年 / 9025卷
关键词
Boolean functions; Genetic programming; Cartesian Genetic Programming; Cryptographic properties; Comparison;
D O I
10.1007/978-3-319-16501-1_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Boolean functions represent an important primitive when constructing many stream ciphers. Since they are often the only nonlinear element of such ciphers, without them the algorithm would be trivial to break. Therefore, it is not surprising there exist a substantial body of work on the methods of constructing Boolean functions. Among those methods, evolutionary computation (EC) techniques play a significant role. Previous works show it is possible to use EC methods to generate high-quality Boolean functions that even surpass those built by algebraic constructions. However, up to now, there was no work investigating the use of Cartesian Genetic Programming (CGP) for producing Boolean functions suitable for cryptography. In this paper we compare Genetic Programming (GP) and CGP algorithms in order to reach the conclusion which algorithm is better suited to evolve Boolean functions suitable for cryptographic usage. Our experiments show that CGP performs much better than the GP when the goal is obtaining as high as possible nonlinearity. Our results indicate that CGP should be further tested with different fitness objectives in order to check the boundaries of its performance.
引用
收藏
页码:192 / 204
页数:13
相关论文
共 50 条
  • [21] Covering Sequences of Boolean Functions and Their Cryptographic Significance
    C. Carlet
    Yu. Tarannikov
    [J]. Designs, Codes and Cryptography, 2002, 25 : 263 - 279
  • [22] Covering sequences of Boolean functions and their cryptographic significance
    Carlet, C
    Tarannikov, Y
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (03) : 263 - 279
  • [23] Testing a Cellular Automata Construction Method to Obtain 9-variable Cryptographic Boolean Functions
    Prevost, Thomas
    Martin, Bruno
    [J]. JOURNAL OF CELLULAR AUTOMATA, 2024, 18 (2-3) : 187 - 205
  • [24] New Balanced Boolean Functions with Good Cryptographic Properties
    Wang, Qichun
    Xue, Xiangyang
    Kan, Haibin
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2633 - 2637
  • [25] A survey of metaheuristic algorithms for the design of cryptographic Boolean functions
    Djurasevic, Marko
    Jakobovic, Domagoj
    Mariot, Luca
    Picek, Stjepan
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2023, 15 (06): : 1171 - 1197
  • [26] A randomised algorithm for checking the normality of cryptographic Boolean functions
    Braeken, A
    Wolf, C
    Preneel, B
    [J]. EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 51 - 66
  • [27] Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography
    Picek, Stjepan
    Carlet, Claude
    Guilley, Sylvain
    Miller, Julian F.
    Jakobovic, Domagoj
    [J]. EVOLUTIONARY COMPUTATION, 2016, 24 (04) : 667 - 694
  • [28] On Evolutionary Algorithms for Boolean Functions Minimization
    Ilyin, B.
    Kazimirov, A. S.
    Panteleyev, V. I.
    Reimerov, S. Yu.
    Semicheva, N.
    [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 400 - 402
  • [29] The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions
    Limniotis, Konstantinos
    Kolokotronis, Nicholas
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (12) : 8345 - 8356
  • [30] Constructing Two Classes of Boolean Functions With Good Cryptographic Properties
    Chen, Yindong
    Zhang, Liu
    Gong, Zhangquan
    Cai, Weihong
    [J]. IEEE ACCESS, 2019, 7 : 149657 - 149665