Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties

被引:11
作者
Picek, Stjepan [1 ,2 ]
Sisejkovic, Dominik [3 ]
Jakobovic, Domagoj [3 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC, Kasteelpk Arenberg 10,Bus 2452, B-3001 Heverlee, Belgium
[2] IMinds, Kasteelpk Arenberg 10,Bus 2452, B-3001 Heverlee, Belgium
[3] Univ Zagreb, Fac Elect Engn & Comp, Zagreb, Croatia
关键词
Artificial immune systems; Evolutionary algorithms; Boolean functions; Cryptography; Comparison; Efficiency analysis; DESIGN;
D O I
10.1016/j.engappai.2016.11.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we investigate the efficiency of two immunological algorithms (CLONALG and opt-IA) in the evolution of Boolean functions suitable for use in cryptography. Although in its nature a combinatorial problem, we experiment with two representations of solutions, namely, the bitstring and the floating point based representation. The immunological algorithms are compared with two commonly used evolutionary algorithms genetic algorithm and evolution strategy. To thoroughly investigate these algorithms and representations, we use four different fitness functions that differ in the number of parameters and difficulty. Our results indicate that for smaller dimensions immunological algorithms behave comparable with evolutionary algorithms, while for the larger dimensions their performance is somewhat worse. When considering only immunological algorithms, opt-IA outperforms CLONALG in most of the experiments. The difference in the representation for those algorithms is also clear where floating point works better with smaller problem sizes and bitstring representation works better for larger Boolean functions.
引用
收藏
页码:320 / 330
页数:11
相关论文
共 42 条
  • [1] Aguirre H, 2007, GECCO 2007: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, P749
  • [2] [Anonymous], 1999, 463 FIPS NIST
  • [3] [Anonymous], 2002, DESIGN RIJNDAEL
  • [4] [Anonymous], 2013, Report 2013/011
  • [5] Evolution strategies – A comprehensive introduction
    Hans-Georg Beyer
    Hans-Paul Schwefel
    [J]. Natural Computing, 2002, 1 (1) : 3 - 52
  • [6] Back T., 2000, EVOLUTIONARY COMPUTA
  • [7] Burnet M., 1959, The clonal selection theory of acquired immunity, DOI [10.5962/bhl.title.8281, DOI 10.5962/BHL.TITLE.8281]
  • [8] Carlet C., 2010, BOOLEAN MODELS METHO, P398, DOI DOI 10.1017/CBO9780511780448.012
  • [9] Carlet C., 2010, Boolean Models and Methods in Mathematics, Computer Science, and Engineering, P257, DOI [10.1017/CBO9780511780448.011, DOI 10.1017/CBO9780511780448.011]
  • [10] Castro L.N.D., 2002, GECCO 2002 WORKSHOP, P36