Evolutionary heuristics for finding cryptographically strong s-boxes

被引:0
作者
Millan, W [1 ]
Burnett, L [1 ]
Carter, G [1 ]
Clark, A [1 ]
Dawson, E [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Res Ctr, Brisbane, Qld 4001, Australia
来源
INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS | 1999年 / 1726卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances are reported in the use of heuristic optimisation for the design of cryptographic mappings. The genetic algorithm (GA) is adapted for the design of regular substitution boxes (s-boxes) with relatively high nonlinearity and low autocorrelation. We discuss the selection of suitable GA parameters, and in particular we introduce an effective technique for breeding s-boxes. This assimilation operation, produces a new s-box which is a simple and natural compromise between the properties of two dissimilar parent s-boxes. Our results demonstrate that assimilation provides rapid convergence to good solutions. We present an analysis comparing the relative effectiveness of including a local optimisation procedure at various stages of the CA. Our results show that these algorithms find cryptographically strong s-boxes faster than exhaustive search.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 50 条
[21]   Finding Biaffine and Quadratic Equations for S-Boxes Based on Power Mappings [J].
Gupta, Kishan Chand ;
Ray, Indranil Ghosh .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (04) :2200-2209
[22]   Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog [J].
Perrin, Leo ;
Udovenko, Aleksei .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) :99-124
[23]   An evolutionary algorithm to improve the nonlinearity of self-inverse S-Boxes [J].
Chen, H ;
Feng, DG .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 :352-361
[24]   A method for designing strong S-Boxes based on chaotic Lorenz system [J].
Ozkaynak, Fatih ;
Ozer, Ahmet Bedri .
PHYSICS LETTERS A, 2010, 374 (36) :3733-3738
[25]   Brownian Techniques for Constructing High-Strong Cryptographic S-boxes [J].
Harmouch, Youssef ;
El Kouch, Rachid .
2ND INTERNATIONAL CONFERENCE ON SMART DIGITAL ENVIRONMENT (ICSDE'18), 2018, :19-26
[26]   Improving quality of DES S-boxes by cellular automata-based S-boxes [J].
Szaban, Miroslaw ;
Seredynski, Franciszek .
JOURNAL OF SUPERCOMPUTING, 2011, 57 (02) :216-226
[27]   Improving quality of DES S-boxes by cellular automata-based S-boxes [J].
Miroslaw Szaban ;
Franciszek Seredynski .
The Journal of Supercomputing, 2011, 57 :216-226
[28]   Cellular Automata-Based S-Boxes vs. DES S-Boxes [J].
Szaban, Miroslaw ;
Seredynski, Franciszek .
PARALLEL COMPUTING TECHNOLOGIES, PROCEEDINGS, 2009, 5698 :269-+
[29]   Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard [J].
Mehran Mozaffari-Kermani ;
Arash Reyhani-Masoleh .
Journal of Electronic Testing, 2009, 25 :225-245
[30]   Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard [J].
Mozaffari-Kermani, Mehran ;
Reyhani-Masoleh, Arash .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2009, 25 (4-5) :225-245