Evolutionary Methods for the Construction of Cryptographic Boolean Functions

被引:23
|
作者
Picek, Stjepan [1 ,3 ]
Jakobovic, Domagoj [1 ]
Miller, Julian F. [2 ]
Marchiori, Elena [3 ]
Batina, Lejla [3 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Zagreb 41000, Croatia
[2] Univ York, Dept Elect, York YO10 5DD, N Yorkshire, England
[3] Radboud Univ Nijmegen, NL-6525 ED Nijmegen, Netherlands
来源
关键词
Boolean functions; Genetic programming; Cartesian Genetic Programming; Cryptographic properties; Comparison;
D O I
10.1007/978-3-319-16501-1_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Boolean functions represent an important primitive when constructing many stream ciphers. Since they are often the only nonlinear element of such ciphers, without them the algorithm would be trivial to break. Therefore, it is not surprising there exist a substantial body of work on the methods of constructing Boolean functions. Among those methods, evolutionary computation (EC) techniques play a significant role. Previous works show it is possible to use EC methods to generate high-quality Boolean functions that even surpass those built by algebraic constructions. However, up to now, there was no work investigating the use of Cartesian Genetic Programming (CGP) for producing Boolean functions suitable for cryptography. In this paper we compare Genetic Programming (GP) and CGP algorithms in order to reach the conclusion which algorithm is better suited to evolve Boolean functions suitable for cryptographic usage. Our experiments show that CGP performs much better than the GP when the goal is obtaining as high as possible nonlinearity. Our results indicate that CGP should be further tested with different fitness objectives in order to check the boundaries of its performance.
引用
收藏
页码:192 / 204
页数:13
相关论文
共 50 条
  • [21] Properties of a family of cryptographic boolean functions
    Wang, Qichun
    Tan, Chik How
    Wang, Qichun, 1600, Springer Verlag (8865): : 34 - 46
  • [22] Cryptographic Boolean functions with biased inputs
    Sugata Gangopadhyay
    Aditi Kar Gangopadhyay
    Spyridon Pollatos
    Pantelimon Stănică
    Cryptography and Communications, 2017, 9 : 301 - 314
  • [23] Cryptographic properties of monotone Boolean functions
    Carlet, Claude
    Joyner, David
    Stanica, Pantelimon
    Tang, Deng
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2016, 10 (01) : 1 - 14
  • [24] Almost security of cryptographic Boolean functions
    Kurosawa, K
    Matsumoto, R
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (11) : 2752 - 2761
  • [25] On the nonlinearity profile of cryptographic Boolean functions
    Elsheh, Esam
    Ben Hamza, A.
    Youssef, Amr
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1692 - +
  • [26] On Boolean functions with generalized cryptographic properties
    Braeken, A
    Nikov, V
    Nikova, S
    Preneel, B
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 120 - 135
  • [27] On cryptographic propagation criteria for Boolean functions
    Carlet, C
    INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 32 - 56
  • [28] Methods for successive construction of a functional decomposition of Boolean functions
    Boole, E.S.
    Chapenko, V.P.
    Automatic Control and Computer Sciences, 2005, 39 (05) : 37 - 45
  • [29] A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction
    Carlet, C
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 549 - 564
  • [30] Cryptographic Boolean Functions with a Large Number of Variables
    Wang, Qichun
    Tan, Chik How
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 1534 - 1538