Evolutionary Algorithms-assisted Construction of Cryptographic Boolean Functions

被引:7
|
作者
Carlet, Claude [1 ]
Jakobovic, Domagoj [2 ]
Picek, Stjepan [3 ]
机构
[1] Univ Bergen, Bergen, Norway
[2] Univ Zagreb, Zagreb, Croatia
[3] Delft Univ Technol, Delft, Netherlands
来源
PROCEEDINGS OF THE 2021 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'21) | 2021年
关键词
Boolean function; Cryptography; Secondary Construction; Hidden Weight Boolean Function; ALGEBRAIC ATTACKS; DESIGN;
D O I
10.1145/3449639.3459362
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last few decades, evolutionary algorithms were successfully applied numerous times for creating Boolean functions with good cryptographic properties. Still, the applicability of such approaches was always limited as the cryptographic community knows how to construct suitable Boolean functions with deterministic algebraic constructions. Thus, evolutionary results so far helped to increase the confidence that evolutionary techniques have a role in cryptography, but at the same time, the results themselves were seldom used. This paper considers a novel problem using evolutionary algorithms to improve Boolean functions obtained through algebraic constructions. To this end, we consider a recent generalization of Hidden Weight Boolean Function construction, and we show that evolutionary algorithms can significantly improve the cryptographic properties of the functions. Our results show that the genetic algorithm performs by far the best of all the considered algorithms and improves the nonlinearity property in all Boolean function sizes. As there are no known algebraic techniques to reach the same goal, we consider this application a step forward in accepting evolutionary algorithms as a powerful tool in the cryptography domain.
引用
收藏
页码:565 / 573
页数:9
相关论文
共 50 条
  • [21] Metaheuristics in the Optimization of Cryptographic Boolean Functions
    Lopez-Lopez, Isaac
    Sosa-Gomez, Guillermo
    Segura, Carlos
    Oliva, Diego
    Rojas, Omar
    ENTROPY, 2020, 22 (09)
  • [22] Cryptographic Boolean functions with biased inputs
    Gangopadhyay, Sugata
    Gangopadhyay, Aditi Kar
    Pollatos, Spyridon
    Stanica, Pantelimon
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (02): : 301 - 314
  • [23] On cryptographic propagation criteria for Boolean functions
    Carlet, C
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 148 - 149
  • [24] Properties of a family of cryptographic boolean functions
    Wang, Qichun
    Tan, Chik How
    Wang, Qichun, 1600, Springer Verlag (8865): : 34 - 46
  • [25] Cryptographic Boolean functions with biased inputs
    Sugata Gangopadhyay
    Aditi Kar Gangopadhyay
    Spyridon Pollatos
    Pantelimon Stănică
    Cryptography and Communications, 2017, 9 : 301 - 314
  • [26] Cryptographic properties of monotone Boolean functions
    Carlet, Claude
    Joyner, David
    Stanica, Pantelimon
    Tang, Deng
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2016, 10 (01) : 1 - 14
  • [27] Almost security of cryptographic Boolean functions
    Kurosawa, K
    Matsumoto, R
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (11) : 2752 - 2761
  • [28] On the nonlinearity profile of cryptographic Boolean functions
    Elsheh, Esam
    Ben Hamza, A.
    Youssef, Amr
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1692 - +
  • [29] On Boolean functions with generalized cryptographic properties
    Braeken, A
    Nikov, V
    Nikova, S
    Preneel, B
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 120 - 135
  • [30] On cryptographic propagation criteria for Boolean functions
    Carlet, C
    INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 32 - 56