2004
DOI: 10.1111/j.0824-7935.2004.00246.x
|View full text |Cite
|
Sign up to set email alerts
|

New Concepts in Evolutionary Search for Boolean Functions in Cryptology

Abstract: In symmetric cryptology the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like Substitution boxes (S-boxes). Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures, we discover essen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…The basic concepts and definitions of the mathematical apparatus of Boolean algebra used in evaluating the effectiveness of non-linear nodes to replace symmetric ciphers were introduced in [21][22][23][24][25][26][27][28].…”
Section: Indices Of Stability Of Cryptographic Boolean Functionsmentioning
confidence: 99%
See 2 more Smart Citations
“…The basic concepts and definitions of the mathematical apparatus of Boolean algebra used in evaluating the effectiveness of non-linear nodes to replace symmetric ciphers were introduced in [21][22][23][24][25][26][27][28].…”
Section: Indices Of Stability Of Cryptographic Boolean Functionsmentioning
confidence: 99%
“…The Boolean function f of n variables is the function [21][22][23][24][25][26][27][28], variables is the function that maps from the field GF(2 n ) of all binary vectors x = (x1, …, xn) of length n to the field GF (2). Usually Boolean functions are represented in algebraic normal form (ANF) and are considered as the sum of the products of the component coordinates.…”
Section: Indices Of Stability Of Cryptographic Boolean Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The set of 2 n connection functions are invariant. Moreover, this concept can be generalized to connection functions of any distance 1 ≤ d ≤ 2 n − 1 (see [MFD04]).…”
Section: Invariant Properties Over Rm (1 N)mentioning
confidence: 99%
“…Existing methods [14] were adopted to generate the individual functions, then they were compared to the existing s-box functions to check the above-listed requirements for the XOR pairs. When the candidate function was acceptable it was appended to the s-box, else another function was tested.…”
Section: Design Of S-boxesmentioning
confidence: 99%