2005
DOI: 10.1007/bf03037656
|View full text |Cite
|
Sign up to set email alerts
|

The design of S-boxes by simulated annealing

Abstract: Abstract-Substitution boxes are important components in many modern day block and stream ciphers. Their study has attracted a great deal of attention over many years. The development of a variety of cryptosystem attacks over the years has lead to the development of criteria for resilience to such attacks. Some general criteria such as high non-linearity and low autocorrelation have been proposed as useful criteria (providing some protection against attacks such as linear cryptanalysis and differential cryptana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0
10

Year Published

2008
2008
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 103 publications
(65 citation statements)
references
References 11 publications
0
55
0
10
Order By: Relevance
“…NS deg(S) AC(S)max δ-uniformity Fixed points Linear Redundancy Pseudo-random S-BOX [20], [21] 98 NR NR NR NR NR (usually zero) Finite Field Inversion [24] 112 7 32 4 2 complete Hill Climbing [20] 100 NR NR NR NR NR GA/HC [21] 100 NR NR NR NR NR Simulated Annealing [8] 102 NR 80 NR NR NR GaT [32] 104 Note that algebraic immunity is also included in the target set of criteria for the Gradient descent method. The reported value for algebraic immunity is 3 [15].…”
Section: Methods/propertiesmentioning
confidence: 99%
See 2 more Smart Citations
“…NS deg(S) AC(S)max δ-uniformity Fixed points Linear Redundancy Pseudo-random S-BOX [20], [21] 98 NR NR NR NR NR (usually zero) Finite Field Inversion [24] 112 7 32 4 2 complete Hill Climbing [20] 100 NR NR NR NR NR GA/HC [21] 100 NR NR NR NR NR Simulated Annealing [8] 102 NR 80 NR NR NR GaT [32] 104 Note that algebraic immunity is also included in the target set of criteria for the Gradient descent method. The reported value for algebraic immunity is 3 [15].…”
Section: Methods/propertiesmentioning
confidence: 99%
“…Specific heuristic techniques include the hill climbing method, the simulated annealing method, the genetic algorithm or a combination of these. For example the highest nonlinearity achieved by: the hill climbing method is 100 [20], the simulated annealing method is 102 [8], and by a special genetic algorithm is 104 [32]. Recently in [15], values of 104 have been achieved for the nonlinearity by a method, referred as the modified gradient descent, which is based on swapping a number of values in a permutation.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…We are then faced with the minimization of a convex polyhedral function with binary variables under linear constraints which is in fact equivalent to a mixed zero-one linear program (with exactly one continuous variable). In our convenient for DC programming approach, for the moment, we consider the problem in the form (8).…”
Section: Optimization Formulation and Reformulationmentioning
confidence: 99%
“…On the other side, 8×8 size S-boxes are used when speed and security of a cipher are of primary importance; as an example consider the AES algorithm [5]. For a detailed description of relevant S-box properties, we refer the reader to [3,4,[6][7][8] In this paper we investigate the efficiency of two algorithms previously unexplored when discussing the evolution of S-boxes. Those algorithms are Cartesian Genetic Programming (CGP) and Genetic Programming (GP).…”
Section: Introductionmentioning
confidence: 99%