An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes

作者: Alejandro Freyre-Echevarría , Ahmad Alanezi , Ismel Martínez-Díaz , Musheer Ahmad , Ahmed A. Abd El-Latif

DOI: 10.3390/SYM12111896

关键词:

摘要: The property of nonlinearity has high importance for the design strong substitution boxes. Therefore, development new techniques to produce boxes with values is essential. Many research papers have shown that optimization algorithms are an efficient technique obtain good solutions. However, there no reference in public literature showing a heuristic method obtains optimal unless seeded initial Moreover, majority best reported pseudo-random seeding algorithm(s) often achieve their results help some cost function(s) over Walsh–Hadamard spectrum substitution. In sense, we proposed present, this paper, novel external parameter independent function evolving bijective s-boxes nonlinearity, which highly correlated property. Several approaches including GaT (genetic and tree), LSA (local search algorithm), Hill Climbing algorithm been investigated assess performance evolved s-boxes. A comparison done show advantages our function, respect functions like Clark’s Picek’s functions.

参考文章(32)
Vincent Rijmen, Paulo S.L.M, The KHAZAD Legacy-Level Block Cipher ,(2001)
Joan Daemen, Vincent Rijmen, The Design of Rijndael Springer-Verlag New York, Inc.. ,(2002) , 10.1007/978-3-662-04722-4
Akram Belazi, Ahmed A. Abd El-Latif, Rhouma Rhouma, Safya Belghith, Selective image encryption scheme based on DWT, AES S-box and chaotic permutation 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). pp. 606- 610 ,(2015) , 10.1109/IWCMC.2015.7289152
Kaisa Nyberg, On the construction of highly nonlinear permutations theory and application of cryptographic techniques. pp. 92- 98 ,(1992) , 10.1007/3-540-47555-9_8
Xian-Mo Zhang, Yuliang Zheng, GAC — the Criterion for Global Avalanche Characteristics of Cryptographic Functions Journal of Universal Computer Science. ,vol. 1, pp. 320- 337 ,(1996) , 10.1007/978-3-642-80350-5_30
Mitsuru Matsui, Linear cryptanalysis method for DES cipher theory and application of cryptographic techniques. pp. 386- 397 ,(1994) , 10.1007/3-540-48285-7_33
D. Coppersmith, The Data Encryption Standard (DES) and its strength against attacks IBM Journal of Research and Development. ,vol. 38, pp. 243- 250 ,(1994) , 10.1147/RD.383.0243
L. Budaghyan, C. Carlet, A. Pott, New classes of almost bent and almost perfect nonlinear polynomials IEEE Transactions on Information Theory. ,vol. 52, pp. 1141- 1152 ,(2006) , 10.1109/TIT.2005.864481
M.A. Ben Farah, A. Kachouri, M. Samet, Improvement of cryptosystem based on iterating chaotic map Communications in Nonlinear Science and Numerical Simulation. ,vol. 16, pp. 2543- 2553 ,(2011) , 10.1016/J.CNSNS.2010.09.005