Using evolutionary computation to create vectorial Boolean functions with low differential uniformity and high nonlinearity.

作者: John A. Clark , James McLaughlin

DOI:

关键词:

摘要: The two most important criteria for vectorial Boolean functions used as S-boxes in block ciphers are differential uniformity and nonlinearity. Previous work this field has focused only on nonlinearity a different criterion, autocorrelation. In paper, we describe the results of experiments using simulated annealing, memetic algorithms, ant colony optimisation to create with low uniformity.

参考文章(40)
L. Darrell Whitley, Timothy Starkweather, Keith E. Mathias, S. McDaniel, C. Whitley, A Comparison of Genetic Sequencing Operators. international conference on genetic algorithms. pp. 69- 76 ,(1991)
Alex Biryukov, Christophe De Cannière, Michaël Quisquater, On Multiple Linear Approximations Advances in Cryptology – CRYPTO 2004. pp. 1- 22 ,(2004) , 10.1007/978-3-540-28628-8_1
Eli Biham, Lars Knudsen, Ross Anderson, Serpent: A Proposal for the Advanced Encryption Standard ,(1998)
Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel, Algebraic Techniques in Differential Cryptanalysis Revisited Information Security and Privacy. pp. 120- 141 ,(2011) , 10.1007/978-3-642-22497-3_9
John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan, Evolving Boolean Functions Satisfying Multiple Criteria international conference on cryptology in india. pp. 246- 259 ,(2002) , 10.1007/3-540-36231-2_20
Xian-Mo Zhang, Yuliang Zheng, Hideki Imai, Relating Differential Distribution Tables to Other Propertiesof of Substitution Boxes Designs, Codes and Cryptography. ,vol. 19, pp. 45- 63 ,(2000) , 10.1023/A:1008359713877
Jung Hee Cheon, Dong Hoon Lee, Resistance of S-boxes against algebraic attacks fast software encryption. pp. 83- 93 ,(2004) , 10.1007/978-3-540-25937-4_6
Eli Biham, Adi Shamir, Differential Cryptanalysis of the Full 16-Round DES international cryptology conference. pp. 487- 496 ,(1992) , 10.1007/978-1-4613-9314-6_5
Kaisa Nyberg, Differentially uniform mappings for cryptography theory and application of cryptographic techniques. pp. 55- 64 ,(1994) , 10.1007/3-540-48285-7_6