Heuristic methods of gradient search for the cryptographic boolean functions

被引:0
|
作者
Kuznetsov A.A. [1 ]
Moskovchenko I.V. [2 ]
Prokopovych-Tkachenko D.I. [3 ]
Kuznetsova T.Y. [3 ]
机构
[1] V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv
[2] University of Customs and Finance, 2/4Volodymyra Vernadskoho St., Dnipro
[3] I. Kozhedub Kharkiv National Air Force University, 77/79 Sumska St., Kharkiv
来源
Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika) | 2019年 / 78卷 / 10期
关键词
Cryptographic Boolean functions; Heuristic methods; Nonlinear substitute blocks; Symmetric cryptography;
D O I
10.1615/TelecomRadEng.v78.i10.40
中图分类号
学科分类号
摘要
Heuristic methods of gradient search of the cryptographic Boolean functions that satisfy the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. The proposed method of gradient descent is investigated, in particular, estimates of nonlinearity and correlation immunity of the synthesized Boolean functions are given. A method for evaluating the computational efficiency of gradient search methods is proposed, based on the construction of sample (empirical) distribution functions, which characterize the probability of the formation of the Boolean functions with persistence indicators not lower than those required. As an indicator of computational efficiency, we propose the average number of attempts that need to be performed using the heuristic method to form a cryptographic Boolean function with the required properties. It is shown that the proposed gradient descent method allows the formation of cryptographic functions with the required durability indicators in fewer steps. The results of investigations of the cryptographic properties of the formed Boolean functions in comparison with the best known assessments are given. © 2019 Begell House Inc.. All rights reserved.
引用
收藏
页码:879 / 899
页数:20
相关论文
共 50 条
  • [21] A construction of Boolean functions with good cryptographic properties
    Chung, Jong H.
    Stanica, Pantelimon
    Tan, Chik-How
    Wang, Qichun
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (04) : 700 - 711
  • [22] VECTORIAL BOOLEAN FUNCTIONS WITH GOOD CRYPTOGRAPHIC PROPERTIES
    Feng, Keqin
    Yang, Jing
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1271 - 1282
  • [23] On cryptographic properties of cubic and splitting Boolean functions
    Musukwa, Augustine
    Sala, Massimiliano
    Villa, Irene
    Zaninelli, Marco
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2024, 35 (05) : 629 - 645
  • [24] Boolean functions optimizing most of the cryptographic criteria
    Tu, Ziran
    Deng, Yingpu
    DISCRETE APPLIED MATHEMATICS, 2012, 160 (4-5) : 427 - 435
  • [26] Boolean functions with five controllable cryptographic properties
    Stanica, P
    Sung, SH
    DESIGNS CODES AND CRYPTOGRAPHY, 2004, 31 (02) : 147 - 157
  • [27] FURTHER ENUMERATING BOOLEAN FUNCTIONS OF CRYPTOGRAPHIC SIGNIFICANCE
    YANG, YX
    GUO, BO
    JOURNAL OF CRYPTOLOGY, 1995, 8 (03) : 115 - 122
  • [28] Covering Sequences of Boolean Functions and Their Cryptographic Significance
    C. Carlet
    Yu. Tarannikov
    Designs, Codes and Cryptography, 2002, 25 : 263 - 279
  • [29] Covering sequences of Boolean functions and their cryptographic significance
    Carlet, C
    Tarannikov, Y
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (03) : 263 - 279
  • [30] Heuristic Search for Nonlinear Substitutions for Cryptographic Applications
    Kuznetsov O.
    Frontoni E.
    Kandiy S.
    Smirnov O.
    Ulianovska Y.
    Kobylianska O.
    Lecture Notes on Data Engineering and Communications Technologies, 2023, 180 : 288 - 298