Heuristic methods of gradient search for the cryptographic boolean functions

被引:0
|
作者
Kuznetsov A.A. [1 ]
Moskovchenko I.V. [2 ]
Prokopovych-Tkachenko D.I. [3 ]
Kuznetsova T.Y. [3 ]
机构
[1] V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv
[2] University of Customs and Finance, 2/4Volodymyra Vernadskoho St., Dnipro
[3] I. Kozhedub Kharkiv National Air Force University, 77/79 Sumska St., Kharkiv
来源
Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika) | 2019年 / 78卷 / 10期
关键词
Cryptographic Boolean functions; Heuristic methods; Nonlinear substitute blocks; Symmetric cryptography;
D O I
10.1615/TelecomRadEng.v78.i10.40
中图分类号
学科分类号
摘要
Heuristic methods of gradient search of the cryptographic Boolean functions that satisfy the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. The proposed method of gradient descent is investigated, in particular, estimates of nonlinearity and correlation immunity of the synthesized Boolean functions are given. A method for evaluating the computational efficiency of gradient search methods is proposed, based on the construction of sample (empirical) distribution functions, which characterize the probability of the formation of the Boolean functions with persistence indicators not lower than those required. As an indicator of computational efficiency, we propose the average number of attempts that need to be performed using the heuristic method to form a cryptographic Boolean function with the required properties. It is shown that the proposed gradient descent method allows the formation of cryptographic functions with the required durability indicators in fewer steps. The results of investigations of the cryptographic properties of the formed Boolean functions in comparison with the best known assessments are given. © 2019 Begell House Inc.. All rights reserved.
引用
收藏
页码:879 / 899
页数:20
相关论文
共 50 条
  • [41] Rotation symmetric Boolean functions - Count and cryptographic properties
    Stanica, Pantelimon
    Maitra, Subhamoy
    DISCRETE APPLIED MATHEMATICS, 2008, 156 (10) : 1567 - 1580
  • [42] A Greedy Algorithm for Checking Normality of Cryptographic Boolean Functions
    Kolokotronis, Nicholas
    Limniotis, Konstantinos
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 601 - 605
  • [43] A randomised algorithm for checking the normality of cryptographic Boolean functions
    Braeken, A
    Wolf, C
    Preneel, B
    EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 51 - 66
  • [44] Some cryptographic properties of rotation symmetric Boolean functions
    Huang, Jinglian
    Zhang, Chunling
    Liu, Yajing
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2704 - +
  • [45] Evolving Cryptographic Boolean Functions with Minimal Multiplicative Complexity
    Husa, Jakub
    Sekanina, Lukas
    2020 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2020,
  • [46] HEURISTIC ALGORITHM FOR THE MINIMIZATION OF GENERALIZED BOOLEAN FUNCTIONS
    CARUSO, G
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1988, 135 (02): : 108 - 116
  • [47] Automated search for heuristic functions
    Cejnar, P
    Barták, R
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING - CP 2005, PROCEEDINGS, 2005, 3709 : 843 - 843
  • [48] Cryptographic properties of Boolean functions defining elementary cellular automata
    Escuadra Burrieza, J.
    Martin del Rey, A.
    Perez Iglesias, J. L.
    Rodriguez Sanchez, G.
    Queiruga Dios, A.
    de la Villa Cuenca, A.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (02) : 239 - 248
  • [49] Hybrid classes of balanced Boolean functions with good cryptographic properties
    Khan, Mansoor Ahmed
    Ozbudak, Ferruh
    INFORMATION SCIENCES, 2014, 273 : 319 - 328
  • [50] On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion
    Riccardo Aragona
    Marco Calderini
    Daniele Maccauro
    Massimiliano Sala
    Applicable Algebra in Engineering, Communication and Computing, 2016, 27 : 359 - 372