An evolutionary approach to construct cryptographically strong Boolean functions

被引:0
|
作者
Goyal, Rajni [1 ]
Yadav, Shiv Prasad [1 ]
机构
[1] Indian Inst Technol Roorkee, Dept Math, Roorkee 247667, Uttar Pradesh, India
关键词
Evolutionary multi-objective optimization; NSGA-II; Boolean functions; Cryptography;
D O I
10.1007/s13198-012-0089-6
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Many desirable properties are known for Cryptographically strong Boolean functions. It is difficult task to get optimal trade-off among such properties. Nowadays, the design of strong cryptographic Boolean functions is a multi-objective problem. In this paper we have focused on nonlinearity, autocorrelation and resiliency, and explored an evolutionary approach to construct balanced Boolean functions having the best trade-off among them for 4 and 5 variables.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [1] An evolutionary approach to construct cryptographically strong Boolean functions
    Rajni Goyal
    Shiv Prasad Yadav
    [J]. International Journal of System Assurance Engineering and Management, 2012, 3 (1) : 1 - 5
  • [2] Heuristic design of cryptographically strong balanced Boolean functions
    Millan, W
    Clark, A
    Dawson, E
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 489 - 499
  • [3] Generating cryptographically strong Boolean functions using partial information
    Marta Šimovcová
    Martin Stanek
    [J]. Periodica Mathematica Hungarica, 2004, 49 (1) : 119 - 130
  • [4] On the construction of cryptographically strong Boolean functions with desirable trade-off
    Ren K.
    Park J.
    Kim K.
    [J]. Journal of Zhejiang University-SCIENCE A, 2005, 6 (5): : 358 - 364
  • [5] A group theoretic approach to construct cryptographically strong substitution boxes
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    Khan, Waqar Ahmad
    Mahmood, Hasan
    [J]. NEURAL COMPUTING & APPLICATIONS, 2013, 23 (01): : 97 - 104
  • [6] A group theoretic approach to construct cryptographically strong substitution boxes
    Iqtadar Hussain
    Tariq Shah
    Muhammad Asif Gondal
    Waqar Ahmad Khan
    Hasan Mahmood
    [J]. Neural Computing and Applications, 2013, 23 : 97 - 104
  • [7] On the construction of cryptographically strong Boolean functions with desirable trade-off
    REN Kui
    PARK Jaemin
    KIM Kwangjo
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2005, (05) : 358 - 364
  • [8] Construction of cryptographically important Boolean functions
    Maity, S
    Johansson, T
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 234 - 245
  • [9] On cryptographically secure vectorial Boolean functions
    Satoh, T
    Iwata, T
    Kurosawa, K
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 20 - 28
  • [10] Results on algebraic immunity for cryptographically significant Boolean functions
    Dalai, DK
    Gupta, KC
    Maitra, S
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 92 - 106