Evolutionary algorithms-assisted construction of cryptographic boolean functions

Conference Paper (2021)
Author(s)

Claude Carlet (University of Bergen)

Domagoj Jakobović (University of Zagreb)

Stjepan Picek (TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2021 Claude Carlet, Domagoj Jakobovic, S. Picek
DOI related publication
https://doi.org/10.1145/3449639.3459362
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Claude Carlet, Domagoj Jakobovic, S. Picek
Research Group
Cyber Security
Pages (from-to)
565-573
ISBN (electronic)
9781450383509
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

In the last few decades, evolutionary algorithms were successfully applied numerous times for creating Boolean functions with good cryptographic properties. Still, the applicability of such approaches was always limited as the cryptographic community knows how to construct suitable Boolean functions with deterministic algebraic constructions. Thus, evolutionary results so far helped to increase the confidence that evolutionary techniques have a role in cryptography, but at the same time, the results themselves were seldom used. This paper considers a novel problem using evolutionary algorithms to improve Boolean functions obtained through algebraic constructions. To this end, we consider a recent generalization of Hidden Weight Boolean Function construction, and we show that evolutionary algorithms can significantly improve the cryptographic properties of the functions. Our results show that the genetic algorithm performs by far the best of all the considered algorithms and improves the nonlinearity property in all Boolean function sizes. As there are no known algebraic techniques to reach the same goal, we consider this application a step forward in accepting evolutionary algorithms as a powerful tool in the cryptography domain.

Files

License info not available