Suscripción a Biblioteca: Guest
Telecommunications and Radio Engineering

Publicado 12 números por año

ISSN Imprimir: 0040-2508

ISSN En Línea: 1943-6009

SJR: 0.185 SNIP: 0.268 CiteScore™:: 1.5 H-Index: 22

Indexed in

HEURISTIC METHODS OF GRADIENT SEARCH FOR THE CRYPTOGRAPHIC BOOLEAN FUNCTIONS

Volumen 78, Edición 10, 2019, pp. 879-899
DOI: 10.1615/TelecomRadEng.v78.i10.40
Get accessGet access

SINOPSIS

Heuristic methods of gradient search of the cryptographic Boolean functions that satisfy the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. The proposed method of gradient descent is investigated, in particular, estimates of nonlinearity and correlation immunity of the synthesized Boolean functions are given. A method for evaluating the computational efficiency of gradient search methods is proposed, based on the construction of sample (empirical) distribution functions, which characterize the probability of the formation of the Boolean functions with persistence indicators not lower than those required. As an indicator of computational efficiency, we propose the average number of attempts that need to be performed using the heuristic method to form a cryptographic Boolean function with the required properties. It is shown that the proposed gradient descent method allows the formation of cryptographic functions with the required durability indicators in fewer steps. The results of investigations of the cryptographic properties of the formed Boolean functions in comparison with the best known assessments are given.

REFERENCIAS
  1. Information technology. Security techniques. Encryption algorithms. Part 3: Block ciphers. ISO/IEC 18033-3: 2010, 2010.

  2. Advanced Encryption Standard. Federal Information Processing Standards Publications FIPS-197, 2001. Information technologies. Cryptographic Data Security. Symmetric block transformation algorithm. National Standard of Ukraine DSTU 7624:2014, 2015 (in Ukrainian).

  3. Information technology. Cryptography protection of information. Block ciphers. National Standard of Russian Federation GOST R 34.12-2015, 2015 (in Russian).

  4. Information technology and security. Information security. Cryptography encryption and integrity control algorithms. State Standard of the Republic of Belarus STB 34.101.31-2011, 2011 (in Russian).

  5. Kuznetsov, O.O., Gorbenko, Yu.I., Bilozertsev, I.M., Andrushkevych, A.V. et al., (2018) Algebraic Immunity of Non-linear Blocks of Symmetric Ciphers, Telecommunications and Radio Engineering, 77(4), pp. 309-325.

  6. Tran, B.N., Nguyen, T.D., and Tran, T.D., (2009) A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems, International Conference on Computer Technology and Development, Kota Kinabalu, pp. 212-216.

  7. Kuznetsov, A., Serhiienko, R., Prokopovych-Tkachenko, D., and Tarasenko, Y., (2018) Evaluation of Algebraic Immunity of modern block ciphers, IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, pp. 288-29.

  8. McLoone, M. and McCanny, J.V., (2003) High-performance FPGA implementation of DES using a novel method for implementing the key schedule, IEE Proceedings - Circuits, Devices and Systems, 150(5), pp. 373.

  9. Kuznetsov, A., Kolovanova, I., and Kuznetsova, T., (2017) Periodic characteristics of output feedback encryption mode, 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, pp. 193-198.

  10. Sulaiman, S., Muda, Z., and Juremi, J., (2012) The new approach of Rijndael key schedule, International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, pp. 23-27.

  11. Kuznetsov, O., Gorbenko, Y., and Kolovanova, I., (2016) Combinatorial properties of block symmetric ciphers key schedule, Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, Ukraine, pp. 55-58.

  12. Nejad, F.H., Sabah, S., and Jam, A.J., (2014) Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys, International Conference on Computational Science and Technology (ICCST), Kota Kinabalu, pp. 1-5.

  13. Liu, H. and Jin, C., (2015) Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure, The Computer Journal, 58(4), pp. 904-921.

  14. Kuznetsov, A., Gorbenko, Y., Andrushkevych, A., and Belozersev, I., Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2, 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, pp. 203-206.

  15. Gorbenko, I., Kuznetsov, A., Lutsenko, M., and Ivanenko, D., (2017) The research of modern stream ciphers, 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, pp. 207-210.

  16. Kuznetsov, A., Frolenko, V., Eremin, E., and Zavgorodnia, O., (2018) Research of cross-platform stream symmetric ciphers implementation, IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, pp. 300-305.

  17. Gorbenko, I., Kuznetsov, O., Gorbenko, Y., Alekseychuk, A., and Tymchenko, V., (2018) Strumok keystream generator, IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, pp. 294-299.

  18. Gopi, V. and Logashanmugam, E., (2013) Design and analysis of nonlinear AES S-box and mix-column transformation with the pipelined architecture, International Conference on Current Trends in Engineering and Technology (ICCTET), Coimbatore, pp. 235-238.

  19. Wang, H., Zheng, H., Hu, B., and Tang, H., (2013) Improved Lightweight Encryption Algorithm Based on Optimized S-Box, International Conference on Computational and Information Sciences, Shiyang, pp. 734-737.

  20. Das, I., Nath, S., Roy, S., and Mondal, S., (2012) Random S-Box generation in AES by changing irreducible polynomial, International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, pp. 556-559.

  21. Chen, Y., Tian, W., and Zhang, Y., (2014) Construction for Balanced Boolean Function with Maximum Algebraic Immunity, 7th International Conference on Advanced Software Engineering and its Applications, Haikou, pp. 32-34.

  22. Liang, C.E.S. and Zhang, T., (2011) Construction Method of Boolean Functions Based on Genetic Algorithm, 7th International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, pp. 1-4.

  23. Asthana, R., Verma, N., and Ratan, R., (2014) Generation of Boolean functions using Genetic Algorithm for cryptographic applications, IEEE International Advance Computing Conference (IACC), Gurgaon, pp. 1361-136.

  24. Bharti and Sharma, D.K., (2016) Searching Boolean function using simulated annealing and hill climbing optimization techniques, International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), Ramanathapuram, pp. 62-64.

  25. Millan, W., Fuller, J., and Dawson, E., (2003) New concepts in evolutionary search for Boolean functions in cryptology, Congress on Evolutionary Computation, CEC '03, pp. 2157-2164.

  26. Picek, S., Carlet, C., Guilley, S., Miller, J.F., and Jakobovic, D., (2016) Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography, Evolutionary Computation, 24(4), pp. 667-694.

  27. Millan, W., Clark, A., and Dawson, E., (1997) Smart Hill Climbing Finds Better Boolean Functions, Proceedings of the Workshop on Selected Areas on Cryptography SAC 97, Springer-Verlag, pp. 50-63.

  28. Izbenko, Y., Kovtun, V., and Kuznetsov, A., (2009) The Design of Boolean Functions by Modified Hill Climbing Method, Sixth International Conference on Information Technology: New Generations, Las Vegas, NV, pp. 356-361.

  29. A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication, 800-22, 2001.

  30. Pasalic, E. and Johansson, T., (1999) Further results on the relation between nonlinearity and resiliency of Boolean functions, Proc. IMA Conf. Cryptography and Coding (Lecture Notes in Computer Science), New York: Springer-Verlag, 1746, pp. 35-45.

  31. Clark, J., Jacob, S., Stepney, S., Maitra, S., and Millan, W., (2002) Evolving Boolean Functions Satisfying Multiple Criteria, Proceedings of INDOCRYPT'02, LNCS, Springer, 2551, pp. 246-259.

  32. Millan, W., Clark, A., and Dawson, E., (1997) An Effective Genetic Algorithm for Finding Highly Non-linear Boolean Functions, Proceedings of the First International Conference on Information and Communications Security. LNCS, Springer-Verlag, Berlin Heidelberg New York, 1334, pp. 149-158.

  33. Zheng, Y. and Zhang, X.M., (2000) Improved upper bound on the nonlinearity of high order correlation immune functions, Selected Areas in Cryptography-SAC 2000, Lecture Notes in Computer Science, Springer Verlag, 2012, pp. 264-274.

  34. Zhang, X-M. and Zheng, Y., (1995) GAC-the criterion for global avalanche characteristics of cryptographic functions, Journal of Universal Computer Science, 1(5), pp.316-333.

  35. Maitra, S., (2001) Highly nonlinear balanced Boolean functions with very good autocorrelation property, Workshop on Coding and Cryptography-WCC 2001, Paris, Electronic Notes in Discrete Mathematics, 6, Elsevier Science.

  36. Maitra, S., (2001) Autocorrelation properties of correlation immune Boolean functions, INDOCRYPT, Lecture Notes in Computer Science, Springer Verlag, 2247, pp. 242-253.

  37. Maitra, S. and Pasalic, E., (2002) Further constructions of resilient Boolean functions with very high nonlinearity, IEEE Transactions on Information Theory, 48(7), pp. 1825-1834.

  38. Seberry, J., Zhang, X.-M., and Zheng, Y., (1995) Nonlinearity and Propagation Characteristics of Balanced Boolean Functions, Information and Computation, 119(1), pp. 1-13.

  39. Seberry, J., Zhang, X.M., and Zheng, Y., (1994) On Constructions and Nonlinearity of Correlation Immune Functions, Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science, Springer-Verlag, 765, pp.181-199.

  40. Seberry, J. and Zhang, X., (1995) Hadamar Matrices, Bent Functions and Cryptography, J.H. Dinitz and D.R. Stinson, (eds.), Contemporary Design Theory: A Collection of Surveys, 11, pp. 431-559, John Wiley and Sons, Inc.

CITADO POR
  1. Potii Oleksandr, Poluyanenko Nikolay, Stelnyk Igor, Revak Iryna, Kavun Sergii, Kuznetsova Tetiana, Nonlinear-Feedback Shift Registers for Stream Ciphers, 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), 2019. Crossref

  2. Gorbenko Ivan, Kuznetsov Alexandr, Gorbenko Yurii, Pushkar'ov Andriy, Kotukh Yevgen, Kuznetsova Kateryna, Random S-Boxes Generation Methods for Symmetric Cryptography, 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), 2019. Crossref

  3. Krasnobaev Victor, Dyachenko Andrey, Kuznetsova Tetiana, Panchenko Volodymir, Ulianovska Yuliia, Methods for Monitoring and Diagnosing Data in the Residue Class, 2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), 2019. Crossref

  4. Kuznetsov Alexandr, Horkovenko Inna, Maliy Olena, Goncharov Nikita, Kuznetsova Tetiana, Kovalenko Nikolaj, Non-Binary Cryptographic Functions for Symmetric Ciphers, 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020. Crossref

Próximos Artículos

A Game Theoretic Cognitive Spectrum Sensing Scheme for IoT Networks Saida Rao Samudrala, Nageswara Rao Putta, Mahesh Babu Ravi, Venkata Sesha Sai Ramakrishna Komanduri A Secure Internet of Things Model Using Blockchain with Integrated Power Optimization Tirumala Venkateswarlu Vulavala, Riyazuddien Shaik, Khader Zelani Shaik , Mahamood Khan Pathan, Krishna Prasad Satamraju A Slotted Pentagon Shape Quad Band Two-Element Millimeter Wave MIMO Antenna using Theory of Characteristic Modes Parveez Shariff B G, Sameena Pathan, Pallavi R Mane, Tanweer Ali Design and Develop Low power memory controller for GC-eDRAM cell using ICG Shravan Chintam, Kaleem Fatima, Paidimarry Chandra sekhar Lighting up Data: The Future of Wireless Data Transfer with Li-Fi Technology Balaka Biswas, Aryan Nakhale , Aditya Roshan Sinha Design of Implantable Antennas for Biomedical Applications M Satish Kumar, Sivasubramanyam Medasani , Penchala Reddy Sura, Tathababu Addepalli, Jetti Chandra Sekhar Rao, J Prasanth Kumar, B.Y.V.N.R. Swamy, A L Siridhara Diffraction Problem with Time-Varying Boundary Conditions Fatih Erden A Proposed MIMO Antenna Design for Ultra-Wideband THz Applications Amin Al Ka'bi, Ali Mustafa Interconnection scheme for multi-protocols heterogeneous wireless communication system in civil airport Wei Zhang, He Li, Yuchu Ji, Yang Wang PROPAGATION OF VECTOR VORTEX BEAMS EXCITED BY A TERAHERTZ LASER DIELECTRIC RESONATOR Anrey Degtyarev, Mykola Dubinin, Vyacheslav Maslov, Konstantin Muntean, Oleg Svistunov DEVELOPMENT OF NOVEL CONFORMAL ARRAY ANTENNA FOR AIRBORNE APPLICATIONS Ch V Ravi Sankar, PVY Jayasree, Devana V.N Koteswara Rao , Mohammad Taj, Kolasani Rajkamal, Vegiraju Satya Sudha A Design of Microstrip Low-pass Filter using ground-plane coplanar waveguide (GCPW) Farah Mehdi Chemseddine, Elbouslemti Rahmouna, Vincent Didier Compact Inset-Fed Rectangular Patch antenna for C band Applications Albert William raj, K.S.Joseph Wilson Planar Antenna with Pattern Reconfigurability for IoT Applications Srinag A, S. Aruna, K.Srinivasa Naik A COMPACT 2X2 UWB MIMO ANTENNA WITH FUNNEL SHAPED STUB FOR ISOLATION ENHANCEMENT KARTHI J, Palanivelan Manickavelu, Mohanraj Sivagurunathan, Asokan Velu FLEXIBLE WIDE BAND TRAPEZOIDAL ANTENNA FOR ELECTROMAGENTIC HEAD IMAGING SYSTEM Vaithianathan V, Ramprabhu Sivasamy, RAMESH S, Chitra S Impact of supply voltage on SRAM cell power dissipation under different topologies Damodhar Rao M, Y.V. NARAYANA, V.V.K.D.V. PRASAD Defected Ground Square Patch Edge Truncated Polarization Reconfigurable Antenna Pritam Nikam, Jayendra Kumar, Akshay Bhosale, Achinta Baidya, Shahadev Hake An Asymmetrical Psi Shaped Multi-Band Antenna for Wireless Applications Penchala Reddy Sura, Padmaja Nimmagadda, Ch Jyotsna Rani, Tathababu Addepalli, Jagadeesh Babu Kamili, B.Y.V.N.R. Swamy Swamy, A Laxmana Siridhara, G JAGADEESWAR REDDY SMALL SCALE MIMO ANTENNA WITH HIGH ISOLATION FOR 5G COMMUNICATION DILIP KUMAR CHOUDHARY, Tanweer Ali, Rajendra Prasad P, Roshan Zameer Ahmed PERFORMANCE ANALYSIS OF ACHIEVABLE BIT RATES IN RIS-ASSISTED MASSIVE MIMO NETWORKS AT 28 GHZ BAND SHARINI DL, KANTHI M, RAVILLA DILLI EFFECT OF THICK VEGETATION COVER, BUILDING OBSTRUCTIONS, AND EARTH TERRAIN ON THE QUALITY AND PERFORMANCE OF THE GSM SIGNAL AT THE FEDERAL POLYTECHNIC ADO EKITI. Temitope John Alake, Ayodeji Bamisaye, Tolulope Tunji Oladimeji FOUR ELEMENT CIRCULAR PATCH MIMO ANTENNA WITH PROTRUDING GROUND STUB FOR 5G COMMUNICATION Rajalakshmi B, Chitra S DUAL-BAND BANDSTOP FILTERS BASED ON ULTRA THIN FREQUENCY SELECTIVE SURFACES Andrei Perov REAL-TIME IMPLEMENTATION OF LWT BASED NOVEL IR AND VI FUSION ALGORITHM USING RASPBERRY PI PLATFORM Lingamallu Naga Srinivasu, Sumanth Kumar Panguluri, Srinivasa Rao Kandula, Ponduri Vasanthi Fractal Based UWB-MIMO antenna with reconfigurable Band-Notching Characteristics Bharghava Punna, Mohd Sofiyan, N. Siddartha Reddy, Nagarani Bollam
Portal Digitalde Biblioteca Digital eLibros Revistas Referencias y Libros de Ponencias Colecciones Precios y Políticas de Suscripcione Begell House Contáctenos Language English 中文 Русский Português German French Spain