首页 | 本学科首页   官方微博 | 高级检索  
     


Multi-objective optimisation of bijective s-boxes
Authors:Joanne Fuller  William Millan  Ed Dawson
Affiliation:(1) ISRC, QUT, GPO Box 2434, 4001 Brisbane, Qld, Australia
Abstract:In this paper we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes found are suitable for use directly in modern encryption algorithms. Joanne Fuller, Ph.D.: She is a research associate at the Information Security Institute of Queensland University of Technology in Brisbane, Australia. She received her Ph.D. from out in 2004. William Millan, Ph.D.: He is a postdoctoral research fellow at the Information Security Institute of Queensland University of Technology in Brisbane, Australia. He pioneered the use of Evolutionary Computation techniques to develop new cryptographic primitives, notably new Boolean functions and S-boxes for block and stream ciphers, and has published many papers in this area. Ed Dawson, Ph.D.: He is the Director of the Information Security Institute of Queensland University of Technology in Brisbane, Australia. He has published more than 200 papers in Crypto conferences and Journals. He has served as Program Committee Member for more than 50 International Conferences in Cryptology and Network Security. He is currently a member of the Board of Directors of International Association for Cryptologic Research (IACR).
Keywords:Crypytography  Bijective S-boxes  Nonlinearity  Autocorrelation  Linear Redundancy  Finite Field  Heuristic Construction
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号