Modified genetic algorithms for generating S-boxes with high nonlinearity
DOI:
https://doi.org/10.30837/rt.2024.2.217.08Keywords:
genetic algorithm, S-box, cryptography, nonlinearity, Walsh-Hadamard Spectrum, selection, mutation, cryptanalysis, optimization, data securityAbstract
This article discusses the use of modified genetic algorithms to generate S-boxes with high nonlinearity, which is critical for ensuring the security of cryptographic algorithms. S-boxes play a key role in providing resistance to cryptanalysis, in particular to linear and differential cryptanalysis attacks. In the course of the study, a series of experiments were conducted using a genetic algorithm modified by additional storage of the current population and the use of selection. This approach has significantly improved the efficiency of the algorithm compared to the classical genetic algorithm. The best results were achieved with the minimum number of instances in the population and the optimal number of mutations. It was found that the algorithm finds S-blocks with a probability of 99% with a nonlinearity of 104, which demonstrates its high efficiency. The results of the study showed that the modified algorithm is able to provide stable generation of S-boxes with the required attack resistance properties. The proposed method also proved to be flexible in parameter settings, which allows it to be adapted for various cryptographic applications. The paper also discusses the possibilities of further improving the algorithm, including the study of other mutation and selection methods, as well as parameter optimization to achieve even better results. Additionally, the possibility of using distributed computing to increase the speed of S-boxes generation is considered. The results of the study indicate the prospects of the proposed approach for creating attack-resistant cryptographic systems.
This study considered the use of genetic algorithms to generate S-boxes with high nonlinearity. The proposed approach was based on the use of an objective function with optimal parameters, which allowed achieving high efficiency in generating bioactive S-blocks.
The proposed algorithm showed high stability and efficiency in generating S-boxes with nonlinearity, which is confirmed by a 99% probability of achieving the goal. These results indicate the prospects of using genetic algorithms in cryptographic applications that require high resistance to attacks.
In future research, it is planned to further improve the algorithm by exploring other methods of mutation and selection, as well as optimizing parameters to achieve even better results. In addition, it is possible to use distributed computing to further speed up the process of generating S-boxes.
References
Mishra N., Hafizul Islam S., Zeadally S. A survey on security and cryptographic perspective of Industrial-Internet-of-Things // Internet of Things. 2024. Vol. 25. P. 101037.
Urooj S. et al. Cryptographic Data Security for Reliable Wireless Sensor Network // Alexandria Engineer-ing Journal. 2023. Vol. 72. P. 37–50.
Tiwari A. Chapter 14 – Cryptography in blockchain // Distributed Computing to Blockchain ; ed. Pandey R., Goundar S., Fatima S. Academic Press, 2023. P. 251–265.
A S C., S P M., R K P. Implementation of S-box for lightweight block cipher // 2023 3rd International Conference on Intelligent Technologies (CONIT). 2023. P. 1–4.
R M., V N.K. Optimized Implementation of S-box and Inverse S-box for PRESENT Lightweight Block Ci-pher // 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Network-ing Technologies (ViTECoN). 2023. P. 1–5.
Teja P.R., Sasamal T.N. Implementation of Efficient Serial Architecture for Prince Block Cipher with En-hanced Security // 2023 International Conference on System, Computation, Automation and Networking (ICSCAN). 2023. P. 1–6.
Grami A. Chapter 11 – Cryptography // Discrete Mathematics ; ed. Grami A. Academic Press, 2023. P. 197–210.
Milanič M., Servatius B., Servatius H. Chapter 8 – Codes and cyphers // Discrete Mathematics With Logic / ed. Milanič M., Servatius B., Servatius H. Academic Press, 2024. P. 163–179.
McLaughlin J. Applications of search techniques to cryptanalysis and the construction of cipher compo-nents: phd. University of York, 2012.
Álvarez-Cubero J. Vector Boolean Functions: applications in symmetric cryptography. 2015.
Burnett L.D. Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptog-raphy: phd. Queensland University of Technology, 2005.
Clark A.J. Optimisation heuristics for cryptology: phd. Queensland University of Technology, 1998.
Fuller J.E. Analysis of affine equivalent boolean functions for cryptography: phd. Queensland University of Technology, 2003.
Carlet C., Ding C. Nonlinearities of S-boxes // Finite Fields and Their Applications. 2007. Vol. 13, № 1. P. 121–135.
Ghosh A., Das S., Saha B. Chapter 6 - Nature-inspired optimization algorithms // Artificial Intel-ligence in Textile Engineering / ed. Ghosh A., Das S., Saha B. Woodhead Publishing, 2024. P. 171–231.
Tsai C.-W., Chiang M.-C. Chapter Seven - Genetic algorithm // Handbook of Metaheuristic Algo-rithms ; ed. Tsai C.-W., Chiang M.-C. Academic Press, 2023. P. 111–138.
Tsai C.-W., Chiang M.-C. Chapter Fifteen – Hybrid metaheuristic and hyperheuristic algorithms // Handbook of Metaheuristic Algorithms ; ed. Tsai C.-W., Chiang M.-C. Academic Press, 2023. P. 321–350.
Tesar P. A New Method for Generating High Non-linearity S-Boxes. Společnost pro radioel-ektronické inženýrství, 2010.
Ivanov G., Nikolov N., Nikova S. Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties // Cryptogr. Commun. 2016. Vol. 8, № 2. P. 247–276.
Clark J.A., Jacob J.L., Stepney S. The design of s-boxes by simulated annealing // Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753). 2004. Vol. 2. P. 1533–1537 Vol.2.
Kuznetsov A. et al. WHS Cost Function for Generating S-boxes // IEEE Int. Conf. Probl. Info-communications, Sci. Technol., PIC S T – Proc. Institute of Electrical and Electronics Engineers Inc., 2021. P. 434–438.
Kuznetsov A. et al. Opportunities to minimize hardware and software costs for implementing boolean functions in stream ciphers // Int. J. Comput. Research Institute of Intelligent Computer Systems, 2019. Vol. 18, № 4. P. 443–452.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).