Utilizing Evolutionary Computation Methods for the Design of S-Boxes

Among the most important components of many contemporary ciphers are the substitution boxes (S-boxes) and a great amount of research is devoted to their study. In this paper, a new methodology for designing strong S-boxes is proposed and two evolutionary computation methods, the particle swarm optimization and the differential evolution algorithm are employed to tackle the problem at hand. The obtained results are promising and indicate that this novel approach is effective

[1]  Rainer Storn,et al.  Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..

[2]  William Millan,et al.  How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.

[3]  William Millan,et al.  Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes , 1999, ICICS.

[4]  Michael N. Vrahatis,et al.  Particle swarm optimization for integer programming , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[5]  Maurice Clerc,et al.  The particle swarm - explosion, stability, and convergence in a multidimensional complex space , 2002, IEEE Trans. Evol. Comput..

[6]  Michael N. Vrahatis,et al.  Particle swarm optimization for minimax problems , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[7]  Michael N. Vrahatis,et al.  Recent approaches to global optimization problems through Particle Swarm Optimization , 2002, Natural Computing.

[8]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[9]  Vassilis P. Plagianakos,et al.  Parallel evolutionary training algorithms for “hardware-friendly” neural networks , 2002, Natural Computing.

[10]  Susan Stepney,et al.  Searching for cost functions , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[11]  M. N. Vrahatis,et al.  Evolutionary computation based cryptanalysis: A first study , 2005 .

[12]  Michael N. Vrahatis,et al.  Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers , 2019, Appl. Math. Comput..

[13]  Mauro Birattari,et al.  Swarm Intelligence , 2012, Lecture Notes in Computer Science.

[14]  Singiresu S. Rao Engineering Optimization : Theory and Practice , 2010 .