Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming

In this work, we present a general scheme for the design of block ciphers by means of genetic programming. In this vein, we try to evolve highly nonlinear and efficient functions to be used for the key expansion and the F-function of a Feistel network. Following this scheme, we propose a new block cipher design called Wheedham, that operates on 512 bit blocks and keys of 256 bits, of which we offer its C code (directly translated from the GP Trees) and some preliminary security results.

[1]  Bruce Schneier,et al.  Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.

[2]  Jennifer Seberry,et al.  Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI , 1991, ASIACRYPT.

[3]  Miodrag J. Mihaljevic An improved key stream generator based on the programmable cellular automata , 1997, ICICS.

[4]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[5]  G. Marsaglia,et al.  Some Difficult-to-pass Tests of Randomness , 2022 .

[6]  Hideki Imai,et al.  A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation , 1998, Public Key Cryptography.

[7]  H. Feistel Cryptography and Computer Privacy , 1973 .

[8]  H. C. Williams,et al.  Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.

[9]  Roger M. Needham,et al.  TEA, a Tiny Encryption Algorithm , 1994, FSE.

[10]  Ralph Howard,et al.  Data encryption standard , 1987 .

[11]  Bruce Schneier,et al.  Related-Key Cryptanalysis of 3-WAY , 1997 .

[12]  Marcin Seredynski,et al.  Block cipher based on reversible cellular automata , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[13]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.

[14]  John R. Koza,et al.  Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.

[15]  Bruce Schneier,et al.  Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.

[16]  Réjane Forré,et al.  The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.

[17]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[18]  David J. Sager,et al.  The microarchitecture of the Pentium 4 processor , 2001 .

[19]  C. Adams,et al.  DESIGNING S-BOXES FOR CIPHERS RESISTANT TO DIFFERENTIAL CRYPTANALYSIS ( Extended , 1993 .

[20]  Shoji Miyaguchi,et al.  Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.

[21]  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application , 2001 .

[22]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.