A method for generation of high-nonlinear S-boxes based on gradient descent
Matematičeskie voprosy kriptografii, Tome 5 (2014) no. 2, pp. 71-78 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

Criteria based on the analysis of the properties of vectorial Boolean functions for selection of substitutions (S-boxes) for symmetric cryptographic primitives are given. We propose an improved gradient descent method for increasing performance of nonlinear vectorial Boolean functions generation with optimal cryptographic properties. Substitutions generated by proposed method for the most common 8-bits input and output blocks have nonlinearity 104, $8$-uniformity and algebraic immunity 3.
@article{MVK_2014_5_2_a7,
     author = {O. V. Kazymyrov and V. N. Kazymyrova and R. V. Oliynykov},
     title = {A~method for generation of high-nonlinear {S-boxes} based on gradient descent},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {71--78},
     year = {2014},
     volume = {5},
     number = {2},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a7/}
}
TY  - JOUR
AU  - O. V. Kazymyrov
AU  - V. N. Kazymyrova
AU  - R. V. Oliynykov
TI  - A method for generation of high-nonlinear S-boxes based on gradient descent
JO  - Matematičeskie voprosy kriptografii
PY  - 2014
SP  - 71
EP  - 78
VL  - 5
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a7/
LA  - en
ID  - MVK_2014_5_2_a7
ER  - 
%0 Journal Article
%A O. V. Kazymyrov
%A V. N. Kazymyrova
%A R. V. Oliynykov
%T A method for generation of high-nonlinear S-boxes based on gradient descent
%J Matematičeskie voprosy kriptografii
%D 2014
%P 71-78
%V 5
%N 2
%U http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a7/
%G en
%F MVK_2014_5_2_a7
O. V. Kazymyrov; V. N. Kazymyrova; R. V. Oliynykov. A method for generation of high-nonlinear S-boxes based on gradient descent. Matematičeskie voprosy kriptografii, Tome 5 (2014) no. 2, pp. 71-78. http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a7/

[1] Crama Y., Hammer P. L., Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Encyclopedia of Mathematics and its Applications, Cambridge University Press, 2010 | MR | Zbl

[2] Oliynykov R., Kazymyrov O., “An impact of S-box Boolean function properties to strength of modern symmetric block ciphers”, Radio Engineering, 166, Kharkiv, 2011, 11–17

[3] Rijmen V., Cryptanalysis and design of iterated block ciphers, PhD Thesis, University of Leuven, 1997

[4] Kazymyrov O., Oliynykov R., Vectorial Boolean functions application for substitutions generation for symmetric cryptographic transformation, Applied Radio Electronics, Kharkiv, 2012 (In Russian)

[5] Budaghyan L., Kazymyrov O., “Verification of restricted EA-equivalence for vectorial Boolean functions”, Lect. Notes Comput. Sci., 7369, 2012, 108–118 | DOI | MR | Zbl

[6] Tesa Ř. P., “A new method for generating high non-linearity S-boxes”, Radioengineering, 19:1 (2010), 23–26

[7] Izbenko Y., Kovtun V., Kuznetsov A., The design of Boolean functions by modified hill climbing method, , 10.03.2013 http://eprint.iacr.org/2008/111.pdf

[8] Millan W., Clark A., Dawson E., “Boolean function design using hill climbing methods”, Lect. Notes Comput. Sci., 1587, 1999, 1–11 | DOI | Zbl

[9] Daemen J., Rijmen V., AES proposal: Rijndael, , 10.03.2013 http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf

[10] Logachev O. A., Salnikov A. A., Yaschenko V. V., Boolean functions in coding theory and cryptology, MCCME, Moscow, 2004 (In Russian) | MR

[11] Yu Y., Wang M., Li Y., Constructing differential 4-uniform permutations from know ones, , 10.03.2013 http://eprint.iacr.org/2011/047.pdf