Multi-objective optimisation of bijective s-boxes

, , & (2005) Multi-objective optimisation of bijective s-boxes. New Generation Computing, 23(3), pp. 201-218.

View at publisher

Description

In this paper we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes found are suitable for use directly in modern encryption algorithms.

Impact and interest:

21 citations in Scopus
17 citations in Web of Science®
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 44505
Item Type: Contribution to Journal (Journal Article)
Refereed: Yes
ORCID iD:
Dawson, Edwardorcid.org/0000-0002-1932-1061
Measurements or Duration: 18 pages
Keywords: Boolean Functions, Equivalence Classes, Evolutionary Computation, Nonlinearity
DOI: 10.1007/BF03037655
ISSN: 0288-3635
Pure ID: 34294183
Divisions: ?? 16 ??
Past > Schools > School of Software Engineering & Data Communications
Past > Institutes > Information Security Institute
Copyright Owner: Consult author(s) regarding copyright matters
Copyright Statement: This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the document is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recognise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to qut.copyright@qut.edu.au
Deposited On: 24 Aug 2011 22:12
Last Modified: 03 Mar 2024 06:40