Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Advances in Cryptology — EUROCRYPT'98
  3. Conference paper

Heuristic design of cryptographically strong balanced Boolean functions

  • Conference paper
  • First Online: 01 January 2006
  • pp 489–499
  • Cite this conference paper
Advances in Cryptology — EUROCRYPT'98 (EUROCRYPT 1998)
Heuristic design of cryptographically strong balanced Boolean functions
  • William Millan1,
  • Andrew Clark1 &
  • Ed Dawson1 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1403))

Included in the following conference series:

  • International Conference on the Theory and Applications of Cryptographic Techniques
  • 1077 Accesses

  • 109 Citations

Abstract

Advances in the design of Boolean functions using heuristic techniques are reported. A genetic algorithm capable of generating highly nonlinear balanced Boolean functions is presented. Hill climbing techniques are adapted to locate balanced, highly nonlinear Boolean functions that also almost satisfy correlation immunity. The definitions for some cryptographic properties are generalised, providing a measure suitable for use as a fitness function in a genetic algorithm seeking balanced Boolean functions that satisfy both correlation immunity and the strict avalanche criterion. Results are presented demonstrating the effectiveness of the methods.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties

Article 03 January 2021

Construction of Boolean Functions with Optimal Algebraic Immunity

Chapter © 2017

Studying Special Operators for the Application of Evolutionary Algorithms in the Seek of Optimal Boolean Functions for Cryptography

Chapter © 2022

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Cryptology
  • DNA computing and cryptography
  • Logic gates
  • Logic Design
  • Protein Design
  • Special Functions

References

  1. E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. In Advances in Cryptology — Crypto '90, Proceedings, LNCS, volume 537, pages 2–21. Springer-Verlag, 1991.

    Google Scholar 

  2. C. Carlet. Partially-Bent Functions. In Advances in Cryptology — Crypto '92, Proceedings, LNCS, volume 740, pages 280–291. Springer-Verlag, 1993.

    Google Scholar 

  3. A. Clark and E. Dawson. A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher. Cryptologia, 21(2):129–138, April 1997.

    Google Scholar 

  4. A. Clark, E. Dawson, and H. Bergen. Combinatorial Optimisation and the Knapsack Cipher. Cryptologia, 20(1):85–93, January 1996.

    MATH  Google Scholar 

  5. E. Dawson and A. Clark. Discrete Optimisation: A Powerful Tool for Cryptanalysis? In Proceedings of Pragocrypt '96, pages 425–451, 1996.

    Google Scholar 

  6. H. Dobbertin. Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity. In Fast Software Encryption, 1994 Leuven Workshop, LNCS, volume 1008, pages 61–74. Springer-Verlag, 1994.

    Google Scholar 

  7. T. Honda, T. Satoh, T. Iwata, and K. Kurosawa. Balanced Boolean functions satisfying PC(2) and very large degree. In Workshop on Selected Areas in Cryptology 1997, Workshop Record, pages 64–72, 1997.

    Google Scholar 

  8. X.-D. Hou. On the Norm and Covering Radius of the First-Order Reed-Muller Codes. IEEE Transactions on Information Theory, 43(3):1025–1027, May 1997.

    Article  MATH  Google Scholar 

  9. F.J. MacWilliams and N.J.A. Sloane. The Theory of Error Correcting Codes. North-Holland Publishing Company, Amsterdam, 1978.

    Google Scholar 

  10. M. Matsui. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology — Eurocrypt '93, Proceedings, LNCS, volume 765, pages 386–397. Springer-Verlag, 1994.

    Google Scholar 

  11. Robert A. J. Matthews. The use of genetic algorithms in cryptanalysis. Cryptologia, 17(2): 187–201, April 1993.

    Google Scholar 

  12. W. Millan, A. Clark, and E. Dawson. An Effective Genetic Algorithm for Finding Highly Nonlinear Boolean Functions. In First International Conference on Information and Communications Security, volume 1334 of Lecture Notes in Computer Science, pages 149–158. Springer-Verlag, 1997.

    Google Scholar 

  13. W. Millan, A. Clark, and E. Dawson. Smart Hill Climbing Finds Better Boolean Functions. In Workshop on Selected Areas in Cryptology 1997, Workshop Record, pages 50–63, 1997.

    Google Scholar 

  14. N.J. Patterson and D.H. Wiedemann. The Covering Radius of the (215,16) Reed-Muller Code is at least 16276. IEEE Transactions on Information Theory, 29(3):354–356, May 1983.

    Article  MATH  MathSciNet  Google Scholar 

  15. B. Preneel. Analysis and Design of Cryptographic Hash Functions. PhD thesis, Cathoic University of Leuven, 1994.

    Google Scholar 

  16. B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts, and J. Vandewalle. Propagation Characteristics of Boolean Functions. In Advances in Cryptology — Eurocrypt '90, Proceedings, LNCS, volume 473, pages 161–173. Springer-Verlag, 1991.

    Google Scholar 

  17. M. Schneider. On the Construction and Upper Bounds of Balanced and Correlation-immune Functions. In Workshop on Selected Areas in Cryptology 1997, Workshop Record, pages 73–87, 1997.

    Google Scholar 

  18. J. Seberry, X.-M. Zhang, and Y. Zheng. Nonlinearly balanced boolean functions and their propagation characteristics. In Advances in Cryptology — Crypto '93, Proceedings, LNCS, volume 773, pages 49–60. Springer-Verlag, 1994.

    Google Scholar 

  19. J. Seberry, X.-M. Zhang, and Y. Zheng. On Constructions and Nonlinearity of Correlation Immune Functions. In Advances in Cryptology — Eurocrypt '93, Proceedings, LNCS, pages 181–199. Springer-Verlag, 1994.

    Google Scholar 

  20. T. Siegenthaler. Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Transactions on Information Theory, 30(5):776–780, September 1984.

    Article  MATH  MathSciNet  Google Scholar 

  21. J.J. Son, J.I. Lim, S. Chee, and S.H. Sung. Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions, 1997. Submtted to Information Processing Letters.

    Google Scholar 

  22. R. Spillman. Cryptanalysis of Knapsack Ciphers using Genetic Algorithms. Cryptologia, 17(4):367–377, October 1993.

    MATH  Google Scholar 

  23. R. Spillman, M. Janssen, B. Nelson, and M. Kepner. Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia, 17(1):31–44, January 1993.

    Google Scholar 

  24. D.R. Stinson. Resilient functions and large sets of orthogonal arrays. Congressus Numerantium, 92:105–110, 1993.

    MathSciNet  Google Scholar 

  25. A.F. Webster and S.E. Tavares. On the Design of S-Boxes. In Advances in Cryptology — Crypto '85, Proceedings, LNCS, volume 218, pages 523–534. Springer-Verlag, 1986.

    Google Scholar 

  26. G-Z. Xiao and J.L. Massey. A Spectral Characterization of Correlation-Immune Combining Functions. IEEE Transactions on Information Theory, 34(3):569–571, May 1988.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Information Security Research Center, Queensland University of Technology, GPO Box 2434, 4001, Brisbane, Queensland, Australia

    William Millan, Andrew Clark & Ed Dawson

Authors
  1. William Millan
    View author publications

    Search author on:PubMed Google Scholar

  2. Andrew Clark
    View author publications

    Search author on:PubMed Google Scholar

  3. Ed Dawson
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Kaisa Nyberg

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Millan, W., Clark, A., Dawson, E. (1998). Heuristic design of cryptographically strong balanced Boolean functions. In: Nyberg, K. (eds) Advances in Cryptology — EUROCRYPT'98. EUROCRYPT 1998. Lecture Notes in Computer Science, vol 1403. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054148

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/BFb0054148

  • Published: 25 May 2006

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64518-4

  • Online ISBN: 978-3-540-69795-4

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Genetic Algorithm
  • Boolean Function
  • Truth Table
  • Hill Climbing
  • Bend Function

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature