skip to main content
10.1145/3583133.3596317acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Evolution of Walsh Transforms with Genetic Programming

Published: 24 July 2023 Publication History

Abstract

The design of Boolean functions which exhibit high-quality cryptography properties is a crucial aspect when implementing secure stream ciphers. To this end, several methods have been proposed to search for secure Boolean functions, and, among those, evolutionary algorithms play a prominent role. In this paper, Genetic Programming (GP) is applied for the evolution of Boolean functions in order to maximize one essential property for strong cryptography functions, namely non-linearity. Differently from other approaches, the evolution happens in the space of Walsh Transforms, instead of using a direct representation of the Boolean functions. Specifically, we evolve coefficients of the Walsh Transform to obtain a generic Walsh spectrum, from which it is possible, through spectral inversion, to obtain a pseudo-Boolean function that, consequently, can be mapped to (one of) the nearest Boolean one. Since that function might not be unique, we propose a strategy in which balancedness, another important cryptography property, is preserved as much as possible. To show that the evolutionary search is actually effective in this task, we evolved Boolean functions from 6 to 16 variables. The results show that not only GP is effective in evolving Boolean functions with high non-linearity, but also that balanced functions are discovered.

References

[1]
Behera, P. K., and Gangopadhyay, S. An improved hybrid genetic algorithm to construct balanced boolean function with optimal cryptographic properties. Evolutionary Intelligence 15, 1 (2022), 639--653.
[2]
Blank, J., and Deb, K. pymoo: Multi-objective optimization in python. IEEE Access 8 (2020), 89497--89509.
[3]
Carlet, C. Boolean functions for cryptography and coding theory.
[4]
Carlet, C., Crama, Y., and Hammer, P. L. Boolean functions for cryptography and error-correcting codes., 2010.
[5]
Carlet, C., Djurasevic, M., Jakobovic, D., Mariot, L., and Picek, S. Evolving constructions for balanced, highly nonlinear boolean functions. In Proceedings of the Genetic and Evolutionary Computation Conference (2022), pp. 1147--1155.
[6]
Clark, J. A., Jacob, J. L., Maitra, S., and Stănică, P. Almost boolean functions: The design of boolean functions by spectral inversion. Computational Intelligence 20, 3 (2004), 450--462.
[7]
Cohen, G. D., and Litsyn, S. N. On the covering radius of reed-muller codes. Discrete Mathematics 106 (1992), 147--155.
[8]
Hou, X.-d. On the norm and covering radius of the first-order reed-muller codes. IEEE Transactions on Information Theory 43, 3 (1997), 1025--1027.
[9]
Katz, J., and Lindell, Y. Introduction to modern cryptography. CRC press, 2020.
[10]
Koza, J. R. Genetic programming as a means for programming computers by natural selection. Statistics and computing 4, 2 (1994), 87--112.
[11]
Mariot, L., Jakobovic, D., Leporati, A., and Picek, S. Hyper-bent boolean functions and evolutionary algorithms. In European Conference on Genetic Programming (2019), Springer, pp. 262--277.
[12]
Mariot, L., and Leporati, A. A genetic algorithm for evolving plateaued cryptographic boolean functions. In International Conference on Theory and Practice of Natural Computing (2015), Springer, pp. 33--45.
[13]
Mariot, L., Picek, S., Jakobovic, D., Djurasevic, M., and Leporati, A. Evolutionary construction of perfectly balanced boolean functions. In 2022 IEEE Congress on Evolutionary Computation (CEC) (2022), IEEE, pp. 1--8.
[14]
Mesnager, S., and Mesnager. Bent functions, vol. 1. Springer, 2016.
[15]
Millan, W., Clark, A., and Dawson, E. An effective genetic algorithm for finding highly nonlinear boolean functions. In International conference on information and communications security (1997), Springer, pp. 149--158.
[16]
Miller, J. F., et al. An empirical study of the efficiency of learning boolean functions using a cartesian genetic programming approach. In Proceedings of the genetic and evolutionary computation conference (1999), vol. 2, pp. 1135--1142.
[17]
Picek, S., Jakobovic, D., and Golub, M. Evolving cryptographically sound boolean functions. In Proceedings of the 15th annual conference companion on Genetic and evolutionary computation (2013), pp. 191--192.
[18]
Picek, S., Jakobovic, D., Miller, J. F., Marchiori, E., and Batina, L. Evolutionary methods for the construction of cryptographic boolean functions. In European Conference on Genetic Programming (2015), Springer, pp. 192--204.
[19]
Virgolin, M. genepro, 9 2022.
[20]
Wilcoxon, F. Individual comparisons by ranking methods. Springer, 1992.
[21]
Zheng, Y., and Zhang, X.-M. Plateaued functions. In International Conference on Information and Communications Security (1999), Springer, pp. 284--300.

Cited By

View all
  • (2024)Evolutionary Computation Meets Stream ProcessingApplications of Evolutionary Computation10.1007/978-3-031-56852-7_24(377-393)Online publication date: 3-Mar-2024
  • (2023)Discovering Non-Linear Boolean Functions by Evolving Walsh Transforms with Genetic ProgrammingAlgorithms10.3390/a1611049916:11(499)Online publication date: 27-Oct-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '23 Companion: Proceedings of the Companion Conference on Genetic and Evolutionary Computation
July 2023
2519 pages
ISBN:9798400701207
DOI:10.1145/3583133
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 July 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. evolutionary computation
  2. evolutionary algorithms
  3. genetic programming
  4. cybersecurity
  5. cryptography
  6. walsh transform
  7. spectral inversion
  8. boolean functions
  9. stream ciphers
  10. non-linearity

Qualifiers

  • Research-article

Conference

GECCO '23 Companion
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)7
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Evolutionary Computation Meets Stream ProcessingApplications of Evolutionary Computation10.1007/978-3-031-56852-7_24(377-393)Online publication date: 3-Mar-2024
  • (2023)Discovering Non-Linear Boolean Functions by Evolving Walsh Transforms with Genetic ProgrammingAlgorithms10.3390/a1611049916:11(499)Online publication date: 27-Oct-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media