Abstract
Rotation symmetric Boolean functions represent an interesting class of Boolean functions as they are relatively rare compared to general Boolean functions. At the same time, the functions in this class can have excellent cryptographic properties, making them interesting for various practical applications. The usage of metaheuristics to construct rotation symmetric Boolean functions is a direction that has been explored for almost twenty years. Despite that, there are very few results considering evolutionary computation methods. This paper uses several evolutionary algorithms to evolve rotation symmetric Boolean functions with different properties. Despite using generic metaheuristics, we obtain results that are competitive with prior work relying on customized heuristics. Surprisingly, we find that bitstring and floating point encodings work better than the tree encoding. Moreover, evolving highly nonlinear general Boolean functions is easier than rotation symmetric ones.
Notes
- 1.
- 2.
One could still assume the hybrid mode where one 1) considers the equivalences that preserve the parameters of interest, 2) classify the functions under these equivalences, and 3) study each representative.
- 3.
Note that the sum is calculated in \({\mathbb Z}\).
- 4.
The algebraic degree \(deg_f\) of a Boolean function f is defined as the number of variables in the largest product term of the function’s algebraic normal form having a non-zero coefficient, see, e.g., [16]. The algebraic normal form is a unique representation where an n variable Boolean function can be considered to be a multivariate polynomial over \(\mathbb {F}_{2}\).
- 5.
Evolutionary Computation Framework, http://solve.fer.hr/ECF/.
References
Arora, S., Barak, B.: Computational Complexity: A Modern Approach, 1st edn. Cambridge University Press, USA (2009)
Brownlee, J., et al.: Clonal selection algorithms. Swinburne University of Technology, Australia, Complex Intelligent Systems Laboratory (2007)
Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021). https://doi.org/10.1017/9781108606806
Cutello, V., Nicosia, G., Pavone, M.: Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator. In: Proceedings of the 2006 ACM symposium on Applied computing, pp. 950–954 (2006)
Djurasevic, M., Jakobovic, D., Mariot, L., Picek, S.: A survey of metaheuristic algorithms for the design of cryptographic Boolean functions. Crypt. Commun. 15(6), 1171–1197 (2023). https://doi.org/10.1007/s12095-023-00662-2
Fuller, J., Dawson, E., Millan, W.: Evolutionary generation of bent functions for cryptography. In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2003, Canberra, Australia, 8–12 December 2003, pp. 1655–1661. IEEE (2003)
Hansen, N., Müller, S.D., Koumoutsakos, P.: Reducing the time complexity of the derandomized evolution strategy with covariance matrix adaptation (CMA-ES). Evol. Comput. 11(1), 1–18 (2003)
dong Hou, X.: On the norm and covering radius of the first-order reed-muller codes. IEEE Trans. Inform. Theory 43(3), 1025–1027 (1997). https://doi.org/10.1109/18.568715
Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.): PPSN 2014. LNCS, vol. 8672. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2
Husa, J., Dobai, R.: Designing bent Boolean functions with parallelized linear genetic programming. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, p. 1825–1832. GECCO 2017, Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3067695.3084220
Karaboga, D., Gorkemli, B., Ozturk, C., Karaboga, N.: A comprehensive survey: artificial bee colony (ABC) algorithm and applications. Artif. Intell. Rev. 42, 21–57 (2014)
Kavut, S., Maitra, S., Yucel, M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53(5), 1743–1751 (2007). https://doi.org/10.1109/TIT.2007.894696
Kavut, S., Yücel, M.D.: 9-variable boolean functions with nonlinearity 242 in the generalized rotation symmetric class. Inform. Comput. 208(4), 341–350 (2010). https://doi.org/10.1016/j.ic.2009.12.002, https://www.sciencedirect.com/science/article/pii/S0890540109002454
Kerdock, A.: A class of low-rate nonlinear binary codes. Inf. Control 20(2), 182–187 (1972)
Liu, W.M., Youssef, A.: On the existence of \((10, 2, 7, 488)\) resilient functions. IEEE Trans. Inf. Theory 55(1), 411–412 (2009). https://doi.org/10.1109/TIT.2008.2008140
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. Elsevier, Amsterdam, North Holland (1977). ISBN 978-0-444-85193-2
Méaux, P., Journault, A., Standaert, F.-X., Carlet, C.: Towards stream ciphers for efficient FHE with low-noise ciphertexts. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 311–343. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49890-3_13
Mesnager, S.: Bent Functions. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-32595-8
Han, Y., Okamoto, T., Qing, S. (eds.): ICICS 1997. LNCS, vol. 1334. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0028456
Olsen, J., Scholtz, R., Welch, L.: Bent-function sequences. IEEE Trans. Inf. Theory 28(6), 858–864 (1982)
Pant, M., Zaheer, H., Garcia-Hernandez, L., Abraham, A., et al.: Differential evolution: a review of more than two decades of research. Eng. Appl. Artif. Intell. 90, 103479 (2020)
Paterson, K.: On codes with low peak-to-average power ratio for multicode CDMA. Inf. Theory IEEE Trans. 50, 550–559 (2004)
Picek, S., Jakobovic, D.: Evolving algebraic constructions for designing bent Boolean functions. In: Proceedings of the Genetic and Evolutionary Computation Conference 2016, pp. 781–788. GECCO 2016, Association for Computing Machinery, New York, NY, USA (2016). https://doi.org/10.1145/2908812.2908915
Picek, S., Jakobovic, D.: Evolutionary computation and machine learning in security. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 1572–1601. GECCO 2022, Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3520304.3534087
Picek, S., Marchiori, E., Batina, L., Jakobovic, D.: Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.) PPSN 2014. LNCS, vol. 8672, pp. 822–831. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2_81
Poli, R., Langdon, W.B., McPhee, N.F.: A Field Guide to Genetic Programming. lulu.com (2008)
Rothaus, O.: On “bent" functions. J. Comb. Theory Ser. A 20(3), 300–305 (1976)
Stănică, P., Maitra, S., Clark, J.A.: Results on rotation symmetric bent and correlation immune Boolean functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 161–177. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-25937-4_11
Stănică, P., Maitra, S.: Rotation symmetric Boolean functions-count and cryptographic properties. Discrete Appl. Math. 156(10), 1567–1580 (2008). https://doi.org/10.1016/j.dam.2007.04.029, https://www.sciencedirect.com/science/article/pii/S0166218X07001734
Wang, Y., Gao, G., Yuan, Q.: Searching for cryptographically significant rotation symmetric Boolean functions by designing heuristic algorithms. Secur. Commun. Netw. 2022, 1–6 (2022). https://doi.org/10.1155/2022/8188533
Yang, M., Meng, Q., Zhang, H.: Evolutionary design of trace form bent functions. Cryptology ePrint Archive, Paper 2005/322 (2005). https://eprint.iacr.org/2005/322
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Carlet, C., Durasevic, M., Gasperov, B., Jakobovic, D., Mariot, L., Picek, S. (2024). A New Angle: On Evolving Rotation Symmetric Boolean Functions. In: Smith, S., Correia, J., Cintrano, C. (eds) Applications of Evolutionary Computation. EvoApplications 2024. Lecture Notes in Computer Science, vol 14634. Springer, Cham. https://doi.org/10.1007/978-3-031-56852-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-56852-7_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-56851-0
Online ISBN: 978-3-031-56852-7
eBook Packages: Computer ScienceComputer Science (R0)