Skip to main content

A New Angle: On Evolving Rotation Symmetric Boolean Functions

  • Conference paper
  • First Online:
Applications of Evolutionary Computation (EvoApplications 2024)

Abstract

Rotation symmetric Boolean functions represent an interesting class of Boolean functions as they are relatively rare compared to general Boolean functions. At the same time, the functions in this class can have excellent cryptographic properties, making them interesting for various practical applications. The usage of metaheuristics to construct rotation symmetric Boolean functions is a direction that has been explored for almost twenty years. Despite that, there are very few results considering evolutionary computation methods. This paper uses several evolutionary algorithms to evolve rotation symmetric Boolean functions with different properties. Despite using generic metaheuristics, we obtain results that are competitive with prior work relying on customized heuristics. Surprisingly, we find that bitstring and floating point encodings work better than the tree encoding. Moreover, evolving highly nonlinear general Boolean functions is easier than rotation symmetric ones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Some works also combine theory and search techniques, e.g., [12, 25].

  2. 2.

    One could still assume the hybrid mode where one 1) considers the equivalences that preserve the parameters of interest, 2) classify the functions under these equivalences, and 3) study each representative.

  3. 3.

    Note that the sum is calculated in \({\mathbb Z}\).

  4. 4.

    The algebraic degree \(deg_f\) of a Boolean function f is defined as the number of variables in the largest product term of the function’s algebraic normal form having a non-zero coefficient, see, e.g., [16]. The algebraic normal form is a unique representation where an n variable Boolean function can be considered to be a multivariate polynomial over \(\mathbb {F}_{2}\).

  5. 5.

    Evolutionary Computation Framework, http://solve.fer.hr/ECF/.

References

  1. Arora, S., Barak, B.: Computational Complexity: A Modern Approach, 1st edn. Cambridge University Press, USA (2009)

    Book  Google Scholar 

  2. Brownlee, J., et al.: Clonal selection algorithms. Swinburne University of Technology, Australia, Complex Intelligent Systems Laboratory (2007)

    Google Scholar 

  3. Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021). https://doi.org/10.1017/9781108606806

  4. Cutello, V., Nicosia, G., Pavone, M.: Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator. In: Proceedings of the 2006 ACM symposium on Applied computing, pp. 950–954 (2006)

    Google Scholar 

  5. Djurasevic, M., Jakobovic, D., Mariot, L., Picek, S.: A survey of metaheuristic algorithms for the design of cryptographic Boolean functions. Crypt. Commun. 15(6), 1171–1197 (2023). https://doi.org/10.1007/s12095-023-00662-2

  6. Fuller, J., Dawson, E., Millan, W.: Evolutionary generation of bent functions for cryptography. In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2003, Canberra, Australia, 8–12 December 2003, pp. 1655–1661. IEEE (2003)

    Google Scholar 

  7. Hansen, N., Müller, S.D., Koumoutsakos, P.: Reducing the time complexity of the derandomized evolution strategy with covariance matrix adaptation (CMA-ES). Evol. Comput. 11(1), 1–18 (2003)

    Article  Google Scholar 

  8. dong Hou, X.: On the norm and covering radius of the first-order reed-muller codes. IEEE Trans. Inform. Theory 43(3), 1025–1027 (1997). https://doi.org/10.1109/18.568715

  9. Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.): PPSN 2014. LNCS, vol. 8672. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2

    Book  Google Scholar 

  10. Husa, J., Dobai, R.: Designing bent Boolean functions with parallelized linear genetic programming. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, p. 1825–1832. GECCO 2017, Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3067695.3084220

  11. Karaboga, D., Gorkemli, B., Ozturk, C., Karaboga, N.: A comprehensive survey: artificial bee colony (ABC) algorithm and applications. Artif. Intell. Rev. 42, 21–57 (2014)

    Article  Google Scholar 

  12. Kavut, S., Maitra, S., Yucel, M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53(5), 1743–1751 (2007). https://doi.org/10.1109/TIT.2007.894696

    Article  MathSciNet  Google Scholar 

  13. Kavut, S., Yücel, M.D.: 9-variable boolean functions with nonlinearity 242 in the generalized rotation symmetric class. Inform. Comput. 208(4), 341–350 (2010). https://doi.org/10.1016/j.ic.2009.12.002, https://www.sciencedirect.com/science/article/pii/S0890540109002454

  14. Kerdock, A.: A class of low-rate nonlinear binary codes. Inf. Control 20(2), 182–187 (1972)

    Article  MathSciNet  Google Scholar 

  15. Liu, W.M., Youssef, A.: On the existence of \((10, 2, 7, 488)\) resilient functions. IEEE Trans. Inf. Theory 55(1), 411–412 (2009). https://doi.org/10.1109/TIT.2008.2008140

    Article  MathSciNet  Google Scholar 

  16. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. Elsevier, Amsterdam, North Holland (1977). ISBN 978-0-444-85193-2

    Google Scholar 

  17. Méaux, P., Journault, A., Standaert, F.-X., Carlet, C.: Towards stream ciphers for efficient FHE with low-noise ciphertexts. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 311–343. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49890-3_13

    Chapter  Google Scholar 

  18. Mesnager, S.: Bent Functions. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-32595-8

    Book  Google Scholar 

  19. Han, Y., Okamoto, T., Qing, S. (eds.): ICICS 1997. LNCS, vol. 1334. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0028456

    Book  Google Scholar 

  20. Olsen, J., Scholtz, R., Welch, L.: Bent-function sequences. IEEE Trans. Inf. Theory 28(6), 858–864 (1982)

    Article  MathSciNet  Google Scholar 

  21. Pant, M., Zaheer, H., Garcia-Hernandez, L., Abraham, A., et al.: Differential evolution: a review of more than two decades of research. Eng. Appl. Artif. Intell. 90, 103479 (2020)

    Article  Google Scholar 

  22. Paterson, K.: On codes with low peak-to-average power ratio for multicode CDMA. Inf. Theory IEEE Trans. 50, 550–559 (2004)

    Article  MathSciNet  Google Scholar 

  23. Picek, S., Jakobovic, D.: Evolving algebraic constructions for designing bent Boolean functions. In: Proceedings of the Genetic and Evolutionary Computation Conference 2016, pp. 781–788. GECCO 2016, Association for Computing Machinery, New York, NY, USA (2016). https://doi.org/10.1145/2908812.2908915

  24. Picek, S., Jakobovic, D.: Evolutionary computation and machine learning in security. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 1572–1601. GECCO 2022, Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3520304.3534087

  25. Picek, S., Marchiori, E., Batina, L., Jakobovic, D.: Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: Bartz-Beielstein, T., Branke, J., Filipič, B., Smith, J. (eds.) PPSN 2014. LNCS, vol. 8672, pp. 822–831. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10762-2_81

    Chapter  Google Scholar 

  26. Poli, R., Langdon, W.B., McPhee, N.F.: A Field Guide to Genetic Programming. lulu.com (2008)

    Google Scholar 

  27. Rothaus, O.: On “bent" functions. J. Comb. Theory Ser. A 20(3), 300–305 (1976)

    Article  Google Scholar 

  28. Stănică, P., Maitra, S., Clark, J.A.: Results on rotation symmetric bent and correlation immune Boolean functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 161–177. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-25937-4_11

    Chapter  Google Scholar 

  29. Stănică, P., Maitra, S.: Rotation symmetric Boolean functions-count and cryptographic properties. Discrete Appl. Math. 156(10), 1567–1580 (2008). https://doi.org/10.1016/j.dam.2007.04.029, https://www.sciencedirect.com/science/article/pii/S0166218X07001734

  30. Wang, Y., Gao, G., Yuan, Q.: Searching for cryptographically significant rotation symmetric Boolean functions by designing heuristic algorithms. Secur. Commun. Netw. 2022, 1–6 (2022). https://doi.org/10.1155/2022/8188533

  31. Yang, M., Meng, Q., Zhang, H.: Evolutionary design of trace form bent functions. Cryptology ePrint Archive, Paper 2005/322 (2005). https://eprint.iacr.org/2005/322

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Domagoj Jakobovic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Carlet, C., Durasevic, M., Gasperov, B., Jakobovic, D., Mariot, L., Picek, S. (2024). A New Angle: On Evolving Rotation Symmetric Boolean Functions. In: Smith, S., Correia, J., Cintrano, C. (eds) Applications of Evolutionary Computation. EvoApplications 2024. Lecture Notes in Computer Science, vol 14634. Springer, Cham. https://doi.org/10.1007/978-3-031-56852-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56852-7_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56851-0

  • Online ISBN: 978-3-031-56852-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics