A characterisation of S-box fitness landscapes in cryptography

Domagoj Jakobovic, Stjepan Picek, Marcella S.R. Martins, Markus Wagner

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

9 Citations (Scopus)

Abstract

Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic algorithms. The design of high quality S-boxes is an interesting problem that attracts a lot of attention. Many attempts have been made in recent years to use heuristics to design S-boxes, but the results were often far from the previously known best obtained ones. Unfortunately, most of the effort went into exploring different algorithms and fitness functions while little attention has been given to the understanding why this problem is so difficult for heuristics. In this paper, we conduct a fitness landscape analysis to better understand why this problem can be difficult. Among other, we find that almost each initial starting point has its own local optimum, even though the networks are highly interconnected.

Original languageEnglish
Title of host publicationGECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference
Subtitle of host publicationProceedings of the 2019 Genetic and Evolutionary Computation Conference
Place of PublicationNew York
PublisherAssociation for Computing Machinery (ACM)
Pages285-293
Number of pages9
ISBN (Electronic)9781450361118
ISBN (Print)978-1-4503-6111-8
DOIs
Publication statusPublished - 2019
Event2019 Genetic and Evolutionary Computation Conference, GECCO 2019 - Prague, Czech Republic
Duration: 13 Jul 201917 Jul 2019

Publication series

NameGECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference

Conference

Conference2019 Genetic and Evolutionary Computation Conference, GECCO 2019
Country/TerritoryCzech Republic
CityPrague
Period13/07/1917/07/19

Keywords

  • Landscape analysis
  • Local area networks
  • Security
  • Substitution boxes

Fingerprint

Dive into the research topics of 'A characterisation of S-box fitness landscapes in cryptography'. Together they form a unique fingerprint.

Cite this