Evolving Boolean Functions Satisfying Multiple Criteria John A Clark, Jeremy L Jacob and Susan Stepney (University of York,UK) Subhamoy Maitra (Indian.

Slides:



Advertisements
Similar presentations
Heuristic Search techniques
Advertisements

G5BAIM Artificial Intelligence Methods
1 Transportation problem The transportation problem seeks the determination of a minimum cost transportation plan for a single commodity from a number.
Uniqueness of Optimal Mod 3 Circuits for Parity Frederic Green Amitabha Roy Frederic Green Amitabha Roy Clark University Akamai Clark University Akamai.
Copyright © Cengage Learning. All rights reserved.
1 Application of Combinatorial Mathematics to Cryptology: A Personal Journey Ed Dawson Information Security Institute Queensland University of Technology.
CmpE 104 SOFTWARE STATISTICAL TOOLS & METHODS MEASURING & ESTIMATING SOFTWARE SIZE AND RESOURCE & SCHEDULE ESTIMATING.
1 12. Principles of Parameter Estimation The purpose of this lecture is to illustrate the usefulness of the various concepts introduced and studied in.
Introducción a la Optimización de procesos químicos. Curso 2005/2006 BASIC CONCEPTS IN OPTIMIZATION: PART II: Continuous & Unconstrained Important concepts.
The General Linear Model Or, What the Hell’s Going on During Estimation?
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: The FIR Adaptive Filter The LMS Adaptive Filter Stability and Convergence.
Gizem ALAGÖZ. Simulation optimization has received considerable attention from both simulation researchers and practitioners. Both continuous and discrete.
Classification and Prediction: Regression Via Gradient Descent Optimization Bamshad Mobasher DePaul University.
Block ciphers 1 Session 3. Contents Design of block ciphers Non-linear transformations 2/25.
1 Optimisation Although Constraint Logic Programming is somehow focussed in constraint satisfaction (closer to a “logical” view), constraint optimisation.
Two-Stage Optimisation in the Design of Boolean Functions John A Clark and Jeremy L Jacob Dept. of Computer Science University of York, UK
Assumptions in the Use of Heuristic Optimisation in Cryptography John A Clark Dept. of Computer Science University of York, UK
Ch 5.1: Review of Power Series
Linear Models Tony Dodd January 2007An Overview of State-of-the-Art Data Modelling Overview Linear models. Parameter estimation. Linear in the.
Reporter : Mac Date : Multi-Start Method Rafael Marti.
Heuristic Optimisation in Design and Analysis John A Clark University of York, UK
Secret agents leave big footprints: how to plant a trapdoor in a cryptographic function and why you might not get away with it. GECCO 2003 John A Clark,
MAE 552 – Heuristic Optimization
Matrix sparsification and the sparse null space problem Lee-Ad GottliebWeizmann Institute Tyler NeylonBynomial Inc. TexPoint fonts used in EMF. Read the.
Fault Injection and a Timing Channel on an Analysis Technique John A Clark and Jeremy L Jacob Dept. of Computer Science University of York, UK
MAE 552 – Heuristic Optimization Lecture 10 February 13, 2002.
16.5 Introduction to Cost- based plan selection Amith KC Student Id: 109.
Protocols are Programs Too: Using GAs to Evolve Secure Protocols John A Clark Dept. of Computer Science University of York, UK
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
D Nagesh Kumar, IIScOptimization Methods: M1L4 1 Introduction and Basic Concepts Classical and Advanced Techniques for Optimization.
Challenging Assumptions in the Use of Heuristic Search Techniques in Cryptography John A Clark Dept. of Computer Science University of York, UK
Problem Warping and Computational Dynamics in the Solution of NP-hard Problems John A Clark Dept. of Computer Science University of York, UK
Name: Mehrab Khazraei(145061) Title: Penalty or Exterior penalty function method professor Name: Sahand Daneshvar.
Introduction to Simulated Annealing 22c:145 Simulated Annealing  Motivated by the physical annealing process  Material is heated and slowly cooled.
Separate multivariate observations
Metaheuristics The idea: search the solution space directly. No math models, only a set of algorithmic steps, iterative method. Find a feasible solution.
Elements of the Heuristic Approach
Cryptanalysis. The Speaker  Chuck Easttom  
The Marriage Problem Finding an Optimal Stopping Procedure.
Chapter 10 Review: Matrix Algebra
Vilalta&Eick: Informed Search Informed Search and Exploration Search Strategies Heuristic Functions Local Search Algorithms Vilalta&Eick: Informed Search.
Block ciphers 2 Session 4. Contents Linear cryptanalysis Differential cryptanalysis 2/48.
Cryptography, Attacks and Countermeasures Lecture 4 –Boolean Functions John A Clark and Susan Stepney Dept. of Computer Science University of York, UK.
(Spline, Bezier, B-Spline)
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Deterministic vs. Random Maximum A Posteriori Maximum Likelihood Minimum.
1 Lesson 8: Basic Monte Carlo integration We begin the 2 nd phase of our course: Study of general mathematics of MC We begin the 2 nd phase of our course:
Yaomin Jin Design of Experiments Morris Method.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Design of an Evolutionary Algorithm M&F, ch. 7 why I like this textbook and what I don’t like about it!
Simulated Annealing.
Response surfaces. We have a dependent variable y, independent variables x 1, x 2,...,x p The general form of the model y = f(x 1, x 2,...,x p ) +  Surface.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
SUPA Advanced Data Analysis Course, Jan 6th – 7th 2009 Advanced Data Analysis for the Physical Sciences Dr Martin Hendry Dept of Physics and Astronomy.
Thursday, May 9 Heuristic Search: methods for solving difficult optimization problems Handouts: Lecture Notes See the introduction to the paper.
Feedback Linearization Presented by : Shubham Bhat (ECES-817)
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Principles of Parameter Estimation.
Weikang Qian. Outline Intersection Pattern and the Problem Motivation Solution 2.
Single-solution based metaheuristics. Outline Local Search Simulated annealing Tabu search …
Local Search and Optimization Presented by Collin Kanaley.
Trees Example More than one variable. The residual plot suggests that the linear model is satisfactory. The R squared value seems quite low though,
한국정보통신대학교 천정희 Nonlinear Resilient Functions Jung Hee Cheon Information and Communications University (ICU)
Chapter 2-OPTIMIZATION G.Anuradha. Contents Derivative-based Optimization –Descent Methods –The Method of Steepest Descent –Classical Newton’s Method.
Linear Models Tony Dodd. 21 January 2008Mathematics for Data Modelling: Linear Models Overview Linear models. Parameter estimation. Linear in the parameters.
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography & Pseudo-Random Coding Li ShujunLi Shujun 1, Li Qi 2, Li.
Department of Mathematics National Institute of Technology, Warangal
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Chapter 2 Minimum Variance Unbiased estimation
Heuristic search INT 404.
Collaborative Filtering Matrix Factorization Approach
Presentation transcript:

Evolving Boolean Functions Satisfying Multiple Criteria John A Clark, Jeremy L Jacob and Susan Stepney (University of York,UK) Subhamoy Maitra (Indian Statistical Institute,Kolcatta,India) William Millan (SRC Queensland University of Technology,Brisbane, Australia)

Overview Optimisation Boolean function design Underpinning approach. Correlation immunity Linear change of basis Higher-order immunity via change of basis. Propagation criteria. Conclusions and future work.

Optimisation Subject of huge practical importance. An optimisation problem may be stated as follows: Find the value x that maximises the function z(y) over D. Example: maximise z(x)=-x 2 +8x-12, over x=0…100. Can use calculus to give us x=4 as the answer with z(x)=4. Given a domain D and a function z: D   find x in D such that z(x)=sup{z(y): y in D}

Local Optimisation - Hill Climbing Let the current solution be x. Define the neighbourhood N(x) to be the set of solutions that are ‘close to x’ If possible, move to a neighbouring solution that improves the value of z(x), otherwise stop. Choose any y as next solution provided z(y) >= z(x) loose hill-climbing Choose y as next solution such that z(y)=sup{z(v): v in N(x)} steepest gradient ascent

Local Optimisation - Hill Climbing x0x0 x1x1 x2x2 z(x) Neighbourhood of a point x might be N(x)={x+1,x-1} Hill-climb goes x 0  x 1  x 2 since z(x 0 ) z(x 3 ) and gets stuck at x 2 (local optimum) x opt Really want to obtain x opt x3x3

Simulated Annealing x0x0 x1x1 x2x2 z(x) Allows non-improving moves so that it is possible to go down x 11 x4x4 x5x5 x6x6 x7x7 x8x8 x9x9 x 10 x 12 x 13 x in order to rise again to reach global optimum Details of annealing are not that important for this talk – other global optimisation techniques could be used – but annealing has proved very effective.

What’s the paper about? There are many desirable properties for a Boolean functions in cryptography: balance, high non-linearity, low autocorrelation, high algebraic degree, correlation immunity of reasonable order, propagation immunity etc. The paper seeks to convince you of the following: Optimisation is a flexible tool for the design of Boolean functions with multiple desirable properties. We will consider two types of search domains: D= balanced Boolean functions; and D=sets of vectors that are Walsh (Autocorrelation) zeroes

Boolean Function Design A Boolean function For present purposes we shall use the polar representation f(x) x Will talk only about balanced functions where there are equal numbers of 1s and -1s.

Preliminary Definitions Definitions relating to a Boolean function f of n variables Walsh Hadamard Linear function L  (x)=  1 x 1  …   n x n L  (x)=(-1) L  (x) (polar form)

Preliminary Definitions Non-linearity Auto-correlation For present purposes we need simply note that these can be easily evaluated given a function f. They can therefore be used as the functions to be optimised. Traditionally they are.

Basic Functions Using Parseval’s Theorem Parseval’s Theorem Loosely, push down on F(  ) 2 for some particular  and it appears elsewhere. Suggests that arranging for uniform values of F(  ) 2 will lead to good non-linearity. (Bent functions achieve this but we are concerned with balanced functions.) This is the initial motivation for our new cost function family NEW FUNCTION! a b c Pythagoras: a 2 +b 2 =c 2

Moves Preserving Balance Start with balanced (but otherwise random) solution. Move strategy preserves balance (Millan et al) Neighbourhood of a particular function f is the set of all functions obtained by exchanging (flipping) any two dissimilar values. Here we have swapped f(2) and f(4) f(x) x g(x) 1 Note that neighbouring functions have close non-linearity and autocorrelation – some degree of continuity.

Simple Hill Climbing Result Even simple hill-climbing can be used to good effect. By perturbing a 15 variable balanced Boolean function of non-linearity (obtained by modifying Patterson- Wiedemann functions) and hill-climbing we were able to obtain a non-linearity of (best known non-linearity so far for 15 variable balanced functions)

Getting in the Right Area Actually minimising this cost function family doesn’t give good results! But – it is very good at getting in the right area. Method is: Using simulated annealing minimise the cost function given (for given parameter values of X and R). Let the resulting function be f sa Now hill-climb with respect to non-linearity (Nonlinearity Targeted technique - NLT); OR…. Now hill-climb with respect to autocorrelation (Autocorrelation Targeted technique - ACT)

Best Profiles NLT ACT (n,degree,nonlinearity,autocorrelation)

Autocorrelation-related results In 1995 Zheng and Zhang introduced the two global avalanche criteria (autocorrelation and sum-of-squares). Autocorrelation bounds now receiving more attention. Best construction results due to Maitra. For n=8 both techniques (NLT and ACT) achieve lower autocorrelation than that by any previous construction or conjecture. Autocorrelation results

Sum of Squares Conjectures Zheng and Zhang introduced sum-of-squares: Use  f as cost function. Oddly, earlier functions actually gave better results!

Correlation Immunity- Direct Method See to punish lack of correlation immunity and low non-linearity Sub-optimal

Linear Transformation for CI(1) If Rank(WZ f )=n then form the matrix B f whose rows are linearly independent vectors from WZ f. Let C f =B f -1 and let f’(x)=f(C f x) Resulting function f’ has same nonlinearity and algebraic degree and is also CI(1). Can apply this method to basic functions generated earlier. Let WZ f be the set of Walsh zeroes of the function f Method used earlier by Maitra and Pasalic

Best Profiles Overall (direct and direct plus change of basis) Optimal non-linearity. Typically very low autocorrelation values Some previous bests: (6,1,2,24,64) (7,1,5,56,64) [Sarkar and Maitra, 2000] (8,1,6,116,80) [Maitra and Pasalic,2002] (7,2,4,56) [ Pasalic Maitra Johansson and Sarkar,2000] (8,1,6,116,24) seems very good, no (8,0,*,116,16) yet discovered.

Generalising to Higher Order Immunity Basis transformation can achieve higher order immunity functions too. Need to find subset of the Walsh zeroes such that for any k elements (1<=k<=m)  i 1,  i 2,…,  i k sums to a Walsh zero

Generalising to Higher Order Immunity Consider an initial permutation pwz of the Walsh zeroes We will view the first n elements of a permutation as a candidate basis How should we punish deviation from requirements?

Generalising to Higher Order Immunity By punishing lack of suitable rank and punishing relevant sums not being Walsh zeroes. For example for m=2 we can define the number of misses as the number of two-fold sums that are not Walsh zeroes Cost function is

Generalising to Higher Order Immunity This approach has allowed basis sets to be evolved with second order correlation immunity (e.g. some direct attempts to achieve (7,2,4,56) failed had required degree and non-linearity but were not CI(2). Basis transformations allowed (7,2,4,56) to be attained. Seems difficult to attain bases which give CI(3) but attempts are currently under way.

Transforming for Propagation Criteria Change of basis approaches can also be applied to attain PC(k)-ness. Essentially now work with autocorrelation zeroes. Only a small amount of work has been done on this but results are encouraging: Can use linear transform on (8,0,6,116,24) derived earlier to attain (8,0,6,116,24) with PC(1). Also possible to transform for higher order PC(k) in much the same fashion as before (but now we have autocorrelation misses).

Transforming for Propagation Criteria Have tried this on earlier functions to seek out bases of autocorrelation zeroes to give PC(2) functions. Prior to 1997 the highest algebraic degree achieved for a PC(2) function was n/2 (for Bent functions). Satoh et al [1998] gave constructions on n=L+2 L -1 input bits with algebraic degree n-L-1 (and similar for balanced functions). They note that deg(f) <=n-1 gives a trivial upper bound on degree. Searches for 2 nd -order change of basis reveals an earlier function on 6 variables which is PC(2) with degree 5. Support=c65b4d405ceb91f1

PC(k) and CI(m) Together Can use a cost function that punishes lack of PC(k)-ness, lack of CI(k)-ness and low non-linearity

Conclusions Optimisation is a very useful tool for Boolean function design and exploration. Have generated functions with excellent profiles over several criteria. The method would seem extensible. Basic functions have very special properties. Theory helps! Change of basis very useful.

Further Work Spectrum based approaches –some work already completed. Planting trapdoors! Who says you have to be honest about the cost function used. We said the method is extensible – there is nothing to stop it being maliciously extended! Some work on S-box generalisations completed. More on PC(k)CI(m) – very little attempted so far. Extend work on basis for higher order immunities. Other work on metaheuristic search and protocols, block cipher and public key cryptanalysis.