Secret agents leave big footprints: How to plant a cryptographic trapdoor, and why you might not get away with it

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.

Original languageEnglish
Title of host publicationGENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2003, PT II, PROCEEDINGS
EditorsE CantuPaz, JA Foster, K Deb, LD Davis, R Roy, UM OReilly, HG Beyer, R Standish, G Kendall, S Wilson, M Hartman, J Wegener, D Dasgupta, MA Potter, AC Schultz, KA Dowsland, N Jonoska, J Miller
Place of PublicationBERLIN
PublisherSpringer
Pages2022-2033
Number of pages12
ISBN (Print)3-540-40603-4
Publication statusPublished - 2003
Event5th Annual Genetic and Evolutionary Computation Conference (GECCO 2003) - CHICAGO
Duration: 12 Jul 200316 Jul 2003

Conference

Conference5th Annual Genetic and Evolutionary Computation Conference (GECCO 2003)
CityCHICAGO
Period12/07/0316/07/03

Cite this