Abstract
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.
Original language | English |
---|---|
Title of host publication | GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2003, PT II, PROCEEDINGS |
Editors | E CantuPaz, JA Foster, K Deb, LD Davis, R Roy, UM OReilly, HG Beyer, R Standish, G Kendall, S Wilson, M Hartman, J Wegener, D Dasgupta, MA Potter, AC Schultz, KA Dowsland, N Jonoska, J Miller |
Place of Publication | BERLIN |
Publisher | Springer |
Pages | 2022-2033 |
Number of pages | 12 |
ISBN (Print) | 3-540-40603-4 |
Publication status | Published - 2003 |
Event | 5th Annual Genetic and Evolutionary Computation Conference (GECCO 2003) - CHICAGO Duration: 12 Jul 2003 → 16 Jul 2003 |
Conference
Conference | 5th Annual Genetic and Evolutionary Computation Conference (GECCO 2003) |
---|---|
City | CHICAGO |
Period | 12/07/03 → 16/07/03 |