White Rose University Consortium logo
University of Leeds logo University of Sheffield logo York University logo

Secret Agents Leave Big Footprints: How to plant a cryptographic trapdoor, and why you might not get away with it

Clark, J.A., Jacob, J.L. and Stepney, S. (2003) Secret Agents Leave Big Footprints: How to plant a cryptographic trapdoor, and why you might not get away with it. In: Proceedings of the Genetic and Evolutionary Computation Conference 2003. GECCO 2003, July 12–16, 2003, Chicago, IL, USA. Lecture Notes in Computer Science, II (2724). Springer , Berlin / Heidelberg , pp. 2022-2033. ISBN 978-3-540-40603-7

Full text not available from this repository.

Abstract

This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.

Item Type: Proceedings Paper
Academic Units: The University of York > Computer Science (York)
Depositing User: York RAE Import
Date Deposited: 08 Apr 2009 16:04
Last Modified: 08 Apr 2009 16:04
Published Version: http://dx.doi.org/10.1007/3-540-45110-2_100
Status: Published
Publisher: Springer
Identification Number: 10.1007/3-540-45110-2_100
URI: http://eprints.whiterose.ac.uk/id/eprint/6117

Actions (login required)

View Item View Item