Clark, J.A., Jacob, J.L. and Stepney, S. (2003) Secret Agents Leave Big Footprints: How to plant a cryptographic trapdoor, and why you might not get away with it. In: Proceedings of the Genetic and Evolutionary Computation Conference 2003. GECCO 2003, July 12–16, 2003, Chicago, IL, USA. Lecture Notes in Computer Science, II (2724). Springer , Berlin / Heidelberg , pp. 2022-2033. ISBN 978-3-540-40603-7
Abstract
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.
Metadata
Item Type: | Proceedings Paper |
---|---|
Authors/Creators: |
|
Dates: |
|
Institution: | The University of York |
Academic Units: | The University of York > Faculty of Sciences (York) > Computer Science (York) |
Depositing User: | York RAE Import |
Date Deposited: | 08 Apr 2009 16:04 |
Last Modified: | 08 Apr 2009 16:04 |
Published Version: | http://dx.doi.org/10.1007/3-540-45110-2_100 |
Status: | Published |
Publisher: | Springer |
Series Name: | Lecture Notes in Computer Science |
Identification Number: | 10.1007/3-540-45110-2_100 |
Open Archives Initiative ID (OAI ID): | oai:eprints.whiterose.ac.uk:6117 |