On evolutionary computation methods in cryptography

Evolutionary computation algorithms represent a range of problem-solving techniques based on principles of biological evolution, like natural selection and genetic inheritance. Such algorithms can be used to solve a variety of difficult problems, among which are those from the area of cryptography. Examples of such an approach include the evolving hash functions or creation of a new block cipher. First results in this area have emerged over 30 years ago, and in recent years there has been an increased interest in this area. Still, some problems like problem formulation and representation remain open. The purpose of this paper is to give a survey of cryptographic applications that can be developed with the help of evolutionary computation methods, and to address their applicability to the real-world scenarios.

[1]  A. Tragha,et al.  ICIGA: Improved Cryptography Inspired by Genetic Algorithms , 2006, 2006 International Conference on Hybrid Information Technology.

[2]  David Vidal,et al.  Evolutionary design of pseudorandom sequence generators based on cellular automata and its applicability in current cryptosystems , 2006, GECCO '06.

[3]  Xiangdong Yin,et al.  S box construction and result analysis based on optimal tabu-genetic algorithm , 2010, 2010 2nd International Conference on Education Technology and Computer.

[4]  Hua Chen,et al.  An Effective Genetic Algorithm for Self-Inverse S-Boxes , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[5]  Thomas Weise,et al.  Global Optimization Algorithms -- Theory and Application , 2009 .

[6]  Dengguo Feng,et al.  An Effective Genetic Algorithm for Self-Inverse S-Boxes , 2007 .

[7]  Dorothea Heiss-Czedik,et al.  An Introduction to Genetic Algorithms. , 1997, Artificial Life.

[8]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[9]  Nadia Nedjah,et al.  Multi-objective evolutionary hardware for RSA-based cryptosystems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[10]  Andrew Clark,et al.  Optimisation heuristics for cryptology , 1998 .

[11]  Nadia Nedjah,et al.  Computational Intelligence in Information Assurance and Security , 2007, Studies in Computational Intelligence.

[12]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[13]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[14]  Pedro Isasi,et al.  Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography , 2004 .

[15]  Hua Chen,et al.  An effective evolutionary strategy for bijective S-boxes , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[16]  Jonathan Katz,et al.  Introduction to Modern Cryptography: Principles and Protocols , 2007 .

[17]  Juan E. Tapiador,et al.  Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions , 2008, J. Inf. Sci. Eng..

[18]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .

[19]  John R. Koza,et al.  Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.

[20]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[21]  Juan E. Tapiador,et al.  Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming , 2006, 2006 IEEE International Conference on Evolutionary Computation.