Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It

نویسندگان

  • John A. Clark
  • Jeremy L. Jacob
  • Susan Stepney
چکیده

This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Factoring Health Equations; Comment on “Do You Recommend an Interdisciplinary Field to Your Graduate Student?”

The International Journal of Health Policy and Management (IJHPM) is a new journal that aims to stimulate not only inter-disciplinary research relating to health, but even an entire new generation of such journals. The challenges of improving human health worldwide clearly suggest ‘why’ such a journal is needed, but ‘how’ bridges and junctions across fields of study towards this end might be fo...

متن کامل

قانون طلایی تدارک حمایت از دانش آموزان با نیازهای ویژه در کلاسهای فراگیر: از دیگران آنطور حمایت کنید که دوست دارید از شما حمایت کنند

Consider for a moment that the school system paid someone to be with you supporting you 8 hours a day, 5 days a week. Now, imagine that you had no say over who that support person was or how she or he supported you. Or imagine that someone regularly stopped into your place of employment to provide you with one-on-one support. This person was present for all your interactions, escorted you to th...

متن کامل

Trapdoor commitment schemes and their applications

Look, matey, I know a dead parrot when I see one, and I'm looking at one right now. Preface There are certainly one or two things about cryptography I have learned during my Ph.D. time. One thing I have noticed is that trapdoor commitments are a remarkable catalyst for the design of provably secure cryptographic protocols. Introduction Informally, commitment schemes can be described by lockable...

متن کامل

P14: How to Find a Talent?

Talents may be artistic or technical, mental or physical, personal or social. You can be a talented introvert or a talented extrovert. Learning to look for your talents in the right places and building those talents into skills and abilities might take some work, but going about it creatively will let you explore your natural abilities and find your innate talents. You’re not going to fin...

متن کامل

A review of agent-based modeling (ABM) concepts and some of its main applications in management science

We live in a very complex world where we face complex phenomena such as social norms and new technologies. To deal with such phenomena, social scientists often use reductionism approach where they reduce them to some lower-lever variables and model the relationships among them through a scheme of equations. This approach that is called equation based modeling (EBM) has some basic weaknesses in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003