Secret agents leave big footprints: how to plant a cryptographic trapdoor, and why you might not get away with it

  • Authors:
  • John A. Clark;Jeremy L. Jacob;Susan Stepney

  • Affiliations:
  • Department of Computer Science, University of York, York, U.K.;Department of Computer Science, University of York, York, U.K.;Department of Computer Science, University of York, York, U.K.

  • Venue:
  • GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.