Introduction to the applications of evolutionary computation in computer security and cryptography

被引:8
|
作者
Isasi, P [1 ]
Hernandez, JC [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
D O I
10.1111/j.0824-7935.2004.00244.x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Techniques taken from the field of Artificial Intelligence, especially Evolutionary Computation (Genetic Algorithms and Genetic Programming, but also others) are steadily becoming more and more present in the area of computer security, both in network/host security and in the very demanding area of cryptology. In recent years, many algorithms that take advantage of approaches based on Evolutionary Computation have been proposed, for example, in the design and analysis of a number of new cryptographic primitives, ranging from pseudo-random number generators to block ciphers, in the cryptanalysis of state-of-the-art cryptosystems, and in the detection of network attacking patterns, to name a few. There is a growing interest from the computer security community toward Evolutionary Computation techniques, as a result of these recent successes, but there still are a number of open problems in the field that should be addressed.
引用
收藏
页码:445 / 449
页数:5
相关论文
共 50 条
  • [21] Evolutionary computation techniques and their applications
    Michalewicz, Z
    Michalewicz, M
    1997 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT PROCESSING SYSTEMS, VOLS 1 & 2, 1997, : 14 - 25
  • [22] Statistical Analysis for Evolutionary Computation: An Introduction
    Wineberg, Mark
    PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTATION COMPANION (GECCO'12), 2012, : 895 - 916
  • [23] Introduction to the special issue on evolutionary computation
    Yao, X.
    Informatica, 1994, 18 (04):
  • [24] Statistical Analysis for Evolutionary Computation: Introduction
    Wineberg, Mark
    Christensen, Steffen
    GECCO-2010 COMPANION PUBLICATION: PROCEEDINGS OF THE 12TH ANNUAL GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2010, : 2413 - 2440
  • [25] Security of the GPT cryptosystem and its applications to cryptography
    Rashwan, Haitham
    Gabidulin, Ernst M.
    Honary, Bahram
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 937 - 946
  • [26] Advanced computer mathematics based cryptography and security technologies
    Kim, Jongsung
    Mu, Yi
    Obaidat, Mohammad S.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2512 - 2514
  • [27] Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
    Bufalo, Michele
    Bufalo, Daniele
    Orlando, Giuseppe
    COMPUTATION, 2023, 11 (04)
  • [28] Introduction to visualization for computer security
    Goodall, J. R.
    VIZSEC 2007, 2008, : 1 - 17
  • [29] Applications of evolutionary computation in drug design
    Gillet, VJ
    APPLICATIONS OF EVOLUTIONARY COMPUTATION IN CHEMISTRY, 2004, 110 : 133 - 152
  • [30] Special track on applications of evolutionary computation
    Rojo, Raúl Giráldez
    Balanza, Beatriz Pontes
    Proceedings of the ACM Symposium on Applied Computing, 2015, 13-17-April-2015