Introduction to the applications of evolutionary computation in computer security and cryptography

被引:8
|
作者
Isasi, P [1 ]
Hernandez, JC [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
D O I
10.1111/j.0824-7935.2004.00244.x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Techniques taken from the field of Artificial Intelligence, especially Evolutionary Computation (Genetic Algorithms and Genetic Programming, but also others) are steadily becoming more and more present in the area of computer security, both in network/host security and in the very demanding area of cryptology. In recent years, many algorithms that take advantage of approaches based on Evolutionary Computation have been proposed, for example, in the design and analysis of a number of new cryptographic primitives, ranging from pseudo-random number generators to block ciphers, in the cryptanalysis of state-of-the-art cryptosystems, and in the detection of network attacking patterns, to name a few. There is a growing interest from the computer security community toward Evolutionary Computation techniques, as a result of these recent successes, but there still are a number of open problems in the field that should be addressed.
引用
收藏
页码:445 / 449
页数:5
相关论文
共 50 条