Introduction to the applications of evolutionary computation in computer security and cryptography

被引:8
|
作者
Isasi, P [1 ]
Hernandez, JC [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
D O I
10.1111/j.0824-7935.2004.00244.x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Techniques taken from the field of Artificial Intelligence, especially Evolutionary Computation (Genetic Algorithms and Genetic Programming, but also others) are steadily becoming more and more present in the area of computer security, both in network/host security and in the very demanding area of cryptology. In recent years, many algorithms that take advantage of approaches based on Evolutionary Computation have been proposed, for example, in the design and analysis of a number of new cryptographic primitives, ranging from pseudo-random number generators to block ciphers, in the cryptanalysis of state-of-the-art cryptosystems, and in the detection of network attacking patterns, to name a few. There is a growing interest from the computer security community toward Evolutionary Computation techniques, as a result of these recent successes, but there still are a number of open problems in the field that should be addressed.
引用
收藏
页码:445 / 449
页数:5
相关论文
共 50 条
  • [41] Special Issue on Cryptography and Its Applications in Information Security
    El Assad, Safwan
    Lozi, Rene
    Puech, William
    APPLIED SCIENCES-BASEL, 2022, 12 (05):
  • [42] Digital Signatures Security Using Cryptography for Industrial Applications
    Sheshasaayee, Ananthi
    Anandapriya, B.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 379 - 382
  • [43] IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
    Balogh, Stefan
    Gallo, Ondrej
    Ploszek, Roderik
    Spacek, Peter
    Zajac, Pavol
    ELECTRONICS, 2021, 10 (21)
  • [44] An introduction to evolutionary algorithms and their applications
    Coello, CAC
    ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 425 - 442
  • [45] Computer vision for security applications
    Sage, K
    Young, S
    32ND ANNUAL 1998 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1998, : 210 - 215
  • [46] Security applications of computer vision
    Sage, K
    Young, S
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 1999, 14 (04) : 19 - 24
  • [47] Introduction to the feature section on Optical Chaos and Applications to Cryptography
    Donati, S
    Mirasso, CR
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2002, 38 (09) : 1138 - 1140
  • [49] Competitive advantages of evolutionary computation for industrial applications
    Kordon, AK
    Kalos, AN
    Castillo, FA
    Jordaan, EM
    Smits, GF
    Kotanchek, ME
    2005 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-3, PROCEEDINGS, 2005, : 166 - 173
  • [50] Applications of Evolutionary Computation in Web Information Filtering
    Liu Yiming
    Yao Min
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 409 - 413