510 research outputs found

    New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA

    Get PDF
    Congress on Evolutionary Computation. Portland, USA, 19-23 June 2004Recently, a simple way of creating very efficient distinguishers for cryptographic primitives such as block ciphers or hash functions, was presented by the authors. Here, this cryptanalysis attack is shown to be successful when applied over reduced round versions of the block cipher XTEA. Additionally, a variant of this genetic attack is introduced and its results over TEA shown to be the most powerful published to date

    Finding efficient nonlinear functions by means of genetic programming

    Get PDF
    7th International Conference, KES 2003. Proceedings, Part I. Oxford, UK, September 3-5, 2003The design of highly nonlinear functions is relevant for a number of different applications, ranging from database hashing to message authentication. But, apart from useful, it is quite a challenging task. In this work, we propose the use of genetic programming for finding functions that optimize a particular nonlinear criteria, the avalanche effect, using only very efficient operations, so that the resulting functions are extremely efficient both in hardware and in software.Supported by the Spanish Ministerio de Ciencia y Tecnologia research project TIC2002-04498-C05-4Publicad

    On the design of state-of-the-art pseudorandom number generators by means of genetic programming

    Get PDF
    Congress on Evolutionary Computation. Portland, EEUU, 19-23 June 2004The design of pseudorandom number generators by means of evolutionary computation is a classical problem. Today, it has been mostly and better accomplished by means of cellular automata and not many proposals, inside or outside this paradigm could claim to be both robust (passing all the statistical tests, including the most demanding ones) and fast, as is the case of the proposal we present here. Furthermore, for obtaining these generators, we use a radical approach, where our fitness function is not at all based in any measure of randomness, as is frequently the case in the literature, but of nonlinearity. Efficiency is assured by using only very efficient operators (both in hardware and software) and by limiting the number of terminals in the genetic programming implementation

    Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA

    Get PDF
    A simple way of creating new and very efficient distinguishers for cryptographic primitives, such as block ciphers or hash functions, is introduced. This technique is then successfully applied over reduced round versions of the block cipher TEA, which is proven to be weak with less than five cycles.This researchwas supported by project TIC2002-04498- C05-4 of the Spanish Ministerio de Ciencia y Tecnologia.Publicad

    Evolving hash functions by means of genetic programming

    Get PDF
    Proceedings of the 8th annual conference on Genetic and evolutionary computation. Seattle, Washington, USA, July 08-12, 2006The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fast hash functions. We use a fitness function based on a non-linearity measure, producing evolved hashes with a good degree of Avalanche Effect. Efficiency is assured by using only very fast operators (both in hardware and software) and by limiting the number of nodes. Using this approach, we have created a new hash function, which we call gp-hash, that is able to outperform a set of five human-generated, widely-used hash functions.This article has been financed by the Spanish founded research MCyT project OP:LINK, Ref:TIN2005-08818-C04-02.Publicad

    Prevalencia de factores asociados a la enfermedad cardiovascular y su relaciĂłn con el ausentismo laboral de los trabajadores de una entidad oficial

    Get PDF
    Introduction: Cardiovascular disease is the first cause of death in the world. This phenomenon is attributed to life styles, such a sedentarism, ingestion of high calorie foods, and alcohol and tobacco consumption. This leads to an increase in the rates of obesity, dyslipidaemia, and hypertension. These then become risk factors that directly affect the prevalence of disease and death of cardiovascular origin, which consequently represents a significant health problem in the working population. Objective: To determine the factors associated with cardiovascular disease and their relationship with work absenteeism in a government office in the City of Bogota, Colombia. Materials and methods: A descriptive study was carried out using the work records of 214 employees. Sociodemographic, clinical-cardiovascular, and work variables were also recorded. An analysis was performed on the independent variables and the outcome, and a logistic regression model was prepared using work absenteeism as a dependent variable. Results: The prevalences of the sample were: smoking, 13.1%; alcohol consumption, 35.1%; sedentarism, 39.7%; overweight or obese workers, 54.2%; and elevated total cholesterol, 43.9%. Treatment was being received for hypertension in 29.9%, with 4.7% for diabetes, and 21.5% for lipid disorders. Conclusion: The prevalence of risk factors associated with cardiovascular disease is similar to that found in other studies on the working population. The regression model showed that the variables marital status, obesity, treatment for hypertension, diastolic blood pressure level, and length of service, behaved as predictive variables of work absenteeism. © 2019 Sociedad Colombiana de Cardiología y Cirugía Cardiovascula

    Finding state-of-the-art non-cryptographic hashes with genetic programming

    Get PDF
    Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this paper, we use the Genetic Programming paradigm to evolve collision free and fast hash functions. For achieving robustness against collision we use a fitness function based on a non-linearity concept, producing evolved hashes with a good degree of Avalanche Effect. The other main issue, efficiency, is assured by using only very fast operators (both in hardware and software) and by limiting the number of nodes. Using this approach, we have created a new hash function, which we call gp-hash, that is able to outperform a set of five human-generated, widely-used hash functions.This article has been financed by the Spanish founded research MCyT project OP:LINK, Ref:TIN2005-08818-C04-02

    How to distinguish between a block cipher and a random permutation by lowering the input entropy

    Get PDF
    IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is explained. Additionally, we propose a genetic algorithm based implementation and show some preliminary results of these ideas on reduced rounds versions of the block cipher TEA

    DistribuciĂłn de cargas en una esfera mediante estrategias evolutivas

    Get PDF
    En este trabajo se plantea la resoluciĂłn mediante estrategias evolutivas de un problema clĂĄsico de la fĂ­sica, el problema de Thomson, consistente en distribuir n cargas iguales en la superficie de una esfera o, lo que es lo mismo, hallar la distribuciĂłn que hace mĂ­nimo el potencial electrostĂĄtico de las cargas. La dificultad de hallar este mĂ­nimo radica en el hecho de que el nĂșmero de las disposiciones estables aumentan exponencialmente con el nĂșmero de cargas. Hasta la fecha aĂșn no existe una funciĂłn que relacione de forma exacta el potencial mĂ­nimo con el nĂșmero de cargas, si bien se han propuesto aproximaciones asintĂłticas para dicha funciĂłn. El objetivo de este trabajo es encontrar un algoritmo que evite estas dificultades y permita calcular configuraciones para mĂĄs cargas con menor coste computacional. Como resultado se obtiene un mĂ©todo que mejora los estĂĄndares dentro de las estrategias evolutivas.Publicad
    • 

    corecore