510 research outputs found
New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
Congress on Evolutionary Computation. Portland, USA, 19-23 June 2004Recently, a simple way of creating very efficient distinguishers for cryptographic primitives such as block ciphers or hash functions, was presented by the authors. Here, this cryptanalysis attack is shown to be successful when applied over reduced round versions of the block cipher XTEA. Additionally, a variant of this genetic attack is introduced and its results over TEA shown to be the most powerful published to date
Finding efficient nonlinear functions by means of genetic programming
7th International Conference, KES 2003. Proceedings, Part I. Oxford, UK, September 3-5, 2003The design of highly nonlinear functions is relevant for a number of different applications, ranging from database hashing to message authentication. But, apart from useful, it is quite a challenging task. In this work, we propose the use of genetic programming for finding functions that optimize a particular nonlinear criteria, the avalanche effect, using only very efficient operations, so that the resulting functions are extremely efficient both in hardware and in software.Supported by the Spanish Ministerio de Ciencia y Tecnologia research project
TIC2002-04498-C05-4Publicad
On the design of state-of-the-art pseudorandom number generators by means of genetic programming
Congress on Evolutionary Computation. Portland, EEUU, 19-23 June 2004The design of pseudorandom number generators by means of evolutionary computation is a classical problem. Today, it has been mostly and better accomplished by means of cellular automata and not many proposals, inside or outside this paradigm could claim to be both robust (passing all the statistical tests, including the most demanding ones) and fast, as is the case of the proposal we present here. Furthermore, for obtaining these generators, we use a radical approach, where our fitness function is not at all based in any measure of randomness, as is frequently the case in the literature, but of nonlinearity. Efficiency is assured by using only very efficient operators (both in hardware and software) and by limiting the number of terminals in the genetic programming implementation
Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA
A simple way of creating new and very efficient distinguishers for cryptographic primitives, such as block ciphers or hash functions, is introduced. This technique is then successfully applied over reduced round versions of the block cipher TEA, which is proven to be weak with less than five cycles.This researchwas supported by project TIC2002-04498- C05-4 of the Spanish Ministerio
de Ciencia y Tecnologia.Publicad
Evolving hash functions by means of genetic programming
Proceedings of the 8th annual conference on Genetic and evolutionary computation. Seattle, Washington, USA, July 08-12, 2006The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fast hash functions. We use a fitness function based on a non-linearity measure, producing evolved hashes with a good degree of Avalanche Effect. Efficiency is assured by using only very fast operators (both in hardware and software) and by limiting the number of nodes. Using this approach, we have created a new hash function, which we call gp-hash, that is able to outperform a set of five human-generated, widely-used hash functions.This article has been financed by the Spanish founded research MCyT project OP:LINK, Ref:TIN2005-08818-C04-02.Publicad
Prevalencia de factores asociados a la enfermedad cardiovascular y su relaciĂłn con el ausentismo laboral de los trabajadores de una entidad oficial
Introduction: Cardiovascular disease is the first cause of death in the world. This phenomenon is attributed to life styles, such a sedentarism, ingestion of high calorie foods, and alcohol and tobacco consumption. This leads to an increase in the rates of obesity, dyslipidaemia, and hypertension. These then become risk factors that directly affect the prevalence of disease and death of cardiovascular origin, which consequently represents a significant health problem in the working population. Objective: To determine the factors associated with cardiovascular disease and their relationship with work absenteeism in a government office in the City of Bogota, Colombia. Materials and methods: A descriptive study was carried out using the work records of 214 employees. Sociodemographic, clinical-cardiovascular, and work variables were also recorded. An analysis was performed on the independent variables and the outcome, and a logistic regression model was prepared using work absenteeism as a dependent variable. Results: The prevalences of the sample were: smoking, 13.1%; alcohol consumption, 35.1%; sedentarism, 39.7%; overweight or obese workers, 54.2%; and elevated total cholesterol, 43.9%. Treatment was being received for hypertension in 29.9%, with 4.7% for diabetes, and 21.5% for lipid disorders. Conclusion: The prevalence of risk factors associated with cardiovascular disease is similar to that found in other studies on the working population. The regression model showed that the variables marital status, obesity, treatment for hypertension, diastolic blood pressure level, and length of service, behaved as predictive variables of work absenteeism. © 2019 Sociedad Colombiana de CardiologĂa y CirugĂa Cardiovascula
Finding state-of-the-art non-cryptographic hashes with genetic programming
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this paper, we use the Genetic Programming paradigm to evolve collision free and fast hash functions. For achieving robustness against collision we use a fitness function based on a non-linearity concept, producing evolved hashes with a good degree of Avalanche Effect. The other main issue, efficiency, is assured by using only very fast operators (both in hardware and software) and by limiting the number of nodes. Using this approach, we have created a new hash function, which we call gp-hash, that is able to outperform a set of five human-generated, widely-used hash functions.This article has been financed by the Spanish founded research MCyT project
OP:LINK, Ref:TIN2005-08818-C04-02
How to distinguish between a block cipher and a random permutation by lowering the input entropy
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is explained. Additionally, we propose a genetic algorithm based implementation and show some preliminary results of these ideas on reduced rounds versions of the block cipher TEA
DistribuciĂłn de cargas en una esfera mediante estrategias evolutivas
En este trabajo se plantea la resoluciĂłn mediante estrategias evolutivas de un problema clĂĄsico de la fĂsica, el problema de Thomson, consistente en distribuir n cargas iguales en la superficie de una esfera o, lo que es lo mismo, hallar la
distribuciĂłn que hace mĂnimo el potencial electrostĂĄtico de las cargas. La dificultad de hallar este mĂnimo radica en el hecho de
que el nĂșmero de las disposiciones estables aumentan exponencialmente con el nĂșmero de cargas. Hasta la fecha aĂșn no existe una funciĂłn que relacione de forma exacta el potencial mĂnimo con el nĂșmero de cargas, si bien se han propuesto aproximaciones asintĂłticas para dicha funciĂłn. El objetivo de este trabajo es encontrar un algoritmo que evite estas dificultades y permita calcular configuraciones para mĂĄs cargas con menor coste computacional. Como resultado se obtiene un mĂ©todo que mejora los estĂĄndares dentro de las estrategias evolutivas.Publicad
- âŠ