Show simple item record

dc.contributor.authorBlackledge, J.en
dc.contributor.authorBezobrazov, S.en
dc.contributor.authorTobin, P.en
dc.contributor.authorZamora, F.en
dc.contributor.editor-en
dc.date.accessioned2017-03-21T13:26:09Z
dc.date.available2017-03-21T13:26:09Z
dc.date.copyright2013
dc.date.issued2013-06
dc.identifier.citationBlackledge, J., Bezobrazov, S., Tobin, P. and Zamora, F. (2013), 'Cryptography using evolutionary computing', presented at 24th IET Irish Signals and Systems Conference (ISSC 2013), 20 - 21 Jun.en
dc.identifier.isbn978-1-84919-754-0en
dc.identifier.issn-en
dc.identifier.otherScienceen
dc.identifier.urihttps://research.thea.ie/handle/20.500.12065/1026
dc.description.abstractWe present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRNG), using evolutionary computing. Working with a system called Eureqa, designed by the Cornell Creative Machines Lab, we seed the system with natural noise sources obtained from data that can include atmospheric noise generated by radio emissions due to lightening, for example, radioactive decay, electronic noise and so on. The purpose of this is to `force' the system to output a result (a nonlinear function) that is an approximation to the input noise. This output is then treated as an iterated function which is subjected to a range of tests to check for potential cryptographic strength in terms of a positive Lyapunov exponent, maximum entropy, high cycle length, key diffusion characteristics etc. This approach provides the potential for generating an unlimited number of unique PRNG that can be used on a 1-to-1 basis. Typical applications include the encryption of data before it is uploaded onto the Cloud by a user that is provided with a personalised encryption algorithm rather than just a personal key using a `known algorithm' that may be subject to a `known algorithm attack' and/or is `open' to the very authorities who are promoting its use.en
dc.formatPdfen
dc.language.isoenen
dc.publisherSignals and Systems Conference (ISSC 2013), 24th IET Irishen
dc.subjectCoding and encryptionen
dc.subjectEvolutionary computingen
dc.subjectMultiple algorithmsen
dc.subjectPersonal encryption enginesen
dc.titleCryptography using evolutionary computingen
dc.typeConference Presentationen
dc.description.peerreviewYesen
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6621215&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A6620810%29en
dc.subject.departmentScienceen


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record