Evolutionary computation in cryptography and security
|
|
- Josephine Hart
- 5 years ago
- Views:
Transcription
1 Evolutionary computation in cryptography and security SoSySec seminar: Artificial Intelligence and Security Rennes, Domagoj Jakobović FER, University of Zagreb
2 Overview What about EC? Cryptographic motivation Genetic programming Boolean functions S-boxes One-class intrusion detection Software gp.zemris.fer.hr 2/38
3 Evolutionary computation EC: a research area within computer science that draws inspiration from the process of natural evolution Evolutionary algorithms: subset of EC, population based metaheuristic optimization methods that use biology inspired mechanisms like selection, crossover or mutation Genetic Algorithm (GA), Holland, Tree based Genetic Programming (GP), Koza, Cartesian Genetic Programming (CGP), Miller, Evolution Strategy (ES), Rechenberg, Schwefel, 1970s. found application in numerous fields the topic today: cryptography and security gp.zemris.fer.hr 3/38
4 Optimization of cryptographic primitives Cryptographic primitive is a part of a cryptographic tool used to provide information security (a low-level cryptographic component that is frequently used) modern cryptography relies mostly on definitions and proofs, but there are nevertheless many primitives used today that do not have rigorous proofs examples of primitives: Boolean functions S-boxes (substitution boxes) PRNGs (pseudo-random number generators) addition chains primitives designed/optimized for information security and resilience to attacks gp.zemris.fer.hr 4/38
5 Side channel attacks Implementation attacks: all attacks that do not aim at the weaknesses of the algorithm itself, but on the actual implementations on cryptographic devices sources: power, sound, light, electromagnetic radiation, etc. among the most powerful known attacks against cryptographic devices common types: side channel attacks and fault injection attacks Side channel attacks are passive and non-invasive attacks examples: power analysis attacks to infer the key or plaintext properties may be known that increase resilience to these attacks gp.zemris.fer.hr 5/38
6 Problem 1: Boolean functions important cryptographic primitive, often used in stream ciphers as the source of nonlinearity in cryptography, a Boolean function needs to fulfill a number of properties: to be used in filter generators: balancedness, high nonlinearity, high algebraic degree, high algebraic immunity, high fast algebraic immunity to be used in combiner generators, additionally required a good value of correlation immunity as a part of the side-channel attack countermeasure (masking) it needs to have low Hamming weight and high correlation immunity to be of practical importance: at least 13 inputs three main design options: algebraic constructions, random search, heuristics gp.zemris.fer.hr 6/38
7 Boolean function optimization search space size: 2^(2^n) How to represent a function? truth table form: string of bits of length 2^n Boolean function with 8 inputs: search space size is 2^(256) larger inputs: very hard to optimize in truth table form the best results: using genetic programming (GP) Boolean function with 2 inputs gp.zemris.fer.hr 7/38
8 Digression: : Genetic programming What is GP? an attempt of automatic programming How does it work? maintains a set (population) of possible solutions programs (individuals) every individual has a quality assesment the fitness What does it do? simulates evolution: worse individuals are eliminated, better ones survive simulates genetic material exchange: better individuals make new ones with time, population gets better and better When does it end? when a good enough solution is found when we're out of time gp.zemris.fer.hr 8/38
9 Solution representation most common: tree based tree elements: leaves (terminals) input variables (as given), constants, actions (turn, move, operate ) tree value program output inner nodes (function) need to be chosen/defined! function examples: arithmetic (+,-,*,/,sin,cos, log, sqrt, pow, exp ), logical (AND, OR, NOT ), conditional (ifgte, IF ), loops... gp.zemris.fer.hr 9/38
10 Initial population most often: created randomly * * + cos * + cos x 1 x gp.zemris.fer.hr 10/38
11 Evolution! each solution is evaluated according to the fitness function programs usually simulated over a number of test cases apply selection many variants, same idea: better solutions have a greater probability of surviving and then the most important element: genetic operators crossover: creating new solutions with existing ones combining (good?) parts of individuals intensification: exploiting promising regions of seach space mutation: random change diversification: finding new regions of search space many many variants for both operators gp.zemris.fer.hr 11/38
12 Crossover: create something new at tleast two individuals (parents) combine and make a new solution (child) gp.zemris.fer.hr 12/38
13 Crossover: create something new most often: exchange randomly selected subtrees (subtree crossover) gp.zemris.fer.hr 13/38
14 Mutation: can it get any better most often: replace a randomly selected subtree (subtree mutation) gp.zemris.fer.hr 14/38
15 GP for Boolean functions terminals: input variables (x 1,..., x n ) inner nodes: Boolean primitives (AND, OR, NOT, XOR, IF,...) set the desired cryptographic properties a problem of its own: designing efficient fitness function repeat many times! beats any other representation at least for reasonable number of inputs gp.zemris.fer.hr 15/38
16 Boolean function optimization example gp.zemris.fer.hr 16/38
17 Evolving constructions of Boolean functions Could we use evolutionary computation to evolve algebraic constructions? Example: evolve secondary algebraic constructions that result in bent (max. nonlinearity) Boolean functions take 4 existing bent functions of 4 inputs (easy to construct) add two inputs combine in a function totalling in 6 inputs (slightly less easy to construct) an example construction: ((((v1 XNOR f0) OR (f3 AND f0)) XOR ((f1 XOR v0) XNOR v1)) AND2 ((v0 AND2 f2) AND2 ((f0 XNOR f3) XOR (f1 AND2 v1)))) optimize the evolved construction to maximize nonlinearity and show that it holds for any existing input functions! and for any number of inputs! empirically proven for up to 24 inputs gp.zemris.fer.hr 17/38
18 Boolean function construction evolution example gp.zemris.fer.hr 18/38
19 Problem 2: S-boxesS natural extension from the Boolean function case S-boxes (Substitution Boxes): vectorial Boolean functions often used in block ciphers as a source of nonlinearity design problem: much more difficult! S-box of dimension m x n has m inputs and n output Boolean functions 2 x 2 S-box gp.zemris.fer.hr 19/38
20 S-box properties many properties of interest: balancedness, high nonlinearity, low δ-uniformity, high algebraic degree, etc. there are properties that algebraic constructions do not consider properties related with the side-channel resistance will usually have poor values if S-boxes are constructed with algebraic constructions the task: evolve S-boxes that have good side channel resistance while maintaining other properties optimal gp.zemris.fer.hr 20/38
21 S-boxes side channel related properties Transparency order: cryptographic property of S-boxes introduced by Prouff in the higher the transparency order is, the lower is the S-box resistance to the DPA attacks new definition in 2015! Confusion coefficient low confusion coecient values (also referred to as high collision values) make side-channel attacks harder, i.e. they may require greater number of traces or SNR to yield the correct key candidate gp.zemris.fer.hr 21/38
22 S-box properties we are also interested in implementation properties like power, area, and latency algebraic constructions usually do not consider such properties evolve S-boxes with good cryptographic properties that are hardware-friendly multiobjective problems (trade-off in different properties) gp.zemris.fer.hr 22/38
23 S-box optimization when m = n, we can represent S-boxes as permutations, i.e., with all values between 0 and 2^n -1 (where n is the dimension of the S-box) the S-box is always bijective and we do not need to concern with the balancedness property when m > n, permutation encoding is not adequate GP to the rescue: m x n S-box represented as n independent trees good results when m >> n another variant: CGP Cartesian GP instead of a tree, solution represented as a graph offers multiple outputs natural mapping to S-box gp.zemris.fer.hr 23/38
24 CGP structure resulting genotype: gp.zemris.fer.hr 24/38
25 CGP structure (primjer CGP) gp.zemris.fer.hr 25/38
26 Cellular automata defined S-boxesS another approach: evolve S-boxes in form of cellular automata (CA) rules also used in practice (Keccak cipher) GP evolves a Boolean function that is used as a local CA rule example rule: v i (t+1) = v i (t) OR v i-1 (t) v3 v2 v1 v0 t t better results than permutation and basic GP/CGP for some S-box sizes (5x5, 6x6, 7x7) additional benefit: optimize for smaller number of gates (smaller area, power, latency) gp.zemris.fer.hr 26/38
27 example evolved rule: ((v2 NOR NOT(v4)) XOR v1) 5x5 rule with optimal nonlinearity and di fferential uniformity gp.zemris.fer.hr 27/38
28 CA rule evolution Evolved CA rule for the 5x5 S-box gp.zemris.fer.hr 28/38
29 Problem 3: Security application intrusion detection Intrusion detection: process of monitoring the events occurring in a computer system or network and analyzing them for intrusions attempts to bypass the security mechanisms of a computer or network common approaches: supervised/unsupervised classification (machine learning) GP can be used in classification, with either decision tree classifier regression tree classifier our example: use regression GP as a one-class classifier gp.zemris.fer.hr 29/38
30 Digression: : Symbolic regression Problem example: physical process modelling electronic circuit response model (Arbitrary-Angle Unmitered Microstrip Bend) short term load forecasting cryptographic element response if the model is known: choose/optimize model parameters somewhat simpler problem what if the model is not known? surrogate model: neural net, SVM, expert system... building a model with genetic programming symbolic regression gp.zemris.fer.hr 30/38
31 The symbolic regression problem task: discover the symbolic form of the model no assumptions of the unknown function! (right ) x? f(x) f(x) x gp.zemris.fer.hr 31/38
32 Symbolic regression with GP evolve individuals using arithmetic functions as tree elements individuals (models) are evaluated on input data measures: MSE, RMSE, MAE, MAPE... many uses and application examples popular software packages: Eureqa, DTReg, different solvers example: SRM application gp.zemris.fer.hr 32/38
33 One-class classification for intrusion detection use regression GP as one-class classifier assumption: only 'normal' class data available for training learn a model (function) that forces the output to a certain output range e.g. [1, 2], [4, 5], [8, 9]; same range for all normal examples also, penalize 'trivial' models reward the use of all features test the model on unseen data containing anomalies (intrusions) outputs falling outside the defined range are classified as anomalies! results: comparable to one-class SVM (mainly) median of F1 measure ~0.82 (this weekend) improve reliability with ensembles under heavy construction gp.zemris.fer.hr 33/38
34 Available software How do I test all these examples myself? ECF Evolutionary computation framework ECF is a C++ framework intended for application of any type of evolutionary computation: project concerning evolutionary computation and cryptology: (under constant development) gp.zemris.fer.hr 34/38
35 Instead of a conclusion... EC proved to be successful in cryptography: when there exist no other, specialized approaches to include new properties of interest to optimize to assess the quality of some other method to produce "good-enough'' solutions not a magic wand requires both experience and some knowledge of the problem to produce competitive results outlook: combination with machine learning approaches for security applications gp.zemris.fer.hr 35/38
36 Acknowledgements Thanks to: Stjepan Picek Annelie Heuser EC team at FER Zagreb gp.zemris.fer.hr 36/38
37 References General Evolutionary Computation Framework ( EC group at FER/UNIZG ( Boolean functions Picek, Stjepan; Carlet, Claude; Guilley, Sylvain; Miller, Julian F.; Jakobović, Domagoj. Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography // Evolutionary computation. 24 (2016), 4; Picek, Stjepan; Jakobović, Domagoj; Miller, Julian; Batina, Lejla; Čupić, Marko. Cryptographic Boolean functions: One output, many design criteria // Applied soft computing. 40 (2016) ; Picek, Stjepan; Batina, Lejla; Jakobović, Domagoj. Evolving DPA-Resistant Boolean Functions // Lecture Notes in Computer Science (2014) ; Picek, Stjepan; Jakobović, Domagoj. Evolving Algebraic Constructions for Designing Bent Boolean Functions // Proceedings of the Genetic and Evolutionary Computation Conference GECCO ACM Picek, Stjepan; Marchiori, Elena; Batina, Lejla; Jakobović, Domagoj. Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography- Relevant Boolean Functions. // Lecture Notes in Computer Science (2014); gp.zemris.fer.hr 37/38
38 References S-boxes Stjepan Picek, Marko Cupic, and Leon Rotim. A New Cost Function for Evolution of S-boxes. Evolutionary Computation, Winter 2016, Vol. 24, No. 4, Picek, Stjepan; Jakobovic, Domagoj; Miller, Julian; Batina, Lejla. Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes // Genetic and Evolutionary Computation Conf. GECCO Picek, Stjepan; Ege, Baris; Papagiannopoulos, Kostas; Batina, Lejla; Jakobović, Domagoj. Optimality and beyond: The case of 4 4 S-boxes // IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2014) Picek, Stjepan; Ege, Baris; Batina, Lejla; Jakobović, Domagoj; Chmielewski, Lukasz; Golub, Marin. On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box // Proceedings of the First Workshop on Cryptography and Security in Computing Systems. ACM Stjepan Picek, Luca Mariot, Domagoj Jakobovic, Alberto Leporati. Evolving S- boxes Based on Cellular Automata with Genetic Programming. GECCO-2017 (accepted) Stjepan Picek, Luca Mariot, Domagoj Jakobovic, Bohan Yang, Nele Mentens. Design of S-boxes Defined with Cellular Automata Rules. MAL-IoT 2017 (accepted) K. Chakraborty, S. Sarkar, S. Maitra, B. Mazumdar, D. Mukhopadhyay, and E Prouff. Redefining the transparency order. In Coding and Cryptography, International Workshop, gp.zemris.fer.hr 38/38
Evolutionary Methods for the Construction of Cryptographic Boolean Functions
Evolutionary Methods for the Construction of Cryptographic Boolean Functions No Author Given No Institute Given Abstract. Boolean functions represent an important primitive when constructing many stream
More informationEvolving DPA-resistant Boolean Functions
Evolving DPA-resistant Boolean Functions Stjepan Picek 1,2, Lejla Batina 1 and Domagoj Jakobovic 2 1 Radboud University Nijmegen, Institute for Computing and Information Sciences Postbus 9010, 6500 GL
More informationCryptographic Boolean Functions: One Output, Many Design Criteria
Cryptographic Boolean Functions: One Output, Many Design Criteria Stjepan Picek a,b, Domagoj Jakobovic b, Julian F. Miller c, Lejla Batina d, Marko Cupic b a KU Leuven, ESAT/COSIC and iminds, Kasteelpark
More informationEvolving Algebraic Constructions for Designing Bent Boolean Functions
Evolving Algebraic Constructions for Designing Bent Boolean Functions ABSTRACT Stjepan Picek KU Leuven, ESAT/COSIC and iminds Kasteelpark Arenberg 10, bus 2452, B-3001 Leuven-Heverlee, Belgium and LAGA,
More informationA New Cost Function for Evolution of S-boxes
A New Cost Function for Evolution of S-boxes Stjepan Picek stjepan@computer.org KU Leuven, ESAT/COSIC and iminds, Kasteelpark Arenberg 10, bus 2452, B-3001 Leuven-Heverlee, Belgium and LAGA, UMR 7539,
More informationIntroduction to Optimization
Introduction to Optimization Approximation Algorithms and Heuristics November 21, 2016 École Centrale Paris, Châtenay-Malabry, France Dimo Brockhoff Inria Saclay Ile-de-France 2 Exercise: The Knapsack
More informationContents. Index... 11
Contents 1 Modular Cartesian Genetic Programming........................ 1 1 Embedded Cartesian Genetic Programming (ECGP)............ 1 1.1 Cone-based and Age-based Module Creation.......... 1 1.2 Cone-based
More informationLecture 6: Genetic Algorithm. An Introduction to Meta-Heuristics, Produced by Qiangfu Zhao (Since 2012), All rights reserved
Lecture 6: Genetic Algorithm An Introduction to Meta-Heuristics, Produced by Qiangfu Zhao (Since 2012), All rights reserved Lec06/1 Search and optimization again Given a problem, the set of all possible
More informationDe Cifris incontra Milano Milano-Bicocca 11 settembre 2018
De Cifris incontra Milano Milano-Bicocca 11 settembre 2018 Alberto Leporati Università degli Studi di Milano Bicocca Dip. di Informatica, Sistemistica e Comunicazione (DISCo) Viale Sarca 336/14 Milano
More informationEvolving Cryptographic Pseudorandom Number Generators
Evolving Cryptographic Pseudorandom Number Generators Stjepan Picek 1, Dominik Sisejkovic 2, Vladimir Rozic 1, Bohan Yang 1, Nele Mentens 1, and Domagoj Jakobovic 2 1 KU Leuven, ESAT/COSIC and iminds,
More informationIntroduction to Optimization
Introduction to Optimization Approximation Algorithms and Heuristics November 6, 2015 École Centrale Paris, Châtenay-Malabry, France Dimo Brockhoff INRIA Lille Nord Europe 2 Exercise: The Knapsack Problem
More informationGenetic Algorithms and Genetic Programming. Lecture 9: (23/10/09)
Genetic Algorithms and Genetic Programming Lecture 9: (23/10/09) Genetic programming II Michael Herrmann michael.herrmann@ed.ac.uk, phone: 0131 6 517177, Informatics Forum 1.42 Overview 1. Introduction:
More informationMeta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization
2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic
More informationA Weight Based Attack on the CIKS-1 Block Cipher
A Weight Based Attack on the CIKS-1 Block Cipher Brian J. Kidney, Howard M. Heys, Theodore S. Norvell Electrical and Computer Engineering Memorial University of Newfoundland {bkidney, howard, theo}@engr.mun.ca
More informationComputational Intelligence Applied on Cryptology: a Brief Review
Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence
More informationKyrre Glette INF3490 Evolvable Hardware Cartesian Genetic Programming
Kyrre Glette kyrrehg@ifi INF3490 Evolvable Hardware Cartesian Genetic Programming Overview Introduction to Evolvable Hardware (EHW) Cartesian Genetic Programming Applications of EHW 3 Evolvable Hardware
More informationGenetic Programming. and its use for learning Concepts in Description Logics
Concepts in Description Artificial Intelligence Institute Computer Science Department Dresden Technical University May 29, 2006 Outline Outline: brief introduction to explanation of the workings of a algorithm
More informationOn the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven
On the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven Éloi de Chérisey*, Annelie Heuser**, Sylvain Guilley** and Olivier Rioul** * ENS Cachan, **Telecom
More informationEvolutionary Computation Algorithms for Cryptanalysis: A Study
Evolutionary Computation Algorithms for Cryptanalysis: A Study Poonam Garg Information Technology and Management Dept. Institute of Management Technology Ghaziabad, India pgarg@imt.edu Abstract The cryptanalysis
More informationApplication of Genetic Algorithms to CFD. Cameron McCartney
Application of Genetic Algorithms to CFD Cameron McCartney Introduction define and describe genetic algorithms (GAs) and genetic programming (GP) propose possible applications of GA/GP to CFD Application
More informationAutomatic Creation of Digital Fast Adder Circuits by Means of Genetic Programming
1 Automatic Creation of Digital Fast Adder Circuits by Means of Genetic Programming Karim Nassar Lockheed Martin Missiles and Space 1111 Lockheed Martin Way Sunnyvale, CA 94089 Karim.Nassar@lmco.com 408-742-9915
More informationMutations for Permutations
Mutations for Permutations Insert mutation: Pick two allele values at random Move the second to follow the first, shifting the rest along to accommodate Note: this preserves most of the order and adjacency
More informationGenetic Algorithms Variations and Implementation Issues
Genetic Algorithms Variations and Implementation Issues CS 431 Advanced Topics in AI Classic Genetic Algorithms GAs as proposed by Holland had the following properties: Randomly generated population Binary
More informationEvolving SQL Queries for Data Mining
Evolving SQL Queries for Data Mining Majid Salim and Xin Yao School of Computer Science, The University of Birmingham Edgbaston, Birmingham B15 2TT, UK {msc30mms,x.yao}@cs.bham.ac.uk Abstract. This paper
More informationAn Evolutionary Multiobjective Approach to Design Highly Non-linear Boolean Functions
An Evolutionary Multiobjective Approach to Design Highly Non-linear Boolean Functions Hernán Aguirre Hiroyuki Okazaki Yasushi Fuwa ahernan@shinshu-u.ac.jp okazaki@cs.shinshu-u.ac.jp fuwa@cs.shinshu-u.ac.jp
More informationPower Analysis of MAC-Keccak: A Side Channel Attack. Advanced Cryptography Kyle McGlynn 4/12/18
Power Analysis of MAC-Keccak: A Side Channel Attack Advanced Cryptography Kyle McGlynn 4/12/18 Contents Side-Channel Attack Power Analysis Simple Power Analysis (SPA) Differential Power Analysis (DPA)
More informationEvolutionary Methods for State-based Testing
Evolutionary Methods for State-based Testing PhD Student Raluca Lefticaru Supervised by Florentin Ipate University of Piteşti, Romania Department of Computer Science Outline Motivation Search-based software
More informationDESIGNING OF STREAM CIPHER ARCHITECTURE USING THE CELLULAR AUTOMATA
DESIGNING OF STREAM CIPHER ARCHITECTURE USING THE CELLULAR AUTOMATA 1 Brundha K A MTech Email: 1 brundha1905@gmail.com Abstract Pseudo-random number generators (PRNGs) are a key component of stream ciphers
More informationRegularization of Evolving Polynomial Models
Regularization of Evolving Polynomial Models Pavel Kordík Dept. of Computer Science and Engineering, Karlovo nám. 13, 121 35 Praha 2, Czech Republic kordikp@fel.cvut.cz Abstract. Black box models such
More informationLecture 8: Genetic Algorithms
Lecture 8: Genetic Algorithms Cognitive Systems - Machine Learning Part II: Special Aspects of Concept Learning Genetic Algorithms, Genetic Programming, Models of Evolution last change December 1, 2010
More informationCHAPTER 5. CHE BASED SoPC FOR EVOLVABLE HARDWARE
90 CHAPTER 5 CHE BASED SoPC FOR EVOLVABLE HARDWARE A hardware architecture that implements the GA for EHW is presented in this chapter. This SoPC (System on Programmable Chip) architecture is also designed
More informationGenetic Image Network for Image Classification
Genetic Image Network for Image Classification Shinichi Shirakawa, Shiro Nakayama, and Tomoharu Nagao Graduate School of Environment and Information Sciences, Yokohama National University, 79-7, Tokiwadai,
More informationGenetic Programming Part 1
Genetic Programming Part 1 Evolutionary Computation Lecture 11 Thorsten Schnier 06/11/2009 Previous Lecture Multi-objective Optimization Pareto optimality Hyper-volume based indicators Recent lectures
More informationStream Ciphers An Overview
Stream Ciphers An Overview Palash Sarkar Indian Statistical Institute, Kolkata email: palash@isicalacin stream cipher overview, Palash Sarkar p1/51 Classical Encryption Adversary message ciphertext ciphertext
More informationAn Introduction to Evolutionary Algorithms
An Introduction to Evolutionary Algorithms Karthik Sindhya, PhD Postdoctoral Researcher Industrial Optimization Group Department of Mathematical Information Technology Karthik.sindhya@jyu.fi http://users.jyu.fi/~kasindhy/
More informationGenetic Programming. Modern optimization methods 1
Genetic Programming Developed in USA during 90 s Patented by J. Koza Solves typical problems: Prediction, classification, approximation, programming Properties Competitor of neural networks Need for huge
More informationVulnerability of Certain Stream Ciphers Based on k-normal Boolean Functions
Vulnerability of Certain Stream Ciphers Based on k-normal Boolean Functions Miodrag Mihaljevic RCIS-AIST, Tokyo A Seminar Lecture at CCRG School of Physics and Mathematical Sciences Nanyang Technological
More informationGenetic Programming for Multiclass Object Classification
Genetic Programming for Multiclass Object Classification by William Richmond Smart A thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master
More informationELECTRONICS DEPARTMENT
ELECTRONICS DEPARTMENT By Eng. 28 th Mar MUSTAFA 2012 M. Efficient SHIPLEImplementation of AES Algorithm Immune to DPA Attack Cryptography processing plaintext cipher text format Block Cipher Stream Cipher
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 10, October-2017 ISSN
194 Prime Number Generation Using Genetic Algorithm Arpit Goel 1, Anuradha Brijwal 2, Sakshi Gautam 3 1 Dept. Of Computer Science & Engineering, Himalayan School of Engineering & Technology, Swami Rama
More informationISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AUTOMATIC TEST CASE GENERATION FOR PERFORMANCE ENHANCEMENT OF SOFTWARE THROUGH GENETIC ALGORITHM AND RANDOM TESTING Bright Keswani,
More informationJEvolution: Evolutionary Algorithms in Java
Computational Intelligence, Simulation, and Mathematical Models Group CISMM-21-2002 May 19, 2015 JEvolution: Evolutionary Algorithms in Java Technical Report JEvolution V0.98 Helmut A. Mayer helmut@cosy.sbg.ac.at
More informationEnsemble Image Classification Method Based on Genetic Image Network
Ensemble Image Classification Method Based on Genetic Image Network Shiro Nakayama, Shinichi Shirakawa, Noriko Yata and Tomoharu Nagao Graduate School of Environment and Information Sciences, Yokohama
More informationSecret Key Cryptography (Spring 2004)
Secret Key Cryptography (Spring 2004) Instructor: Adi Shamir Teaching assistant: Eran Tromer 1 Background Lecture notes: DES Until early 1970 s: little cryptographic research in industry and academcy.
More informationA Countermeasure Circuit for Secure AES Engine against Differential Power Analysis
A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor
More informationDERIVATIVE-FREE OPTIMIZATION
DERIVATIVE-FREE OPTIMIZATION Main bibliography J.-S. Jang, C.-T. Sun and E. Mizutani. Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence. Prentice Hall, New Jersey,
More informationExternal Encodings Do not Prevent Transient Fault Analysis
External Encodings Do not Prevent Transient Fault Analysis Christophe Clavier Gemalto, Security Labs CHES 2007 Vienna - September 12, 2007 Christophe Clavier CHES 2007 Vienna September 12, 2007 1 / 20
More informationA New Crossover Technique for Cartesian Genetic Programming
A New Crossover Technique for Cartesian Genetic Programming Genetic Programming Track Janet Clegg Intelligent Systems Group, Department of Electronics University of York, Heslington York, YO DD, UK jc@ohm.york.ac.uk
More informationCourse Business. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Allowed to bring one index card (double sided) Location: Right here
Course Business Midterm is on March 1 Allowed to bring one index card (double sided) Final Exam is Monday, May 1 (7 PM) Location: Right here 1 Cryptography CS 555 Topic 18: AES, Differential Cryptanalysis,
More informationS-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? Lejla Batina 1, Domagoj Jakobovic 2, Nele Mentens 3, Stjepan Picek 1,2, Antonio de la Piedra 1, and
More informationSummary on Crypto Primitives and Protocols
Summary on Crypto Primitives and Protocols Levente Buttyán CrySyS Lab, BME www.crysys.hu 2015 Levente Buttyán Basic model of cryptography sender key data ENCODING attacker e.g.: message spatial distance
More informationOutline. Motivation. Introduction of GAs. Genetic Algorithm 9/7/2017. Motivation Genetic algorithms An illustrative example Hypothesis space search
Outline Genetic Algorithm Motivation Genetic algorithms An illustrative example Hypothesis space search Motivation Evolution is known to be a successful, robust method for adaptation within biological
More informationGenetic Algorithms. Kang Zheng Karl Schober
Genetic Algorithms Kang Zheng Karl Schober Genetic algorithm What is Genetic algorithm? A genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization
More informationHeuristic Optimisation
Heuristic Optimisation Part 10: Genetic Algorithm Basics Sándor Zoltán Németh http://web.mat.bham.ac.uk/s.z.nemeth s.nemeth@bham.ac.uk University of Birmingham S Z Németh (s.nemeth@bham.ac.uk) Heuristic
More informationMasking as a Side-Channel Countermeasure in Hardware
Masking as a Side-Channel Countermeasure in Hardware 6. September 2016 Ruhr-Universität Bochum 1 Agenda Physical Attacks and Side Channel Analysis Attacks Measurement setup Power Analysis Attacks Countermeasures
More informationThe Davies-Murphy Power Attack. Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab
The Davies-Murphy Power Attack Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab Introduction Two approaches for attacking crypto devices traditional cryptanalysis Side Channel Attacks
More informationSPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller
SPIDeR A Distributed Multi-Agent Intrusion Detection and Response Framework Patrick Miller patrick@spider.doriathproject.com Overview Goals Utilize new and existing sensors collaboratively to generate
More informationCS5401 FS2015 Exam 1 Key
CS5401 FS2015 Exam 1 Key This is a closed-book, closed-notes exam. The only items you are allowed to use are writing implements. Mark each sheet of paper you use with your name and the string cs5401fs2015
More informationHybrid Adaptive Evolutionary Algorithm Hyper Heuristic
Hybrid Adaptive Evolutionary Algorithm Hyper Heuristic Jonatan Gómez Universidad Nacional de Colombia Abstract. This paper presents a hyper heuristic that is able to adapt two low level parameters (depth
More informationPrevious Lecture Genetic Programming
Genetic Programming Previous Lecture Constraint Handling Penalty Approach Penalize fitness for infeasible solutions, depending on distance from feasible region Balanace between under- and over-penalization
More informationA More Stable Approach To LISP Tree GP
A More Stable Approach To LISP Tree GP Joseph Doliner August 15, 2008 Abstract In this paper we begin by familiarising ourselves with the basic concepts of Evolutionary Computing and how it can be used
More informationMetaheuristic Development Methodology. Fall 2009 Instructor: Dr. Masoud Yaghini
Metaheuristic Development Methodology Fall 2009 Instructor: Dr. Masoud Yaghini Phases and Steps Phases and Steps Phase 1: Understanding Problem Step 1: State the Problem Step 2: Review of Existing Solution
More informationEvolutionary Art with Cartesian Genetic Programming
Evolutionary Art with Cartesian Genetic Programming Laurence Ashmore 1, and Julian Francis Miller 2 1 Department of Informatics, University of Sussex, Falmer, BN1 9QH, UK emoai@hotmail.com http://www.gaga.demon.co.uk/
More informationInvestigating the Application of Genetic Programming to Function Approximation
Investigating the Application of Genetic Programming to Function Approximation Jeremy E. Emch Computer Science Dept. Penn State University University Park, PA 16802 Abstract When analyzing a data set it
More informationMetaheuristic Optimization with Evolver, Genocop and OptQuest
Metaheuristic Optimization with Evolver, Genocop and OptQuest MANUEL LAGUNA Graduate School of Business Administration University of Colorado, Boulder, CO 80309-0419 Manuel.Laguna@Colorado.EDU Last revision:
More informationIntroduction to Evolutionary Computation
Introduction to Evolutionary Computation The Brought to you by (insert your name) The EvoNet Training Committee Some of the Slides for this lecture were taken from the Found at: www.cs.uh.edu/~ceick/ai/ec.ppt
More information1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra
Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation
More informationEC500. Design of Secure and Reliable Hardware. Lecture 1 & 2
EC500 Design of Secure and Reliable Hardware Lecture 1 & 2 Mark Karpovsky January 17 th, 2013 1 Security Errors injected by the attacker (active attacks) Reliability Errors injected by random sources e.g.
More informationProgram Synthesis. SWE 795, Spring 2017 Software Engineering Environments
Program Synthesis SWE 795, Spring 2017 Software Engineering Environments Today HW3 is due next week in class! Part 1 (Lecture)(~50 mins) Break! Part 2 (Discussion)(~60 mins) Discussion of readings Part
More informationGenetic programming. Lecture Genetic Programming. LISP as a GP language. LISP structure. S-expressions
Genetic programming Lecture Genetic Programming CIS 412 Artificial Intelligence Umass, Dartmouth One of the central problems in computer science is how to make computers solve problems without being explicitly
More informationMultiobjective Optimization Using Adaptive Pareto Archived Evolution Strategy
Multiobjective Optimization Using Adaptive Pareto Archived Evolution Strategy Mihai Oltean Babeş-Bolyai University Department of Computer Science Kogalniceanu 1, Cluj-Napoca, 3400, Romania moltean@cs.ubbcluj.ro
More informationHybridization EVOLUTIONARY COMPUTING. Reasons for Hybridization - 1. Naming. Reasons for Hybridization - 3. Reasons for Hybridization - 2
Hybridization EVOLUTIONARY COMPUTING Hybrid Evolutionary Algorithms hybridization of an EA with local search techniques (commonly called memetic algorithms) EA+LS=MA constructive heuristics exact methods
More informationIntroduction to Genetic Algorithms. Based on Chapter 10 of Marsland Chapter 9 of Mitchell
Introduction to Genetic Algorithms Based on Chapter 10 of Marsland Chapter 9 of Mitchell Genetic Algorithms - History Pioneered by John Holland in the 1970s Became popular in the late 1980s Based on ideas
More informationentire search space constituting coefficient sets. The brute force approach performs three passes through the search space, with each run the se
Evolving Simulation Modeling: Calibrating SLEUTH Using a Genetic Algorithm M. D. Clarke-Lauer 1 and Keith. C. Clarke 2 1 California State University, Sacramento, 625 Woodside Sierra #2, Sacramento, CA,
More informationComputational Intelligence
Computational Intelligence Module 6 Evolutionary Computation Ajith Abraham Ph.D. Q What is the most powerful problem solver in the Universe? ΑThe (human) brain that created the wheel, New York, wars and
More informationEvolutionary Computation. Chao Lan
Evolutionary Computation Chao Lan Outline Introduction Genetic Algorithm Evolutionary Strategy Genetic Programming Introduction Evolutionary strategy can jointly optimize multiple variables. - e.g., max
More informationARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS
ARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Optimisation problems Optimisation & search Two Examples The knapsack problem
More informationGenetic Algorithm Based Template Optimization for a Vision System: Obstacle Detection
ISTET'09 Umair Ali Khan, Alireza Fasih, Kyandoghere Kyamakya, Jean Chamberlain Chedjou Transportation Informatics Group, Alpen Adria University, Klagenfurt, Austria. Genetic Algorithm Based Template Optimization
More informationGenetic Programming of Autonomous Agents. Functional Requirements List and Performance Specifi cations. Scott O'Dell
Genetic Programming of Autonomous Agents Functional Requirements List and Performance Specifi cations Scott O'Dell Advisors: Dr. Joel Schipper and Dr. Arnold Patton November 23, 2010 GPAA 1 Project Goals
More informationSparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach
1 Sparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach David Greiner, Gustavo Montero, Gabriel Winter Institute of Intelligent Systems and Numerical Applications in Engineering (IUSIANI)
More informationAn empirical study of the efficiency of learning boolean functions using a Cartesian Genetic Programming approach
An empirical study of the efficiency of learning boolean functions using a Cartesian Genetic Programming approach Julian F. Miller School of Computing Napier University 219 Colinton Road Edinburgh, EH14
More informationReusing Code in Genetic Programming
Reusing Code in Genetic Programming Edgar Galván López 1, Riccardo Poli 1, and Carlos A. Coello Coello 2 1 University of Essex, Colchester, CO4 3SQ, UK egalva,rpoli@essex.ac.uk 2 Depto. Ing. Eléctrica,
More informationA Comparative Study of Linear Encoding in Genetic Programming
2011 Ninth International Conference on ICT and Knowledge A Comparative Study of Linear Encoding in Genetic Programming Yuttana Suttasupa, Suppat Rungraungsilp, Suwat Pinyopan, Pravit Wungchusunti, Prabhas
More informationGenetic Programming Prof. Thomas Bäck Nat Evur ol al ut ic o om nar put y Aling go rg it roup hms Genetic Programming 1
Genetic Programming Prof. Thomas Bäck Natural Evolutionary Computing Algorithms Group Genetic Programming 1 Genetic programming The idea originated in the 1950s (e.g., Alan Turing) Popularized by J.R.
More informationGlitch it if you can: parameter search strategies for successful fault injection
Glitch it if you can: parameter search strategies for successful fault injection Rafael Boix Carpi 1, Stjepan Picek 2,3, Lejla Batina 2, Federico Menarini 1, Domagoj Jakobovic 3 and Marin Golub 3 1 Riscure
More informationEscaping Local Optima: Genetic Algorithm
Artificial Intelligence Escaping Local Optima: Genetic Algorithm Dae-Won Kim School of Computer Science & Engineering Chung-Ang University We re trying to escape local optima To achieve this, we have learned
More informationNEW COMPRESSION FUNCTION TO SHA-256 BASED ON THE TECHNIQUES OF DES.
NEW COMPRESSION FUNCTION TO SHA-256 BASED ON THE TECHNIQUES OF DES. 1 ZAKARIA KADDOURI, 2 FOUZIA OMARY, 3 ABDOLLAH ABOUCHOUAR, 4 MOHSSIN DAARI, 5 KHADIJA ACHKOUN. LRI Laboratory (Ex: Networks and Data
More informationMULTIOBJECTIVE INTRINSIC HARDWARE EVOLUTION. Paul Kaufmann, Marco Platzner
MULTIOBJECTIVE INTRINSIC HARDWARE EVOLUTION Paul Kaufmann, Marco Platzner University of Paderborn Warburger Str. 00 33098 Paderborn, Germany email: {paul.kaufmann,platzner}@upb.de ABSTRACT Evolutionary
More informationEncryption and Decryption Image Using Multiobjective Soft Computing Algorithm. Table 4.1 The History of Soft Computing Algorithms Development
CHAPTER IV ENCRYPTION IMAGE USING GENETIC ALGORITHM 4.1. Introduction to Soft Computing Algorithms The soft computing algorithms are a set of techniques covering many fields that belong to various categories
More informationFinding Effective Software Security Metrics Using A Genetic Algorithm
International Journal of Software Engineering. ISSN 0974-3162 Volume 4, Number 2 (2013), pp. 1-6 International Research Publication House http://www.irphouse.com Finding Effective Software Security Metrics
More informationToward Self-adaptive Embedded Systems: Multi-objective Hardware Evolution
Toward Self-adaptive Embedded Systems: Multi-objective Hardware Evolution Paul Kaufmann and Marco Platzner University of Paderborn Abstract. Evolutionary hardware design reveals the potential to provide
More informationOutline of the module
Evolutionary and Heuristic Optimisation (ITNPD8) Lecture 2: Heuristics and Metaheuristics Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ Computing Science and Mathematics, School of Natural Sciences University
More informationAutomata Construct with Genetic Algorithm
Automata Construct with Genetic Algorithm Vít Fábera Department of Informatics and Telecommunication, Faculty of Transportation Sciences, Czech Technical University, Konviktská 2, Praha, Czech Republic,
More informationCHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN
97 CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 5.1 INTRODUCTION Fuzzy systems have been applied to the area of routing in ad hoc networks, aiming to obtain more adaptive and flexible
More informationCHAPTER 2 LITERATURE SURVEY
27 CHAPTER 2 LITERATURE SURVEY 2.1 INTRODUCTION There have been many researches done on genetic algorithms and their application to various problems, there are relatively few papers that apply genetic
More informationArtificial Intelligence Application (Genetic Algorithm)
Babylon University College of Information Technology Software Department Artificial Intelligence Application (Genetic Algorithm) By Dr. Asaad Sabah Hadi 2014-2015 EVOLUTIONARY ALGORITHM The main idea about
More informationA New Crossover Technique for Cartesian Genetic Programming
A New Crossover Technique for Cartesian Genetic Programming Genetic Programming Track Janet Clegg Intelligent Systems Group, Department of Electronics University of York, Heslington York,YODD,UK jc@ohm.york.ac.uk
More informationApproach Using Genetic Algorithm for Intrusion Detection System
Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-
More informationA Memetic Heuristic for the Co-clustering Problem
A Memetic Heuristic for the Co-clustering Problem Mohammad Khoshneshin 1, Mahtab Ghazizadeh 2, W. Nick Street 1, and Jeffrey W. Ohlmann 1 1 The University of Iowa, Iowa City IA 52242, USA {mohammad-khoshneshin,nick-street,jeffrey-ohlmann}@uiowa.edu
More informationThe Genetic Algorithm for finding the maxima of single-variable functions
Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 46-54 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com The Genetic Algorithm for finding
More information