ŠVENDA, Petr, Martin UKROP and Václav MATYÁŠ. Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. In Mohammad S. Obaidat, Joaquim Filipe. E-Business and Telecommunications. Berlin: Springer Berlin Heidelberg, 2014, p. 290-305. ISBN 978-3-662-44787-1. Available from: https://dx.doi.org/10.1007/978-3-662-44788-8_17.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits
Authors ŠVENDA, Petr (203 Czech Republic, guarantor, belonging to the institution), Martin UKROP (703 Slovakia, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Edition Berlin, E-Business and Telecommunications, p. 290-305, 16 pp. 2014.
Publisher Springer Berlin Heidelberg
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Czech Republic
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
WWW The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-662-44788-8_17
RIV identification code RIV/00216224:14330/14:00074102
Organization unit Faculty of Informatics
ISBN 978-3-662-44787-1
ISSN 1865-0929
Doi http://dx.doi.org/10.1007/978-3-662-44788-8_17
UT WoS 000345296600017
Keywords in English eStream; Genetic programming; Random distinguisher; Randomness statistical testing; Software circuit
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 27/4/2015 06:09.
Abstract
Cryptanalysis of a cryptographic function usually requires advanced cryptanalytical skills and extensive amount of human labor with an option of using randomness testing suites like STS NIST or Dieharder. These can be applied to test statistical properties of cryptographic function outputs. We propose a more open approach based on software circuit that acts as a testing function automatically evolved by a stochastic optimization algorithm. Information leaked during cryptographic function evaluation is used to find a distinguisher of outputs produced by 25 candidate algorithms for eStream and SHA-3 competition from truly random sequences. We obtained similar results (with some exceptions) as those produced by STS NIST and Dieharder tests w.r.t. the number of rounds of the inspected algorithm.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 12/5/2024 09:45