A1 J. Blackledge

AD Sch. of Electr. & Electron. Eng., Dublin Inst. of Technol., Dublin

A1 S. Bezobrazov

AD Sch. of Electr. & Electron. Eng., Dublin Inst. of Technol., Dublin

A1 P. Tobin

AD Sch. of Electr. & Electron. Eng., Dublin Inst. of Technol., Dublin

A1 F. Zamora

AD Sch. of Electr. & Electron. Eng., Dublin Inst. of Technol., Dublin

PB iet

T1 Cryptography using evolutionary computing

JN IET Conference Proceedings

SP 21

OP 21

AB We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRNG), using evolutionary computing. Working with a system called Eureqa, designed by the Cornell Creative Machines Lab, we seed the system with natural noise sources obtained from data that can include atmospheric noise generated by radio emissions due to lightening, for example, radioactive decay, electronic noise and so on. The purpose of this is to `force' the system to output a result (a nonlinear function) that is an approximation to the input noise. This output is then treated as an iterated function which is subjected to a range of tests to check for potential cryptographic strength in terms of a positive Lyapunov exponent, maximum entropy, high cycle length, key diffusion characteristics etc. This approach provides the potential for generating an unlimited number of unique PRNG that can be used on a 1-to-1 basis. Typical applications include the encryption of data before it is uploaded onto the Cloud by a user that is provided with a personalised encryption algorithm rather than just a personal key using a `known algorithm' that may be subject to a `known algorithm attack' and/or is `open' to the very authorities who are promoting its use. (8 pages)

K1 electronic noise

K1 positive Lyapunov exponent

K1 radioactive decay

K1 natural noise sources

K1 potential cryptographic strength

K1 evolutionary computing

K1 Eureqa system

K1 atmospheric noise

K1 radio emissions

K1 maximum entropy

K1 high cycle length

K1 encryptors

K1 iterated function

K1 (PRNG

K1 algorithm attack

K1 pseudorandom number generators

K1 personalised encryption algorithm

K1 key diffusion characteristics

DO https://doi.org/10.1049/ic.2013.0029

UL https://digital-library.theiet.org/;jsessionid=cuna9gv2wwqi.x-iet-live-01content/conferences/10.1049/ic.2013.0029

LA English

SN

YR 2013

OL EN