Paper published in a journal (Scientific congresses, symposiums and conference proceedings)
Hash function generation by means of Gene Expression Programming
VARRETTE, Sébastien; MUSZYNSKI, Jakub; BOUVRY, Pascal
2012In Intl. Conf. on Cryptography and Security System (CSS’12), XII (3), p. 37 - 53
Peer reviewed
 

Files


Full Text
css-2012.pdf
Publisher postprint (1.61 MB)
Request a copy

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Hash function; Evolutionary Algorithm
Abstract :
[en] Cryptographic hash functions are fundamental primitives in modern cryptography and have many security applications (data integrity checking, cryptographic protocols, digital signatures, pseudo random number generators etc.). At the same time novel hash functions are designed (for instance in the framework of the SHA-3 contest organized by the National Institute of Standards and Technology (NIST)), the cryptanalysts exhibit a set of statistical metrics (propagation criterion, frequency analysis etc.) able to assert the quality of new proposals. Also, rules to design "good" hash functions are now known and are followed in every reasonable proposal of a new hash scheme. This article investigates the ways to build on this experiment and those metrics to generate automatically compression functions by means of Evolutionary Algorithms (EAs). Such functions are at the heart of the construction of iterative hash schemes and it is therefore crucial for them to hold good properties. Actually, the idea to use nature-inspired heuristics for the design of such cryptographic primitives is not new: this approach has been successfully applied in several previous works, typically using the Genetic Programming (GP) heuristic [1]. Here, we exploit a hybrid meta-heuristic for the evolutionary process called Gene Expression Programming (GEP) [2] that appeared far more e?cient computationally speaking compared to the GP paradigm used in the previous papers. In this context, the GEPHashSearch framework is presented. As it is still a work in progress, this article focuses on the design aspects of this framework (individuals de?nitions, ?tness objectives etc.) rather than on complete implementation details and validation results. Note that we propose to tackle the generation of compression functions as a multi-objective optimization problem in order to identify the Pareto front i.e. the set of non-dominated functions over the four ?tness criteria considered. If this goal is not yet reached, the ?rst experimental results in a mono-objective context are promising and open the perspective of fruitful contributions to the cryptographic community
Research center :
ULHPC - University of Luxembourg: High Performance Computing
Disciplines :
Computer science
Identifiers :
UNILU:UL-CONFERENCE-2012-542
Author, co-author :
VARRETTE, Sébastien ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
MUSZYNSKI, Jakub ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
BOUVRY, Pascal ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Language :
English
Title :
Hash function generation by means of Gene Expression Programming
Publication date :
September 2012
Event name :
Cryptography and Security System
Event place :
Kazimierz Dolny, Poland
Event date :
2012-09
Audience :
International
Journal title :
Intl. Conf. on Cryptography and Security System (CSS’12)
Publisher :
Annales UMCS Informatica
Volume :
XII
Issue :
3
Pages :
37 - 53
Peer reviewed :
Peer reviewed
Available on ORBilu :
since 02 December 2013

Statistics


Number of views
131 (2 by Unilu)
Number of downloads
1 (1 by Unilu)

Bibliography


Similar publications



Contact ORBilu