Computer Security 및 Cryptography 위한 진화론적 계산의 적용 소개

  • 전준철 (경북대학교 공과대학 대학원 컴퓨터공학과) ;
  • 김기원 (경북대학교 공과대학 대학원 컴퓨터공학과) ;
  • 임재열 (경북대학교 공과대학 대학원 컴퓨터공학과) ;
  • 윤희정 (경북대학교 공과대학 대학원 컴퓨터공학과) ;
  • 유기영 (경북대학교 공과대학 컴퓨터공학과)
  • 발행 : 2005.01.30

초록

키워드

참고문헌

  1. P. Isasi and J. C. Hernandez, 'Introduction to the applications of evolutionary computation in computer security and crytography,' Computational Intelligence, Vol. 20, No. 3, pp. 445-449, 2004
  2. S. Peleg and A. Rosenfeld, 'Breaking substitution ciphers using a relaxation algorithm,' Communications of the ACM, Vol. 22, No. 11, pp. 598-605, 1979
  3. D. G. B. Hunter and A. R. Mckenzie, 'Experiments with relaxation algorithms for breaking simple substitution ciphers,' The Computer Journal, Vol. 26, No. 1, pp. 68-71, 1983
  4. J. M. Carroll and S. Martin, 'The automated cryptanalysis of substitution ciphers,' Cryptologia, Vol. 10, No. 4, pp. 193-209, 1986
  5. J. C. King and D. R. Bahler, 'An implementation of probabilistic relaxation in the cryptanalysis of simple substitution ciphers,' Cryptologia, Vol. 16, No. 3, pp. 215-225, 1992
  6. J. C. King, 'An algorithm for the complete cryptanalysis of periodic polyalphabetic substitution ciphers, Cryptologia, Vol. 18, No. 4, pp. 332-355, 1994
  7. A. Clark and E. Dawson, 'A parallel genetic algorithm for cryptanalysis of the polyalphabetic substitution cipher,' Cryptologia, Vol. 21, No. 2, pp. 129-138, 1997
  8. R. Spillma, M. Janssen, B. Nelson and M. Kepner, 'Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers,' Cryptologia, Vol. 17, No. 1, pp. 31-44, 1993
  9. W. S. Forsyth, and R. Safavi-Naini, 'Automated cryptanalysis of substitution ciphers,' Cryptologia, Vol. 17, No. 4, pp. 407-418, 1993
  10. A. J. Bagnall, G. P. McKeown, and V. J. Rayward-Smith, 'The cryptanalysis of a three rotor machine using a genetic algorithm,' Proceedings of the 7th International Conference on Genetics Algorithms ICGA '97, Morgan-Kaufmann, pp. 712-718, 1997
  11. W. Millan et al., 'New Concepts in Evolutionary Search for Boolean Functions in Cryptology,' IEEE Proceedings, 2003
  12. I. A. Clark et al. 'Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion,' IEEE Proceedings, 2003
  13. J. Von Neumann, The theory of self reproducing cellular automata, University of Illinois Press, Urbana, Illinois, 1967
  14. S. Wolfram, 'Random sequence generation by cellular automata,' Advances in Applied Mathematics, Vol. 7, No. 2, pp. 123-169, 1986
  15. M. Sipper and M. Tomassini, 'Generating parallel random number generators by cellular programming, Int. J. Mod. Phys, Vol. 7, No. 2, pp. 181-190, 1996
  16. Sheng-Uei, and S. Zhang, 'An evolutionary approach to the design of controllable cellular automata structure for random number generation,' IEEE Transactions on Evolutionary Computation. Vol. 7, No. 1, pp. 23-36, 2003
  17. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
  18. Sheng-Uei Guan and Shu Zhang, 'An Evolutionary Approach to the Design of Controllable Cellular Automata Structure for Random Number Generation,' IEEE Transactions on evolutionary computation, Vol. 7, No. 1, pp. 23-36, 2003
  19. M. Mihaljevic, Y. Zheng. and H. ImaiA Cellular Automata based Fast One-Way Hash Function Suitable for Hardware Implementation.' Public Key Cryptography- Proceedings of PKC'98, LNCS. Vol. 1431, pp. 217-233, 1998
  20. S. Wolfram, A New Kind of Science Wolfram Media, pp. 435-441, 2002
  21. F. Seredynski, P. Bouvry, and A. Y. Zomaya, 'Cellular Programming and Symetric Key Cryptography Systems, Genetic and Evolutionary Computation (GECCO), LNCS 2724, Part II, pp. 1369-1381, 2003
  22. P. Pal. Choudhury and R. Barua, 'Cellular Automata Based VLSI Architecture for Computing Multiplication And Inverses In GF($2^m$),' IEEE 7th International Conference on VLSI Design. pp. 279-282. 1994
  23. J. C. Jeon and K. Y. Yoo, 'Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata,' Computational Intelligence, Vol, 20. No. 3, pp. 495-502, 2004
  24. R. Alonso-Sanz, and M. Martin, 'One-dimensional cellular automata with memory: patterns from a single site seed,' International Journal of Bifurcation and Chaos Applied Sciences and Engineering, pp. 205-226, 2002
  25. G. Alvarez Maranon, L. Hernandez Encinas, and A. Martin del Rey, 'Sharing secret color images using cellular automata with memory, arXiv. org e-Piint, CR/0312034, 2003