1996-09-23 - Re: Evolving algorithm for faster brute force key searches?

Header Data

From: Adam Shostack <adam@homeport.org>
To: tcmay@got.net (Timothy C. May)
Message Hash: d852e0efe3dcd59729fbe305730fa044105bc419cd5078314eabf983e460ed2b
Message ID: <199609230314.WAA01337@homeport.org>
Reply To: <ae6af5030202100433cd@[207.167.93.63]>
UTC Datetime: 1996-09-23 05:05:19 UTC
Raw Date: Mon, 23 Sep 1996 13:05:19 +0800

Raw message

From: Adam Shostack <adam@homeport.org>
Date: Mon, 23 Sep 1996 13:05:19 +0800
To: tcmay@got.net (Timothy C. May)
Subject: Re: Evolving algorithm for faster brute force key searches?
In-Reply-To: <ae6af5030202100433cd@[207.167.93.63]>
Message-ID: <199609230314.WAA01337@homeport.org>
MIME-Version: 1.0
Content-Type: text


Timothy C. May wrote:

| With some weak ciphers, this might work. I think Schneier makes some
| comments about who's looked at this. But weak ciphers are not too
| interesting.

	At the most recent Crypto, someone mentioned that FEAL is
useful because just about any new attack you can think of works well
against it.  I think it was Susan Langford.

	Weak systems are thus useful for research and training
purposes.  I suspect Tim is on the money with a genetic algorithim
having a flat `fitness landscape,' but there may be something that a
human misses which an evolved algorithim finds.

	Also, it may be possible to evolve something against a
reduced round version of a cipher (using a training space that is not
flat) that will still work better than brute force against a full
system.  If you have cycles to spare, it might be an interesting
avenue of research.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






Thread