Abstract
Good afternoon, I will talk on the origin of yet another channel. The reason why we choose such a title is that we will use something borrowed from the nature— the genetic programming technique—and we will search for another side channel in a cryptographic function. I will be focusing on the randomness testing of the function outputs. I will give you a brief overview of how existing statistical batteries like STS NIST or Diehard are doing such testing. Then I will present our idea based on a software circuit combined with the genetic programming. I will show you some results for candidates from the eStream competition for stream ciphers and also some from SHA-3 competition. Some discussion about interesting results we were getting will go afterwards. And finally some possible extensions to obtain yet better results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Švenda, P. (2013). On the Origin of Yet another Channel (Transcript of Discussion). In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds) Security Protocols XXI. Security Protocols 2013. Lecture Notes in Computer Science, vol 8263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41717-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-41717-7_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41716-0
Online ISBN: 978-3-642-41717-7
eBook Packages: Computer ScienceComputer Science (R0)