Chaotic encryption method based on life-like cellular automata

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaotic Encryption Method Based on Life-Like Cellular Automata

We propose a chaotic encryption method based on Cellular Automata(CA), specifically on the family called the “Life-Like” type. Thus, the encryption process lying on the pseudo-random numbers generated (PRNG) by each CA’s evolution, which transforms the password as the initial conditions to encrypt messages. Moreover, is explored the dynamical behavior of CA to reach a “good” quality as PRNG bas...

متن کامل

Research of Encryption Based on Chaotic Cellular Automata

In this paper we proposed a block cryptosystem based on 1d-k5 Chain C CA, by alternatively iterating leftand right-toggle chain rules, this kind of encryption is achieved by backward iteration and decryption is realized via forward iteration. From theory proof, we can ensure the security of the cryptosystem, and make mostly confusion and diffusion function. Experimant shows that this cryptosyst...

متن کامل

Reversible Cellular Automata Based Encryption

In this paper cellular automata (CA) are applied to construct a symmetric-key encryption algorithm. A new block cipher based on one dimensional, uniform and reversible CA is proposed. A class of CA with rules specifically constructed to be reversible is used. The algorithm uses 224 bit key. It is shown that the algorithm satisfies safety criterion called Strict Avalanche Criterion. Due to a hug...

متن کامل

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security

Cryptography has recently played a significant role in secure data transmissions and storages. Most conventional data encryption schemes are relatively complicated and complexity in encrypted keys is insufficient, resulting in long computational time and low degree of security against all types of attacks. Consequently, a highlysecured and robust data encryption scheme is necessary. This paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Expert Systems with Applications

سال: 2012

ISSN: 0957-4174

DOI: 10.1016/j.eswa.2012.05.020