Chaotic encryption method based on life-like cellular automata
نویسندگان
چکیده
منابع مشابه
Chaotic Encryption Method Based on Life-Like Cellular Automata
We propose a chaotic encryption method based on Cellular Automata(CA), specifically on the family called the “Life-Like” type. Thus, the encryption process lying on the pseudo-random numbers generated (PRNG) by each CA’s evolution, which transforms the password as the initial conditions to encrypt messages. Moreover, is explored the dynamical behavior of CA to reach a “good” quality as PRNG bas...
متن کاملResearch of Encryption Based on Chaotic Cellular Automata
In this paper we proposed a block cryptosystem based on 1d-k5 Chain C CA, by alternatively iterating leftand right-toggle chain rules, this kind of encryption is achieved by backward iteration and decryption is realized via forward iteration. From theory proof, we can ensure the security of the cryptosystem, and make mostly confusion and diffusion function. Experimant shows that this cryptosyst...
متن کاملReversible Cellular Automata Based Encryption
In this paper cellular automata (CA) are applied to construct a symmetric-key encryption algorithm. A new block cipher based on one dimensional, uniform and reversible CA is proposed. A class of CA with rules specifically constructed to be reversible is used. The algorithm uses 224 bit key. It is shown that the algorithm satisfies safety criterion called Strict Avalanche Criterion. Due to a hug...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملData Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security
Cryptography has recently played a significant role in secure data transmissions and storages. Most conventional data encryption schemes are relatively complicated and complexity in encrypted keys is insufficient, resulting in long computational time and low degree of security against all types of attacks. Consequently, a highlysecured and robust data encryption scheme is necessary. This paper ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Expert Systems with Applications
سال: 2012
ISSN: 0957-4174
DOI: 10.1016/j.eswa.2012.05.020