Symmetrical Cryptosystems based on Cellular Automata
نویسندگان
چکیده
This paper deals with the development of two symmetric encryption algorithms on basis cellular automata: a block cipher, that is based AES and uses three-dimensional automata; stream exploits hardware-software entropy generation (tracking keystrokes mouse pointer movement), as well developed hash function, “cryptographic sponge” architecture SHA-3, modified by automata transformations. The cipher designed in SP-network substitution block. Permutation layer key rules (rules “22”, “105” “150”). optimal number rounds to achieve maximum crypto resistance determined. cryptographic hash-function SHA-3 architecture. function “30” “146”). procedures shift permutation rows columns used for better permutation. A final state elements improve avalanche effect. received results are analyzed summarized; conclusions justifications about parameters (like rounds, where needed) made.
منابع مشابه
Cryptosystems Based on Reversible Cellular Automata
We propose the use of reversible cellular automata (RCA) as eecient encryp-tion and decryption devices. The eeciency is due to their inherent parallelism. They can be used both as classical secret-key cryptosystems and as public-key systems.
متن کاملNew Symmetrical Cryptosystems Based on a Dynamic Optimization Model : two-Dimensional non-Uniform Cellular Automata
Today, computer networks are complex and illegal wiretapping is possible. This poses a real problem for the security during transmission of data. For ethical reasons, the transfer of sensitive data cannot be done with such a danger and must protect themselves. Protection best suited for this type of communication is the cryptography. However, despite all its developments, it is still hampered b...
متن کاملEdge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System
Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...
متن کاملKey optimization for automata network based cryptosystems∗
The concept of Glu2kov product was introduced by V. M. Glu2kov in 1961. It was intensively studied by several scientists since the middle of 60's. Contrary of the large number of excellent publications, application of Glu2kov-type products of automata in cryptography did not arise until recent past, when in [1] and [2] the authors introduced novel block ciphers based on the composition of abstr...
متن کاملEdge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System
Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2023
ISSN: ['2312-5381', '1727-6209']
DOI: https://doi.org/10.47839/ijc.22.1.2874