Symmetrical Cryptosystems based on Cellular Automata

نویسندگان

چکیده

This paper deals with the development of two symmetric encryption algorithms on basis cellular automata: a block cipher, that is based AES and uses three-dimensional automata; stream exploits hardware-software entropy generation (tracking keystrokes mouse pointer movement), as well developed hash function, “cryptographic sponge” architecture SHA-3, modified by automata transformations. The cipher designed in SP-network substitution block. Permutation layer key rules (rules “22”, “105” “150”). optimal number rounds to achieve maximum crypto resistance determined. cryptographic hash-function SHA-3 architecture. function “30” “146”). procedures shift permutation rows columns used for better permutation. A final state elements improve avalanche effect. received results are analyzed summarized; conclusions justifications about parameters (like rounds, where needed) made.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptosystems Based on Reversible Cellular Automata

We propose the use of reversible cellular automata (RCA) as eecient encryp-tion and decryption devices. The eeciency is due to their inherent parallelism. They can be used both as classical secret-key cryptosystems and as public-key systems.

متن کامل

New Symmetrical Cryptosystems Based on a Dynamic Optimization Model : two-Dimensional non-Uniform Cellular Automata

Today, computer networks are complex and illegal wiretapping is possible. This poses a real problem for the security during transmission of data. For ethical reasons, the transfer of sensitive data cannot be done with such a danger and must protect themselves. Protection best suited for this type of communication is the cryptography. However, despite all its developments, it is still hampered b...

متن کامل

Edge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System

 Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...

متن کامل

Key optimization for automata network based cryptosystems∗

The concept of Glu2kov product was introduced by V. M. Glu2kov in 1961. It was intensively studied by several scientists since the middle of 60's. Contrary of the large number of excellent publications, application of Glu2kov-type products of automata in cryptography did not arise until recent past, when in [1] and [2] the authors introduced novel block ciphers based on the composition of abstr...

متن کامل

Edge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System

 Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computing

سال: 2023

ISSN: ['2312-5381', '1727-6209']

DOI: https://doi.org/10.47839/ijc.22.1.2874