Security measures for Smart Devices through Cryptography Using Cellular Automaton
نویسندگان
چکیده
Present Embedded industry is emphasising more on Smart devices and they have gained much importance in daily life. The devices includes communication, Bio-Medical, image processing, Power, etc. While using smart devices (iButton Technology) data acquisition and user authentication has to be done.Various security concepts are developed to suite these requirement. One such security measure is using cryptography. Cryptography has gained much importance in the recent past due to the advancement in the technology for securing information. Visual Cryptography is such a cryptographic technique through which users hide information securely based on key authentication. This paper examines a new approach in visual cryptography using pextral coding algorithm in the framework of cellular automata. Primarily a 3 x 3 matrix pextral icon is considered. A 2D pextral icon is a convex polygon formed of pixels in a nine neighbourhood enclosing the central pixel. This central pixel is similar to a pixel considered for an image in Cryptography. Dropping one, two or three pixels in the given matrix forms 16 convex polygons. Out of these 16 polygons, few will have mirror symmetry. Two such mirror symmetry polygons were considered and the central pixel of these polygons will form the image pixel. An algorithm is developed to generate two signatures on an ASCII image. Combining the two signatures will reconstruct the original image. Results show that no loss of information and improved security. Keywords— Visual Cryptography, Authentication, Key, Pextral Coding, ASCII Image.
منابع مشابه
Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms
This Security and authentication are the two important criteria for any industrial product controlled through electronics. Microcontrollers interfacing along with electronic circuits, Controls various aspects of industry equipment. One among them is the communication and transfer of data between the equipment. In certain situations a need arises to secure the data and a proper authentication is...
متن کاملA Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One way hash functions are an important tool in achieving authentication and data integrity The aim of this paper is to propose a novel one way hash function based on cellular automata whose cryp tographic properties have been extensively studied over the past decade or so Furthermore security of the proposed one way hash function is analyzed by the use of very recently published results on app...
متن کاملEfficient Cellular Automata Based Versatile Multiplier for GF(2m)
In this paper, a low-complexity Programmable Cellular Automata (PCA) based versatile modular multiplier in GF(2) is presented. The proposed versatile multiplier increases flexibility in using the same multiplier in different security environments, and it reduces the user's cost. Moreover, the multiplier can be easily extended to high order of m for more security, and low-cost serial implementat...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملA New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013