Encryption and Decryption algorithm using two dimensional cellular automata rules in Cryptography
نویسندگان
چکیده
In this paper we present a new encryption and decryption algorithm for block cipher based on the linear (periodic boundary-PB) and nonlinear cellular automata rules. First we apply non linear CA rules (complements) to both plain text and key. Then PB CA rule is applied to the above results separately followed by the XOR operation of above results. After that the result of XOR operation is fed to substitution box(S-box) and again PB CA rules are applied followed by SBox. The decryption process is carried out just similar to that of encryption but in the reverse way. Both the process of encryption and decryption is performed for 8 number of rounds in order to avoid the dependency between the plain text and cipher text so that the our proposed algorithm is more secure than that of AES and DES algorithms. Keywords-Cryptography, cellular automata, substitution byte, linear, non linear, Periodic boundary, correlation immunity
منابع مشابه
ارائه روشی برای رمزنگاری تصاویر با استفاده از اتوماتای سلولی ترکیبی
In this paper, a new structure for image encryption using hybrid cellular automata is presented. The image encryption is done in two steps. At the first step, each pixel is encrypted by rules of hybrid cellular automata. In the next step, each pixel converted to a binary number and each bit is encrypted by rules of cellular automata. The rules are made by a function. Due to reversibility of cel...
متن کاملA Fast Cryptosystem Using Reversible Cellular Automata
This article defines a new algorithm for a secret key cryptosystem using cellular automata which is a promising approach to cryptography. Our algorithm is based on cellular automata built on a set of reversible rules which have the ability to construct unpredictable secret keys using MARGOLUS neighborhood. To prove the feasibility of the algorithm, we present some tests of encryption, decryptio...
متن کاملرمزنگاری تصاویر با استفاده از اتوماتای سلولی برگشت پذیر
In this paper, a new structure for image encryption using recursive cellular automatais presented. The image encryption contains three recursive cellular automata in three steps, individually. At the first step, the image is blocked and the pixels are substituted. In the next step, pixels are scrambledby the second cellular automata and at the last step, the blocks are attachedtogether and the ...
متن کاملA RCA Approach to Design Cryptographic Algorithm
The paper presents a Reversible cellular automata based one dimensional cryptographic algorithm. This algorithm use specially selected reversible rules which are cryptographically secure and faster to compute. The strength and quality of the algorithm depends upon the rules used and the randomness of number used in the process of encryption and decryption. This algorithm also implements CA base...
متن کاملSimulator for Testing Cellular Automata Cryptographic Algorithms
This paper presents, a simulator that aims the development and design of cellular-automata based cryptographic algorithms. This software is necessary mainly in order to choose a (large) set of local rules as possible keys that should be integrated in hardware. The software accepts linear and two-dimensional cellular automata having variable dimensions, limited to 100/100 cells (that gives a max...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011