Investigating four neighbourhood cellular automata as better cryptographic primitives

被引:3
|
作者
Jose J. [1 ]
Chowdhury D.R. [1 ]
机构
[1] Crypto Research Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, 721302, West Bengal
来源
Jose, Jimmy (jimmy@cse.iitkgp.ernet.in) | 1675年 / Taru Publications卷 / 20期
关键词
attacks on CA rule 30; Cellular Automata; cryptoproperties of CA; nonlinear CA rules;
D O I
10.1080/09720529.2016.1160533
中图分类号
学科分类号
摘要
Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic primitive. Rule 30, a 3-neighbourhood nonlinear CA rule, was proposed as an ideal candidate for cryptographic primitive by Wolfram. However, rule 30 was shown to be weak against Meier-Staffelbach attack [11]. The cryptographic properties like diffusion and randomness increase with increase in neighbourhood radius and thus opens the avenue of exploring the cryptographic properties of 4-neighbourhood CA. This work explores whether 4-neighbourhood CA can be a better cryptographic primitive. We construct a class of cryptographically suitable 4-neighbourhood nonlinear CA rules that resembles rule 30 and study its cryptographic properties. Four-neighbourhood nonlinear CA are shown to be resistant against Meier-Staffelbach attack on rule 30, justifying the applicability of 4-neighbourhood CA as better cryptographic primitives. © 2018 Taru Publications.
引用
收藏
页码:1675 / 1695
页数:20
相关论文
共 50 条
  • [1] Dynamic Neighbourhood Cellular Automata
    Dantchev, Stefan
    COMPUTER JOURNAL, 2011, 54 (01): : 26 - 30
  • [2] Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
    Boichut, Yohan
    Heam, Pierre-Cyrille
    Kouchnarenko, Olga
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 239 : 57 - 72
  • [3] Chaotic Cellular Automata with Cryptographic Application
    Fuster-Sabater, Amparo
    Caballero-Gil, Pino
    CELLULAR AUTOMATA, 2010, 6350 : 251 - +
  • [4] The Cryptographic Properties of Von Neumann Cellular Automata
    Escuadra Burrieza, J.
    Martin del Rey, A.
    Perez Iglesias, J. L.
    Rodriguez Sanchez, G.
    Queiruga Dios, A.
    de la Villa Cuenca, A.
    EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2010, 3 (04): : 765 - 778
  • [5] Design of cellular automata hardware for cryptographic applications
    Franti, E
    Slav, C
    Balan, T
    Dascalu, M
    2004 International Semiconductor Conference, Vols 1and 2, Proceedings, 2004, : 463 - 466
  • [6] Simulator for testing cellular automata cryptographic algoritms
    Franti, Eduard
    Dascalu, Monica
    WSEAS Transactions on Information Science and Applications, 2006, 3 (07): : 1383 - 1388
  • [7] Cryptographic Properties of Bipermutive Cellular Automata Rules
    Leporati, Alberto
    Mariot, Luca
    JOURNAL OF CELLULAR AUTOMATA, 2014, 9 (5-6) : 437 - 475
  • [8] A New Cryptographic Scheme Based on Cellular Automata
    Bouchkaren, Said
    Lazaar, Saiida
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 663 - 668
  • [9] On the Use of Linear Cellular Automata for the Synthesis of Cryptographic Sequences
    Fuster-Sabater, A.
    Caballero-Gil, P.
    Delgado, O.
    HYBRID ARTIFICIAL INTELLIGENCE SYSTEMS, 2008, 5271 : 475 - +
  • [10] Cryptographic Services Based on Elementary and Chaotic Cellular Automata
    Corona-Bermudez, Erendira
    Carlos Chimal-Eguia, Juan
    Tellez-Castillo, German
    ELECTRONICS, 2022, 11 (04)