Investigating four neighbourhood cellular automata as better cryptographic primitives

被引:3
|
作者
Jose J. [1 ]
Chowdhury D.R. [1 ]
机构
[1] Crypto Research Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, 721302, West Bengal
来源
Jose, Jimmy (jimmy@cse.iitkgp.ernet.in) | 1675年 / Taru Publications卷 / 20期
关键词
attacks on CA rule 30; Cellular Automata; cryptoproperties of CA; nonlinear CA rules;
D O I
10.1080/09720529.2016.1160533
中图分类号
学科分类号
摘要
Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic primitive. Rule 30, a 3-neighbourhood nonlinear CA rule, was proposed as an ideal candidate for cryptographic primitive by Wolfram. However, rule 30 was shown to be weak against Meier-Staffelbach attack [11]. The cryptographic properties like diffusion and randomness increase with increase in neighbourhood radius and thus opens the avenue of exploring the cryptographic properties of 4-neighbourhood CA. This work explores whether 4-neighbourhood CA can be a better cryptographic primitive. We construct a class of cryptographically suitable 4-neighbourhood nonlinear CA rules that resembles rule 30 and study its cryptographic properties. Four-neighbourhood nonlinear CA are shown to be resistant against Meier-Staffelbach attack on rule 30, justifying the applicability of 4-neighbourhood CA as better cryptographic primitives. © 2018 Taru Publications.
引用
收藏
页码:1675 / 1695
页数:20
相关论文
共 50 条
  • [31] Investigating topological chaos by elementary cellular automata dynamics
    Cattaneo, G
    Finelli, M
    Margara, L
    THEORETICAL COMPUTER SCIENCE, 2000, 244 (1-2) : 219 - 241
  • [32] Secret Key Specification for a Variable-Length Cryptographic Cellular Automata Model
    Oliveira, Gina M. B.
    Martins, Luiz G. A.
    Ferreira, Giordano B.
    Alt, Leonardo S.
    PARALLEL PROBLEM SOLVING FROM NATURE-PPSN XI, PT II, 2010, 6239 : 381 - 390
  • [33] Cellular automata cryptographic model based on bi-directional toggle rules
    Oliveira, GMB
    Coelho, AR
    Monteiro, LHA
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2004, 15 (08): : 1061 - 1068
  • [34] Cryptographic models of nanocommunicaton network using quantum dot cellular automata: A survey
    Debnath, Bikash
    Das, Jadav Chandra
    De, Debashis
    IET QUANTUM COMMUNICATION, 2021, 2 (03): : 98 - 121
  • [35] Parallel cryptographic hash function based on cellular automata and random diffusion model
    Yang, Yijun
    Wan, Huan
    Yan, Xiaohu
    Zhao, Ming
    Zeng, Jianhua
    Li, Bin
    APPLIED SOFT COMPUTING, 2025, 169
  • [36] Nanoscale cryptographic architecture design using quantum-dot cellular automata
    Bikash Debnath
    Jadav Chandra Das
    Debashis De
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 1578 - 1586
  • [37] Nanoscale cryptographic architecture design using quantum-dot cellular automata
    Debnath, Bikash
    Das, Jadav Chandra
    De, Debashis
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (11) : 1578 - 1586
  • [38] Building secure and fast cryptographic hash functions using programmable cellular automata
    Computer Sciences Department, Djillali Liabes University of Sidi Bel Abbes, Algeria
    J. Compt. Inf. Technol., 4 (317-328):
  • [39] Hardening Encrypted Patient Names Against Cryptographic Attacks Using Cellular Automata
    Schnell, Rainer
    Borgs, Christian
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 518 - 522
  • [40] An Observation of Cryptographic Properties of 256 One-Dimensional Cellular Automata Rules
    Jamil, Norziana
    Mahmood, Ramlan
    Z'aba, Muhammad Reza
    Zukarnaen, Zuriati Ahmad
    Udzir, Nur Izura
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 409 - +