Insights Gained After a Decade of Cellular Automata-Based Cryptography

被引:0
作者
Mariot, Luca [1 ]
机构
[1] Univ Twente, Semant Cybersecur & Serv Grp, Drienerlolaan 5, NL-7522 NB Enschede, Netherlands
来源
CELLULAR AUTOMATA AND DISCRETE COMPLEX SYSTEMS, AUTOMATA 2024 | 2024年 / 14782卷
关键词
cellular automata; cryptography; stream ciphers; block ciphers; Boolean functions; pseudorandom number generators; DESIGN; FPN;
D O I
10.1007/978-3-031-65887-7_3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cellular Automata (CA) have been extensively used to implement symmetric cryptographic primitives, such as pseudorandom number generators and S-boxes. However, most of the research in this field, except the very early works, seems to be published in non-cryptographic venues. This phenomenon poses a problem of relevance: are CA of any use to cryptographers nowadays? This paper provides insights into this question by briefly outlining the history of CA-based cryptography. In doing so, the paper identifies some shortcomings in the research addressing the design of symmetric primitives exclusively from a CA standpoint, alongside some recommendations for future research. Notably, the paper remarks that researchers working in CA and cryptography often tackle similar problems, albeit under different perspectives and terminologies. This observation indicates that there is still ample room for fruitful collaborations between the CA and cryptography communities in the future.
引用
收藏
页码:35 / 54
页数:20
相关论文
共 50 条
[21]   Cellular automata-based approach for digital image scrambling [J].
Jeelani, Zubair ;
Qadir, Fasel .
INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2018, 11 (03) :353-370
[22]   Cellular automata-based systems with fault-tolerance [J].
Zaloudek, Ludek ;
Sekanina, Lukas .
NATURAL COMPUTING, 2012, 11 (04) :673-685
[23]   A Coevolutionary Approach to Cellular Automata-Based Task Scheduling [J].
Oliveira, Gina M. B. ;
Vidica, Paulo M. .
CELLULAR AUTOMATA, ACRI 2012, 2012, 7495 :111-120
[24]   Improving quality of DES S-boxes by cellular automata-based S-boxes [J].
Szaban, Miroslaw ;
Seredynski, Franciszek .
JOURNAL OF SUPERCOMPUTING, 2011, 57 (02) :216-226
[25]   Improving quality of DES S-boxes by cellular automata-based S-boxes [J].
Miroslaw Szaban ;
Franciszek Seredynski .
The Journal of Supercomputing, 2011, 57 :216-226
[26]   Cellular Automata-Based S-Boxes vs. DES S-Boxes [J].
Szaban, Miroslaw ;
Seredynski, Franciszek .
PARALLEL COMPUTING TECHNOLOGIES, PROCEEDINGS, 2009, 5698 :269-+
[27]   A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers [J].
Henricksen, Matt .
ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 :69-78
[28]   A Cheating Model for Cellular Automata-Based Secret Sharing Schemes [J].
Jafarpour, Borna ;
Nematzadeh, Azadeh ;
Kazempour, Vahid ;
Sadeghian, Babak .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 25, 2007, 25 :306-+
[29]   Application of Cellular Automata in Symmetric Key Cryptography [J].
Roy, Satyabrata ;
Nandi, Subrata ;
Dansana, Jayanti ;
Pattnaik, Prasant Kumar .
2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
[30]   Data clustering using a linear cellular automata-based algorithm [J].
de Lope, Javier ;
Maravall, Dario .
NEUROCOMPUTING, 2013, 114 :86-91