Application of Cellular Automata in Symmetric Key Cryptography

被引:0
作者
Szaban, Miroslaw [1 ]
Nowacki, Jerzy Pawel [2 ]
Drabik, Aldona [2 ]
Seredynski, Franciszek [3 ]
Bouvry, Pascal [4 ]
机构
[1] Univ Podlasie, Inst Comp Sci, 3 Go Maja 54, PL-08110 Siedlce, Poland
[2] Polish Japanese Inst Informat Technol, Warsaw, Poland
[3] Polish Japanese Inst Informat Technol, Polish Acad Sci, Inst Comp Sci, Warsaw, Poland
[4] Univ Luxembourg, Fac Sci Technol & Comm, Luxembourg, Luxembourg
来源
ADVANCES IN INFORMATION TECHNOLOGY | 2010年 / 114卷
关键词
Cellular Automata; S-boxes; Block Cipher; Cryptography; Boolean Functions; STRONG S-BOXES; DESIGN;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main concern of this paper is cryptosystems with a symmetric key, in particular block ciphers. The most important components of block ciphers are substitution boxes (S-boxes). Developing methods of cryptanalysis make ciphers worked on classical S-boxes not safe enough. Therefore, we propose a methodology of generation cellular automata (CA)-based S-boxes with enhanced quality. We provide an exhaustive experimental analysis of the proposed CA-based S-boxes in terms of non-linearity, autocorrelation, balance and strict avalanche criterion. We show that proposed S-boxes have high cryptographic quality. The interesting feature of the proposed S-boxes is a dynamic flexible structure, fully functionally realized by CA, while the classical S-boxes are represented by fixed table structures.
引用
收藏
页码:154 / +
页数:3
相关论文
共 17 条
[1]  
ADAMS C, 1990, LECT NOTES COMPUT SC, V435, P612
[2]  
Albert J., 1987, Complex Systems, V1, P1
[3]  
[Anonymous], 2002, A New Kind of Science
[4]  
[Anonymous], 2001, FIPS PUBS
[5]   The design of s-boxes by simulated annealing [J].
Clark, JA ;
Jacob, JL ;
Stepney, S .
NEW GENERATION COMPUTING, 2005, 23 (03) :219-231
[6]  
Dowson E., 2000, CONTRIBUTIONS GEN AL, V12, P1
[7]   CRYPTOGRAPHY AND COMPUTER PRIVACY [J].
FEISTEL, H .
SCIENTIFIC AMERICAN, 1973, 228 (05) :15-23
[8]  
*FIPS, 1999, FIPS PUB, V463
[9]  
Milian W., 1982, LNCS, V143, P181
[10]  
Millan W, 1999, LECT NOTES COMPUT SC, V1726, P263