Generation of expander graphs using cellular automata and its applications to cryptography

被引:0
作者
Mukhopadhyay, Debdeep [1 ]
RoyChowdhury, Dipanwita [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
CELLULAR AUTOMATA, PROCEEDINGS | 2006年 / 4173卷
关键词
expander graphs; cellular automata; one-way functions; security; efficiency;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper proposes a methodology to generate family of expander graphs based on Two Predecessor Single Attractor Cellular Automata (TPSA-CA). The construction is finally applied to develop a one-way function whose security lies on the combinatorial properties of the expander graph. It is shown that while the forward transformation of the one-way function is computationally efficient the inverse operation appears to be intractable. Such a one-way function can be an ideal candidate for one-way functions and thus help to develop fast and secure key establishment protocols.
引用
收藏
页码:636 / 645
页数:10
相关论文
共 50 条
  • [11] Application of Cellular Automata in Symmetric Key Cryptography
    Roy, Satyabrata
    Nandi, Subrata
    Dansana, Jayanti
    Pattnaik, Prasant Kumar
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [12] Cellular automata computations and secret key cryptography
    Seredynski, F
    Bouvry, P
    Zomaya, AY
    PARALLEL COMPUTING, 2004, 30 (5-6) : 753 - 766
  • [13] CELLULAR AUTOMATA BASED DNA CRYPTOGRAPHY ALGORITHM
    Sundaram, G. Shanmuga
    Pavithra, S.
    Arthi, A.
    Bala, B. Madu
    Mahalakshmi, S.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [14] Application of Cellular Automata in Symmetric Key Cryptography
    Szaban, Miroslaw
    Nowacki, Jerzy Pawel
    Drabik, Aldona
    Seredynski, Franciszek
    Bouvry, Pascal
    ADVANCES IN INFORMATION TECHNOLOGY, 2010, 114 : 154 - +
  • [15] A symmetric cryptography based on extended cellular automata
    Zhao, XL
    Li, QM
    Xu, MW
    Liu, FY
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 499 - 503
  • [16] Encryption using two-dimensional cellular automata with applications
    Srebrny, M
    Such, P
    ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 203 - 215
  • [17] CELLULAR AUTOMATA BASED IMAGE AUTHENTICATION SCHEME USING EXTENDED VISUAL CRYPTOGRAPHY
    Kukreja, Sonal
    Kasana, Geeta
    Kasana, Singara Singh
    COMPUTING AND INFORMATICS, 2019, 38 (06) : 1272 - 1300
  • [18] Cellular Automata Applications
    Andreica, Anca
    2019 21ST INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2019), 2020, : 3 - 3
  • [19] Lorentz gas cellular automata on graphs
    Bunimovich, LA
    Kreslavskiy, DM
    THEORETICAL COMPUTER SCIENCE, 2003, 306 (1-3) : 195 - 221
  • [20] Pattern generation using likelihood inference for cellular automata
    Craiu, RV
    Lee, TCM
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (07) : 1718 - 1727