Collective behaviour of cellular automata rules and symmetric key cryptography

被引:0
|
作者
Szaban, Miroslaw [1 ]
Seredynski, Franciszek [1 ,2 ,3 ]
Bouvry, Pascal [4 ]
机构
[1] Univ Podlasie, Dept Comp Sci, Sienkiewicza 51, PL-08110 Siedlce, Poland
[2] Polish Acad Sci, Inst Comp Sci, PL-01237 Warsaw, Poland
[3] Polish-Japanese Inst Informat Technol, PL-02008 Warsaw, Poland
[4] Technol & Commun Luxembourg Univ, Fac Sci, L-1359 Kirchberg, Luxembourg
来源
INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cellular automata (CA) is applied in cryptographic systems. Genetic algorithm (GA) is used to search among predefined set of rules new subsets of rules controlling CA. A high quality pseudorandom numbers sequences (PNSs) are generated by CA applying new subsets of rules. Discovered subset create very efficient cryptographic module used as pseudorandom numbers sequences generator (PNSC). The bad subsets of rules are also discovered and eliminated.
引用
收藏
页码:131 / +
页数:2
相关论文
共 50 条
  • [1] Application of Cellular Automata in Symmetric Key Cryptography
    Roy, Satyabrata
    Nandi, Subrata
    Dansana, Jayanti
    Pattnaik, Prasant Kumar
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [2] Application of Cellular Automata in Symmetric Key Cryptography
    Szaban, Miroslaw
    Nowacki, Jerzy Pawel
    Drabik, Aldona
    Seredynski, Franciszek
    Bouvry, Pascal
    ADVANCES IN INFORMATION TECHNOLOGY, 2010, 114 : 154 - +
  • [3] On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography
    Sethi, Biswanath
    Das, Sukanta
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 30 - 41
  • [4] On the use of cellular automata in symmetric cryptography
    Fuster-Sabater, A.
    Caballero-Gil, P.
    ACTA APPLICANDAE MATHEMATICAE, 2006, 93 (1-3) : 215 - 236
  • [5] On the Use of Cellular Automata in Symmetric Cryptography
    A. Fúster-Sabater
    P. Caballero-Gil
    Acta Applicandae Mathematica, 2006, 93 : 215 - 236
  • [6] Evolving collective Behavior of cellular automata for cryptography
    Szaban, Miroslaw
    Seredynski, Franciszek
    Bouvry, Pascal
    CIRCUITS AND SYSTEMS FOR SIGNAL PROCESSING , INFORMATION AND COMMUNICATION TECHNOLOGIES, AND POWER SOURCES AND SYSTEMS, VOL 1 AND 2, PROCEEDINGS, 2006, : 799 - 802
  • [7] A symmetric cryptography based on extended cellular automata
    Zhao, XL
    Li, QM
    Xu, MW
    Liu, FY
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 499 - 503
  • [8] Cellular automata with symmetric local rules
    Kornyak, Vladimir V.
    COMPUTER ALGEBRA IN SCIENTIFIC COMPUTING, PROCEEDINGS, 2006, 4194 : 240 - 250
  • [9] Cellular automata computations and secret key cryptography
    Seredynski, F
    Bouvry, P
    Zomaya, AY
    PARALLEL COMPUTING, 2004, 30 (5-6) : 753 - 766
  • [10] Cellular programming and symmetric key cryptography systems
    Seredynski, F
    Bouvry, P
    Zomaya, AY
    GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2003, PT II, PROCEEDINGS, 2003, 2724 : 1369 - 1381