Collective behaviour of cellular automata rules and symmetric key cryptography

被引:0
|
作者
Szaban, Miroslaw [1 ]
Seredynski, Franciszek [1 ,2 ,3 ]
Bouvry, Pascal [4 ]
机构
[1] Univ Podlasie, Dept Comp Sci, Sienkiewicza 51, PL-08110 Siedlce, Poland
[2] Polish Acad Sci, Inst Comp Sci, PL-01237 Warsaw, Poland
[3] Polish-Japanese Inst Informat Technol, PL-02008 Warsaw, Poland
[4] Technol & Commun Luxembourg Univ, Fac Sci, L-1359 Kirchberg, Luxembourg
来源
INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cellular automata (CA) is applied in cryptographic systems. Genetic algorithm (GA) is used to search among predefined set of rules new subsets of rules controlling CA. A high quality pseudorandom numbers sequences (PNSs) are generated by CA applying new subsets of rules. Discovered subset create very efficient cryptographic module used as pseudorandom numbers sequences generator (PNSC). The bad subsets of rules are also discovered and eliminated.
引用
收藏
页码:131 / +
页数:2
相关论文
共 50 条
  • [21] Pattern Generation and Symmetric Key Block Ciphering Using Cellular Automata
    Mehta, Rajat Kumar
    Rani, Rajneesh
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2692 - 2695
  • [22] Identifying cellular automata rules
    Maeda, Ken-Ichi
    Sakama, Chiaki
    JOURNAL OF CELLULAR AUTOMATA, 2007, 2 (01) : 1 - 20
  • [23] THEORY AND APPLICATIONS OF CELLULAR-AUTOMATA IN CRYPTOGRAPHY
    NANDI, S
    KAR, BK
    CHAUDHURI, PP
    IEEE TRANSACTIONS ON COMPUTERS, 1994, 43 (12) : 1346 - 1357
  • [24] Theory and applications of cellular automata in cryptography - Comment
    Blackburn, SR
    Murphy, S
    Paterson, KG
    IEEE TRANSACTIONS ON COMPUTERS, 1997, 46 (05) : 637 - 638
  • [25] Cellular automata cryptography using reconfigurable computing
    George, DFJ
    George, SE
    DEVELOPMENTS IN APPLIED ARTIFICIAL INTELLIGENCE, 2003, 2718 : 104 - 111
  • [26] Theory and applications of cellular automata in cryptography - Reply
    Nandi, S
    Chaudhuri, PP
    IEEE TRANSACTIONS ON COMPUTERS, 1997, 46 (05) : 639 - 639
  • [27] Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata
    Karmakar, Sandip
    Chowdhury, Dipanwita Roy
    CELLULAR AUTOMATA, ACRI 2012, 2012, 7495 : 623 - 632
  • [28] LCASE: Lightweight cellular automata-based symmetric-key encryption
    Tripathy, Somanath
    Nandi, Sukumar
    International Journal of Network Security, 2009, 8 (03) : 243 - 252
  • [29] Reconfigurable pipelined cellular automata array for cryptography
    Zhang, CN
    Li, H
    2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 1213 - 1217
  • [30] CELLULAR AUTOMATA BASED DNA CRYPTOGRAPHY ALGORITHM
    Sundaram, G. Shanmuga
    Pavithra, S.
    Arthi, A.
    Bala, B. Madu
    Mahalakshmi, S.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,