Collective behaviour of cellular automata rules and symmetric key cryptography

被引:0
|
作者
Szaban, Miroslaw [1 ]
Seredynski, Franciszek [1 ,2 ,3 ]
Bouvry, Pascal [4 ]
机构
[1] Univ Podlasie, Dept Comp Sci, Sienkiewicza 51, PL-08110 Siedlce, Poland
[2] Polish Acad Sci, Inst Comp Sci, PL-01237 Warsaw, Poland
[3] Polish-Japanese Inst Informat Technol, PL-02008 Warsaw, Poland
[4] Technol & Commun Luxembourg Univ, Fac Sci, L-1359 Kirchberg, Luxembourg
来源
INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cellular automata (CA) is applied in cryptographic systems. Genetic algorithm (GA) is used to search among predefined set of rules new subsets of rules controlling CA. A high quality pseudorandom numbers sequences (PNSs) are generated by CA applying new subsets of rules. Discovered subset create very efficient cryptographic module used as pseudorandom numbers sequences generator (PNSC). The bad subsets of rules are also discovered and eliminated.
引用
收藏
页码:131 / +
页数:2
相关论文
共 50 条
  • [41] On Cellular Automata rules of molecular arrays
    Sahu, Satyajit
    Oono, Hiroshi
    Ghosh, Subrata
    Bandyopadhyay, Anirban
    Fujita, Daisuke
    Peper, Ferdinand
    Isokawa, Teijiro
    Pati, Ranjit
    NATURAL COMPUTING, 2012, 11 (02) : 311 - 321
  • [42] Symmetric key cryptography on modern graphics hardware
    Yang, Jason
    Goodman, James
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 249 - 264
  • [43] Secure Session Key Sharing Using Symmetric Key Cryptography
    Arora, Shweta
    Hussain, Muzzammil
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 850 - 855
  • [44] Reply to comments on `Theory and application of cellular automata in cryptography'
    Nandi, S.
    Chaudhuri, P.Pal
    IEEE Transactions on Computers, 1997, 5
  • [45] Graphic cryptography with pseudorandom bit generators and cellular automata
    Marañón, GA
    Encinas, LH
    Encinas, AH
    del Rey, AM
    Sánchez, GR
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2003, 2773 : 1207 - 1214
  • [46] A Comparative Study between the Dynamic Behaviours of Standard Cellular Automata and Network Cellular Automata Applied to Cryptography
    Macedo, Heverton B.
    Oliveira, Gina M. B.
    Ribeiro, Carlos H. C.
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2016, 31 (02) : 189 - 207
  • [47] TWO-DIMENSIONAL (2D) CELLULAR AUTOMATA FOR THE VERNAM CIPHER ALGORITHM IN SECRET KEY CRYPTOGRAPHY
    Constantinescu, Nicolae
    Boldea, Costin
    ANNALS OF DAAAM FOR 2009 & PROCEEDINGS OF THE 20TH INTERNATIONAL DAAAM SYMPOSIUM, 2009, 20 : 881 - 882
  • [48] A Password-based Key Establishment Protocol with Symmetric Key Cryptography
    Erguler, Imran
    Anarim, Emin
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 543 - 548
  • [49] On bluetooth repairing: Key agreement based on symmetric-key cryptography
    Vaudenay, S
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 1 - 9
  • [50] NOISY COLLECTIVE BEHAVIOR IN DETERMINISTIC CELLULAR AUTOMATA
    GALLAS, JAC
    GRASSBERGER, P
    HERRMANN, HJ
    UEBERHOLZ, P
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 1992, 180 (1-2) : 19 - 41