An Application of Non-Uniform Cellular Automata for Efficient Cryptography

Kumaravel, A.; Meetei, Oinam Nickson
May 2013
Indian Journal of Science & Technology;May2013, Vol. 6 Issue 5 Supp., p4560
Academic Journal
One of the core issues for robust cryptographic systems is to deal with the rate of diffusion and distribution of keys. We try to strengthen this aspect by increasing the length of block ciphers. We present a new encryption and decryption algorithm for block cipher that supports 27 bit block size. All components in our system are chosen to be based on cellular automata so as to achieve higher parallelism and to simplify the in hardware and software implementation for applications with high degree of security. The main objective of this paper is to increase the complexity by novel schemes of mixing (reversible cellular automata) RCA and (non-uniform reversible cellular automata) NRCA. We apply set of different bit permutation methods for this purpose .This paper establishes the proof for existence of yet another approach for a high quality pseudorandom bit sequences generated by non uniform cellular automata


Related Articles

  • A Block Cipher using Graph Structures and Logical XOR Operation. Suneetha, C. H.; Kumar, D. Sravan; sekhar, A. Chandra // International Journal of Computer Applications;Nov2011, Vol. 33, p6 

    Cryptography is the science of making and breaking the secret communications. Due to wide spread use of internet in modern times virtually every computer in the world is connected to every other computer. So, there is a threat of hacking and stealing of the message. In general cryptographic...

  • A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix. Sastry, V. U. K.; Kumar, K. Anup // International Journal of Advanced Computer Science & Application;2012, Vol. 3 Issue 7, p35 

    In this paper, we have developed a block cipher by modifying the Feistel cipher. In this, the plaintext is taken in the form of a pair of matrices. In one of the relations of encryption the plaintext is multiplied with the key matrix on both the sides. Consequently, we use the modular arithmetic...

  • Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm. Das, Debasis; Misra, Rajiv // International Journal of Network Security & Its Applications;Nov2011, Vol. 3 Issue 6, p197 

    Cellular Automata(CA) is a discrete computing model which provides simple, flexible and efficient platform for simulating complicated systems and performing complex computation based on the neighborhoods information. CA consists of two components 1) a set of cells and 2) a set of rules....

  • A New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams. Kallam, Ravindra Babu; Kumar, S. Udaya; Babu, A. Vinaya // International Journal of Computer Applications;Apr2011, Vol. 20, p37 

    The aim of our research is to develop a new framework for secure block cipher generation using color substitution and permutations on alphanumeric letters, symbols, images, diagrams or any kind of text. To transfer the keys from source to destination we have used RSA public key algorithm and for...

  • Block TEA based on Chaotic Systems. Bhaskar, Ch. Udaya; Sree, S. Rama // International Journal of Computer Applications;May2012, Vol. 46, p32 

    This Paper proposes a new Symmetric Block Cipher based on chaotic systems. This cipher has improved security, realizes the idea behind one time pad and works with different block sizes of plaintext. It also has characteristics like fast operation, precise restoration and non-extra distortion.

  • A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis. Aruljothi, Soosaimicheal; Venkatesulu, Mandadi // International Journal of Computer Applications;7/1/2012, Vol. 50, p1 

    The prominent block cipher algorithms use two key schemes that characterize different use of keys in the encryption/decryption process. In the family of DES algorithms the keys are used as position pointers for input matrix; in the family of AES algorithm the keys are used as co operand with...

  • PES32-16 network consisting of sixteen round functions. Tuichiyev, G. // Ukrainian Scientific Journal of Information Security;2014, Vol. 20 Issue 1, p43 

    Using the cryptographic methods is one of most effective way to provide information confidentiality. From the viewpoint of modern computation technologies cryptographic algorithms developing and improving (such as block symmetric algorithms) are actual scientific problem. In this paper we...

  • Improving quality of DES S-boxes by cellular automata-based S-boxes. Szaban, Miroslaw; Seredynski, Franciszek // Journal of Supercomputing;Aug2011, Vol. 57 Issue 2, p216 

    In the paper we use recently proposed cellular automata (CA) based methodology (Szaban and Seredynski in LNCS, vol. 5191, pp. 478-485, ) to design the 6×4 S-boxes functionally equivalent to S-boxes used in current cryptographic standard known as Data Encryption Standard (DES). We provide an...

  • Image Encryption Using Chaotic Map and Block Chaining. Abuhaiba, Ibrahim S. I.; Abuthraya, Hanan M.; Hubboub, Huda B.; Salamah, Ruba A. // International Journal of Computer Network & Information Security;Jul2012, Vol. 4 Issue 7, p19 

    In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryption is proposed. It is a simple block cipher based on logistic chaotic maps and cipher block chaining (CBC). The new system utilizes simplicity of implementation, high quality, and enhanced security by the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics