Theory and applications of cellular automata in cryptography
- 1 December 1994
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computers
- Vol. 43 (12) , 1346-1357
- https://doi.org/10.1109/12.338094
Abstract
This paper deals with the theory and application of Cellular Automata (CA) for a class of block ciphers and stream ciphers. Based on CA state transitions certain fundamental transformations are defined which are block ciphering functions of the proposed enciphering scheme, These fundamental transformations are found to generate the simple (alternating) group of even permutations which in turn is a subgroup of the permutation group, These functions are implemented with a class of programmable cellular automata (PCA) built around rules 51, 153, and 195. Further, high quality pseudorandom pattern generators built around rule 90 and 150 programmable cellular automata with a rule selector (i.e., combining function) has been proposed as running key generators in stream ciphers, Both the schemes provide better security against different types of attacks. With a simple, regular, modular and cascadable structure of CA, hardware implementation of such schemes idealy suit VLSI implementation.<>Keywords
This publication has 18 references indexed in Scilit:
- Analysis of cellular automata used as pseudorandom pattern generatorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Design of CAECC - cellular automata based error correcting codeIEEE Transactions on Computers, 1994
- Vector space theoretic analysis of additive cellular automata and its application for pseudoexhaustive test pattern generationIEEE Transactions on Computers, 1993
- Correlation properties of combiners with memory in stream ciphersJournal of Cryptology, 1992
- Permutation generators of alternating groupsPublished by Springer Nature ,1990
- Public-Key CryptographyPublished by Springer Nature ,1990
- Group Properties of Cellular Automata and VLSI ApplicationsIEEE Transactions on Computers, 1986
- Decrypting a Class of Stream Ciphers Using Ciphertext OnlyIEEE Transactions on Computers, 1985
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)IEEE Transactions on Information Theory, 1984
- DES-like functions can generate the alternating groupIEEE Transactions on Information Theory, 1983