Design of Stream Cipher for Encryption of Data Using Cellular Automata
نویسندگان
چکیده
Pseudo-random number generators (PRNGs) are a key component of stream ciphers used for encryption purposes. While Non linear Feedback Shift Registers (NFSRs) combined with cellular automata has been utilized for PRNGs, the use of cellular automata (CA) is another viable option. This paper explores the combination of NFSRs and CA as the key components of an efficient stream cipher design for implementation on Field Programmable Gate Arrays (FPGAs). The proposed stream cipher design builds upon a recent published design known as A2U2, which uses the principles of stream cipher and approaches from block cipher design. Comparisons with the A2U2 design indicate that the use of CA have the potential to improve the quality of the random numbers generated and hence increase the security of the cipher. .
منابع مشابه
Grayscale Image Encryption using Cellular Automata
1. Seredynski M, Bouvary P.Block cipher based on reversible cellular automata. New Gener Comput 2005 ; 23: 245–58 (Ohmsha Ltd and Springer) 2. Faraoun Kamel,” Fast encryption of RGB color digital images using a tweakable cellular automaton based schema Optics & Laser Technology 64 (2014) 145–155 3. Toffoli TT ,Margolus N.Invertible cellular automata : a review . Physica D 2001;45:229–53. 4. Sza...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملNovel Stream Cipher Using SCAN and Variable Ordered Recursive CA Substitutions and Its DSP+FPGA Implementation
This paper presents a new stream cipher for data security, which is based on permutation of the data and replacement of the data values. Permutation is done by scan patterns generated by the SCAN approach. The replacement of data values using variable ordered recursive cellular automata (CA) substitutions. To achieve this aim, an encryption-specific SCAN technique was firstly developed, 2-D hyb...
متن کاملرمزنگاری تصاویر با استفاده از اتوماتای سلولی برگشت پذیر
In this paper, a new structure for image encryption using recursive cellular automatais presented. The image encryption contains three recursive cellular automata in three steps, individually. At the first step, the image is blocked and the pixels are substituted. In the next step, pixels are scrambledby the second cellular automata and at the last step, the blocks are attachedtogether and the ...
متن کاملارائه روشی برای رمزنگاری تصاویر با استفاده از اتوماتای سلولی ترکیبی
In this paper, a new structure for image encryption using hybrid cellular automata is presented. The image encryption is done in two steps. At the first step, each pixel is encrypted by rules of hybrid cellular automata. In the next step, each pixel converted to a binary number and each bit is encrypted by rules of cellular automata. The rules are made by a function. Due to reversibility of cel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014