Key optimization for automata network based cryptosystems∗
نویسندگان
چکیده
The concept of Glu2kov product was introduced by V. M. Glu2kov in 1961. It was intensively studied by several scientists since the middle of 60's. Contrary of the large number of excellent publications, application of Glu2kov-type products of automata in cryptography did not arise until recent past, when in [1] and [2] the authors introduced novel block ciphers based on the composition of abstract nite automata without outputs. In both cryptosystem, the size of the key automaton exceeds the standard key size of block ciphers. In this presentation we are going to introduce the concept of latin cubes, and we are going to show a new method for generating key automaton having a latin cube form. Using this new key generating algorithm, the cryptosystems are able to build up the whole key automaton from a short keyword.
منابع مشابه
QTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملOn Finite Automaton One-Key Cryptosystems
This paper reviews some works on finite automaton one-key cryptosystems and related topics such as autonomous finite automata and Latin arrays. It is well known that shift registers are important sequence generators in stream ciphers. But shift registers are merely a special kind of autonomous finite automata. Finite automata were considered as suitable mathematical models of cryptosystems from...
متن کاملCryptosystems Based on Reversible Cellular Automata
We propose the use of reversible cellular automata (RCA) as eecient encryp-tion and decryption devices. The eeciency is due to their inherent parallelism. They can be used both as classical secret-key cryptosystems and as public-key systems.
متن کاملA New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata
Many cryptosystems have been released to secure electronic data on internet. Some data are very critical to be transmitted as plaintext. Thus, to ensure the data confidentiality and integrity, a list of cryptosystems have been elaborated. The most important ones are divided into two categories: symmetric algorithms encrypting and decrypting data in blocks using a single secret key; and asymmetr...
متن کاملNew Symmetrical Cryptosystems Based on a Dynamic Optimization Model : two-Dimensional non-Uniform Cellular Automata
Today, computer networks are complex and illegal wiretapping is possible. This poses a real problem for the security during transmission of data. For ethical reasons, the transfer of sensitive data cannot be done with such a danger and must protect themselves. Protection best suited for this type of communication is the cryptography. However, despite all its developments, it is still hampered b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014