Lattice Gas Symmetric Cryptography

نویسنده

  • Laurent Signac
چکیده

Lattice gas cellular automata (Lgca) are particular cellular automata that imitate the behavior of particles moving on a lattice. We used a particular set of Lgca rules, called hpp, to mix bits in data blocks and obtain a symmetric cryptographic algorithm. The encryption and decryption keys are the positions of perturbation sites on the lattice (walls). Basically, this paper presents an original way to perform cryptographic operations, based on cellular automata. In this paper, we show several characteristics about our algorithm: typical block size (22n−1), key-length (2), number of rounds (2). We also evaluate avalanche and strict avalanche properties with respect to key and plain text. Finally, we highlight the underbellies of our method and give clues to solve them.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impact of Quantum Computing on Present Cryptography

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s ...

متن کامل

Motion of a driven tracer particle in a one-dimensional symmetric lattice gas.

Motion of a driven tracer particle in a one-dimensional symmetric lattice gas. Abstract Dynamics of a tracer particle subject to a constant driving force E in a one-dimensional lattice gas of hard-core particles whose transition rates are symmetric. We show that the mean displacement of the driven tracer, X T (E, t), grows in time t as X T (E, t) = √ αt, rather than the linear time dependence f...

متن کامل

On Message Integrity in Symmetric Encryption

Distinct notions of message integrity (authenticity) for block-oriented symmetric encryption are defned by i n tegrity goals to be achieved in the face of diferent t ypes of attacks. These notions are partially ordered by a �dominance" relation. When chosen-plaintext attacks are considered, most integrity goals form a lattice. The lattice is extended when known-plaintext and ciphertext-only att...

متن کامل

Phase separation of a multiple occupancy lattice gas

A binary lattice gas model that allows for multiple occupancy of lattice sites, inspired by recent coarse-grained descriptions of solutions of interacting polymers, is investigated by combining the steepest descent approximation with an exploration of the multidimensional energy landscape and by Gibbs ensemble Monte Carlo simulations. The one-component version of the model, involving on site an...

متن کامل

A Masked Ring-LWE Implementation

Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper, we present a masked ringLWE decryption implementation resistant to first-order side-channel attacks. Our solution has the peculiarity that the entire computation is performed in the masked domain. This is achieved thanks to a new, bespoke masked decoder implementation. The output of the ring-LW...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1306.1519  شماره 

صفحات  -

تاریخ انتشار 2013