Lattice Gas Symmetric Cryptography
نویسنده
چکیده
Lattice gas cellular automata (Lgca) are particular cellular automata that imitate the behavior of particles moving on a lattice. We used a particular set of Lgca rules, called hpp, to mix bits in data blocks and obtain a symmetric cryptographic algorithm. The encryption and decryption keys are the positions of perturbation sites on the lattice (walls). Basically, this paper presents an original way to perform cryptographic operations, based on cellular automata. In this paper, we show several characteristics about our algorithm: typical block size (22n−1), key-length (2), number of rounds (2). We also evaluate avalanche and strict avalanche properties with respect to key and plain text. Finally, we highlight the underbellies of our method and give clues to solve them.
منابع مشابه
The Impact of Quantum Computing on Present Cryptography
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s ...
متن کاملMotion of a driven tracer particle in a one-dimensional symmetric lattice gas.
Motion of a driven tracer particle in a one-dimensional symmetric lattice gas. Abstract Dynamics of a tracer particle subject to a constant driving force E in a one-dimensional lattice gas of hard-core particles whose transition rates are symmetric. We show that the mean displacement of the driven tracer, X T (E, t), grows in time t as X T (E, t) = √ αt, rather than the linear time dependence f...
متن کاملOn Message Integrity in Symmetric Encryption
Distinct notions of message integrity (authenticity) for block-oriented symmetric encryption are defned by i n tegrity goals to be achieved in the face of diferent t ypes of attacks. These notions are partially ordered by a �dominance" relation. When chosen-plaintext attacks are considered, most integrity goals form a lattice. The lattice is extended when known-plaintext and ciphertext-only att...
متن کاملPhase separation of a multiple occupancy lattice gas
A binary lattice gas model that allows for multiple occupancy of lattice sites, inspired by recent coarse-grained descriptions of solutions of interacting polymers, is investigated by combining the steepest descent approximation with an exploration of the multidimensional energy landscape and by Gibbs ensemble Monte Carlo simulations. The one-component version of the model, involving on site an...
متن کاملA Masked Ring-LWE Implementation
Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper, we present a masked ringLWE decryption implementation resistant to first-order side-channel attacks. Our solution has the peculiarity that the entire computation is performed in the masked domain. This is achieved thanks to a new, bespoke masked decoder implementation. The output of the ring-LW...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1306.1519 شماره
صفحات -
تاریخ انتشار 2013