Secret Key Specification for a Variable-Length Cryptographic Cellular Automata Model

نویسندگان

  • Gina Maira Barbosa de Oliveira
  • Luiz G. A. Martins
  • Giordano B. Ferreira
  • Leonardo S. Alt
چکیده

Reverse algorithm was previously evaluated as encryption method concluding that its simple adoption is unviable, since it does not assurance the pre-image existence. Variable-Length Encryption Method (VLE) was proposed where a alternative algorithm with extra bits is adopted when pre-image computation is not possible. If an adequate secret key is used with VLE it is expected that the final ciphertext length is close to plaintext size. Several CA static parameters were calculated for a set formed by all radius 2 right-toggle rules. A database was generated associating rules performance in VLE ciphering with its parameters. A genetic algorithm-based data mining was performed to discover an adequate key specification based on CA parameters. Using such specification, ciphertext length is short, encryption process returns high entropy and VLE has a good protection against differential cryptanalysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exhaustive Evaluation of Radius 2 Toggle Rules for a Variable-Length Cryptographic Cellular Automata-Based Model

A cellular automata (CA) model in cryptography is investigated. A previous work analyzed the usage of reverse algorithm for pre-image computation as an encryption method. The main conclusion was that the simple adoption of such method is not viable, since it does not have 100% of guarantee of pre-image existence. A new approach was proposed that uses extra bits when the pre-image computation is...

متن کامل

Deeper Investigating Adequate

Cellular automata (CA) are particularly well suited for cryptographic application and there are several previous studies in this topic (Benkiniouar & Benmohamed, 2004; Gutowitz, 1995; Kari, 1992; Nandi et al., 1994; Oliveira et al., 2004; 2008; Seredynski et al., 2003; Tomassini & Perrenoud, 2000; Wuensche, 2008; Wolfram, 1986). Since CA rule is simple, local and discrete, it can be executed in...

متن کامل

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). It is a kind of secret-sharing scheme that encrypts the secret image into n number of shares. It is imperceptible to reveal the secret information unless a certain number of shares(k) or more are superimposed. As the decryption process is d...

متن کامل

Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number

Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). It is a kind of secret-sharing scheme that encrypts the secret image into n number of shares. It is imperceptible to reveal the secret information unless a certain number of shares(k) or more are superimposed. As the decryption process is d...

متن کامل

Lattice Gas Symmetric Cryptography

Lattice gas cellular automata (Lgca) are particular cellular automata that imitate the behavior of particles moving on a lattice. We used a particular set of Lgca rules, called hpp, to mix bits in data blocks and obtain a symmetric cryptographic algorithm. The encryption and decryption keys are the positions of perturbation sites on the lattice (walls). Basically, this paper presents an origina...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010