Deeper Investigating Adequate

نویسندگان

  • Gina M. B. Oliveira
  • Luiz G. A. Martins
  • Leonardo S. Alt
چکیده

Cellular automata (CA) are particularly well suited for cryptographic application and there are several previous studies in this topic (Benkiniouar & Benmohamed, 2004; Gutowitz, 1995; Kari, 1992; Nandi et al., 1994; Oliveira et al., 2004; 2008; Seredynski et al., 2003; Tomassini & Perrenoud, 2000; Wuensche, 2008; Wolfram, 1986). Since CA rule is simple, local and discrete, it can be executed in easily-constructed massively-parallel hardware at fast speeds. Basically, the CA-based cryptographic models can be divided into three classes: (i) models that use CA to generate binary sequences with good pseudo-random properties, which are used as cryptographic keys, but the effective ciphering process is made by another function (Benkiniouar & Benmohamed, 2004; Seredynski et al., 2003; Tomassini & Perrenoud, 2000; Wolfram, 1986); (ii) models based on additive, non-homogeneous and reversible CA, that use algebraic properties of this kind of rules to generate automata of maximum and/or known cycle (Kari, 1992; Nandi et al., 1994); and (iii) models based on irreversible CA, which uses the backward interaction of cellular automata in the ciphering process and the forward interaction to decipher (Gutowitz, 1995; Oliveira et al., 2004; 2008; 2010a; Wuensche, 2008), as the cryptographic model discussed here. Gutowitz has previously proposed a cryptographic model based on backward evolution of irreversible CA (Gutowitz, 1995). A toggle CA rule transition is used as the secret key in his model. A pre-image of an arbitrary lattice is calculated adding extra bits in each side of the lattice. This increment is pointed as the major flaw in the model. CA backward interaction is also known as pre-image computation and an efficient reverse algorithm was proposed by Wuensche and Lesser (Wuensche & Lesser, 1992) for a periodic boundary condition, keeping the pre-image with the same size of the image. Such algorithm was evaluated as encryption method in (Oliveira et al., 2008). However, its usage has the disadvantage that there is no guarantee of pre-image existence for any given lattice and any given rule. The only rules with assurance of pre-image existence are not appropriate for ciphering because they do not exhibit a chaotic dynamics. Thus, a new approach was proposed, which alternates the original reverse algorithm and the variation that uses extra bits, using the second only when the pre-image computation fails. This variation is similar to pre-image computation adopted in Gutowitz model (Gutowitz, 1995). Although this approach needs to add bits to the ciphertext when a failure occurs, it is Deeper Investigating Adequate Secret Key Specifications for a Variable Length Cryptographic Cellular Automata Based Model 12

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building and Maintaining Common Ground in Web-Based Interaction

In this paper, the main purpose is to explore how participants establish and maintain common ground by their responses in order to reach web-based interaction of a deeper level. Previous studies suggest that before the participants can reach deeper level interaction and learning, they have to gain an adequate level of common ground (Dillenbourg, 1999; Baker et al., 1999; Veerman, 2000). Subject...

متن کامل

A new identity linking coefficients of a certain class of homogeneous polynomials and Gauss hypergeometric functions

In investigating the properties of a certain class of homogeneous polynomials, we discovered an identity satisfied by their coefficients which involves simple 2F1 Gauss hypergeometric functions. This result appears to be new and we supply a direct proof. The simplicity of the identity is suggestive of a deeper result.

متن کامل

Investigating the Zeeman Effect: A Deeper Look

The Zeeman effect was first discovered in the laboratory by Pieter Zeeman, a Dutch physicist (see Figure 1), who effectively proved the theory put forth by Hendrik Lorentz that light emitted in the presence of a magnetic field, if polarized, would be affected. The pair were awarded the Nobel Prize in Physics in 1902. This discussion will focus specifically on specific examples of Zeeman splitti...

متن کامل

Phosphorus application and elevated CO2 enhance drought tolerance in field pea grown in a phosphorus-deficient vertisol.

BACKGROUND AND AIMS Benefits to crop productivity arising from increasing CO2 fertilization may be offset by detrimental effects of global climate change, such as an increasing frequency of drought. Phosphorus (P) nutrition plays an important role in crop responses to water stress, but how elevated CO2 (eCO2) and P nutrition interact, especially in legumes, is unclear. This study aimed to eluci...

متن کامل

Building and maintaining the common ground in web-based interaction

In this paper, the main purpose is to explore how participants establish and maintain the common ground in the computer-based conferences. Previous studies assume that before the participants can reach the deeper level interaction and learning, they have to gain an adequate level of common ground (Dillenbourg, 1999; Baker et al., 1999; Veerman, 2000). Subjects were 68 pre-service teachers and 7...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012