Random sequence generation by cellular automata
Advances in Applied Mathematics
Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Comments on "Theory and Applications of Cellular Automata in Cryptography"
IEEE Transactions on Computers
Cellular Automata Based Cryptosystem (CAC)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme
Computational Intelligence and Security
Cryptanalysis of a cellular automata cryptosystem
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
Cellular automata provide discrete deterministic mathematical models for physical, biological and computational systems. Despite their simple construction, cellular automata are shown to be capable of complicated behaviour, and to generate complex and random patterns. There have been constant efforts to exploit cellular automata for cryptography since the very beginning of the research on cellular automata. Unfortunately, most of the previous cryptosystems based on cellular automata are either insecure or inefficient. [8] is the latest effort in cellular automata cryptosystems (CACs) design, where the affine cellular automata are combined with non-affine transformations. It is claimed that the weakness in some of the previous CACs due to affine property is removed. In this paper we show that the new CAC is still insecure. It can be broken by a chosen-plaintext attack. The attack is very efficient, requiring only hundreds of chosen plaintexts and a small computation amount. We also consider the possibility of modifying the new CAC. Our results show, however, that it is not easy to secure the scheme by minor modifications. The cryptanalysis in this paper enforces the opinion once more that the security must be very carefully analyzed in designing the cryptosystems based on some mathematical systems. We should not blindly trust the pseudo randomness brought by the available mathematical systems. The designing techniques developed by cryptographic community are always optimal.