Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Codes and cryptography
Error-control coding for computer systems
Error-control coding for computer systems
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Comments on "Theory and Applications of Cellular Automata in Cryptography"
IEEE Transactions on Computers
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem
IEEE Transactions on Computers
Analysis of complemented CA derived from linear hybrid group CA
Computers & Mathematics with Applications
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme
Computational Intelligence and Security
Cryptanalysis of a new cellular automata cryptosystem
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Secret key specification for a variable-length cryptographic cellular automata model
PPSN'10 Proceedings of the 11th international conference on Parallel problem solving from nature: Part II
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Cryptanalysis of a cellular automata cryptosystem
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Analysis of hybrid group cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Behaviors of single attractor cellular automata over galois field GF(2p)
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Hi-index | 0.00 |
This paper introduces a Cellular Automata (CA) based symmetric key cryptosystem for block cipher. The scheme named as CAC (Cellular Automata based Cryptosystem) employs a series of transforms - simple, moderately complex, and complex - all generated with different classes of CA. CAC provides a low cost, high speed cryptosystem with desired level of security. Cryptanalysis of the proposed scheme is reported along with similar analysis for two popular systems - DES and AES. Experimental results confirm that the security of the system is significantly better than DES and comparable to that of AES. The encryption/ decryption throughput is higher than that of both AES and DES.