Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Error-control coding for computer systems
Error-control coding for computer systems
Theory of Extended Linear Machines
IEEE Transactions on Computers
MDx-MAC and Building Fast MACs from Hash Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of KHF
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
An ASIC for Cellular Automata Based Message Authentication
VLSID '00 Proceedings of the 13th International Conference on VLSI Design
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Analysis of complemented CA derived from linear hybrid group CA
Computers & Mathematics with Applications
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme
Computational Intelligence and Security
Message Authentication Protocol Based on Cellular Automata
Proceedings of the 2007 EvoWorkshops 2007 on EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog: Applications of Evolutionary Computing
Characterization of CA rules for SACA targeting detection of faulty nodes in WSN
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Analysis of hybrid group cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
A protocol to provide assurance of images integrity using memory cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Hi-index | 0.00 |
Current demands for secured communication have focussed intensive interest on 'Authentication'. There is a great demand for a high-speed low cost scheme for generation of Message Authentication Code (MAC). This paper introduces a new computational model built around a special class of Cellular Automata (CA) that can be employed for both message and image authentication. Cryptanalysis of the proposed scheme indicates that compared to other known schemes like MD5, SHA1 etc., the current scheme is more secure against all known attacks. High speed execution of the proposed scheme makes it ideally suitable for real time on-line applications. Further, the regular, modular, and cascadable structure of CA with local interconnections makes the scheme ideally suitable for VLSI implementation with throughput in the range of Gigabits per second.