Cellular automata based authentication (CAA)

  • Authors:
  • Monalisa Mukherjee;Niloy Ganguly;Atal Chaudhuri;P. Pal Chaudhuri

  • Affiliations:
  • Department of Computer Science & Technology, Bengal Engineering College (D.U), Botanic Garden, Howrah, West Bengal, India 711103;Computer Centre, IISWBM, Calcutta, West Bengal, India 700073;Department of Computer Science & Engineering, Jadavpur University, Calcutta, West Bengal, India 700032;Department of Computer Science & Technology, Bengal Engineering College (D.U), Botanic Garden, Howrah, West Bengal, India 711103

  • Venue:
  • ICCC '02 Proceedings of the 15th international conference on Computer communication
  • Year:
  • 2002

Quantified Score

Hi-index 0.01

Visualization

Abstract

Current demands for secured communication have focused intensive interest on 'Authentication'. There is a great demand for low cost high-speed on-line scheme for generation of Message Authentication Code. This paper introduces a computational model built around a new class of Cellular Automata (CA) referred to as Single Attractor CA (SACA). The SACA generates efficient one way hash function that has been employed for message authentication. The model generates the Message Authentication Code (MAC) as a string of symbols in the extension field GF(2p). Theory of extension field GF(2p) and the unique behavioral model of SACA have provided the foundation of this scheme to enhance the level of security. Cryptanalysis of the proposed scheme has established the fact that compared to other known schemes like MD5, SHA1 etc., the current scheme is more secure against all known attacks. High speed execution of the proposed scheme makes it ideally suitable for real time on-line applications. Further, the simple, regular, modular, and cascadable structure of CA with local interconnections makes the scheme ideally suitable for VLSI implementation with throughput in the range of hundreds of Megabits per second.