Cellular automata computations and secret key cryptography

  • Authors:
  • Franciszek Seredynski;Pascal Bouvry;Albert Y. Zomaya

  • Affiliations:
  • Polish-Japanese Institute of Information Technologies, Koszykowa 86, 02-008 Warsaw, Poland and Institute of Computer Science of Polish Academy of Sciences, Ordona 21, 01-237 Warsaw, Poland;Faculty of Sciences, Technology and Communication, Luxembourg University 6, rue Coudenhove Kalergi, L-1359 Luxembourg-Kirchberg, Luxembourg;School of Information Technologies, University of Sydney, Sydney, NSW 2006 Australia

  • Venue:
  • Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, cellular automata (CAs) are used to design a symmetric key cryptography system based on Vernam cipher. CAs are applied to generate a pseudo-random numbers sequence (PNS) which is used during the encryption process. The quality of PNSs highly depends on the set of applied CA rules. Rules of radius r = 1 and 2 for nonuniform one-dimensional CAs have been considered. A new set of rules has been discovered using an evolutionary technique called cellular programming. This set provides very high quality encryption, and the system is very resistant to attempts of breaking the cryptography key.