
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
S. Nandi, B.K. Kar, P. Pal Chaudhuri, "Theory and Applications of Cellular Automata in Cryptography," IEEE Transactions on Computers, vol. 43, no. 12, pp. 13461357, December, 1994.  
BibTex  x  
@article{ 10.1109/12.338094, author = {S. Nandi and B.K. Kar and P. Pal Chaudhuri}, title = {Theory and Applications of Cellular Automata in Cryptography}, journal ={IEEE Transactions on Computers}, volume = {43}, number = {12}, issn = {00189340}, year = {1994}, pages = {13461357}, doi = {http://doi.ieeecomputersociety.org/10.1109/12.338094}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  Theory and Applications of Cellular Automata in Cryptography IS  12 SN  00189340 SP1346 EP1357 EPD  13461357 A1  S. Nandi, A1  B.K. Kar, A1  P. Pal Chaudhuri, PY  1994 KW  cellular automata; cryptography; VLSI; random number generation; cellular automata; cryptography; block ciphers; stream ciphers; CA state transitions; fundamental transformations; programmable cellular automata; pseudorandom pattern generators; VLSI implementation. VL  43 JA  IEEE Transactions on Computers ER   
This paper deals with the theory and application of Cellular Automata (CA) for a class of block ciphers and stream ciphers. Based on CA state transitions certain fundamental transformations are defined which are block ciphering functions of the proposed enciphering scheme, These fundamental transformations are found to generate the simple (alternating) group of even permutations which in turn is a subgroup of the permutation group, These functions are implemented with a class of programmable cellular automata (PCA) built around rules 51, 153, and 195. Further, high quality pseudorandom pattern generators built around rule 90 and 150 programmable cellular automata with a rule selector (i.e., combining function) has been proposed as running key generators in stream ciphers, Both the schemes provide better security against different types of attacks. With a simple, regular, modular and cascadable structure of CA, hardware implementation of such schemes idealy suit VLSI implementation.
[1] S. Wolfram, "Statistical mechanics of cellular automata,"Rev. Mod. Physics, vol. 55, no. 3, pp. 601644, 1983.
[2] A. K. Das, A. Ganguly, A. Dasgupta, S. Bhawmik, and P. Pal Chaudhuri, "Efficient characterization of cellular automata,"IEE Proc., vol. 137, Pt. E, no. 1, pp. 8187, Jan. 1990.
[3] A. K. Das, S. Saha, A. Roy Chowdhury, S. Misra, and P. Pal Chaudhuri, "Signature analyzer based on additivecellular automata," inProc. 20th Fault Tolerant Computing Syst., pp. 265272, U.K., June 1990.
[4] W. Pries, A. Thanailakis, and H. C. Card, "Group properties of cellular automata and VLSI applications,"IEEE Trans. Comput., vol. C35, pp. 10131024, Dec. 1986.
[5] O. Martin, A. M. Odlyzko, and S. Wolfram, "Algebraic properties of cellular automata,"Commun. Math. Phys.vol. 93, pp. 219, 1984.
[6] D.E. Denning,Cryptography and Data Security, AddisonWesley Publishing Co., Reading, Mass., 1982.
[7] I. N. Herstein,Topics In Algebra, New Delhi, India: Vikas Publishing House Pvt. Ltd, 1976.
[8] D. Welsh,Codes and Cryptography. Oxford, UK: Oxford Univ. Press, 1988
[9] J. Seberry and J. Pieprzyk,Cryptography: An Introduction to Computer Security. Australia: Prentice Hall of Australia, 1989.
[10] A. Salomma,PublicKey Cryptography. Berlin Heidelberg: SpringerVerlag, 1990.
[11] W. Meier and O. Steffelbach, "Correlation properties of combiners with memory in stream ciphers," inProc. Advances in CryptologyEUROCRYPT'90, SpringerVerlag, 1990, pp. 204213.
[12] J. Pieprzyk and X. M. Zhang, "Permutation generators of alternating groups," inProc. Advances in CryptologyAUSCRYPT '90, SpringerVerlag, 1990, pp. 237244.
[13] T. Siegenthaler, "CorrelationImmunity of Nonlinear Combining Functions for Cryptographic Applications,"IEEE Trans. Information Theory, Vol. IT31, No. 5, Sept. 1984, pp. 776780.
[14] T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only,"IEEE Trans. Comput., vol. C34, no. 1, pp. 8185, Jan. 1985.
[15] P. H. Bardell, "Analysis of cellular automata used as pseudorandom pattern generators," inProc. Int. Test Conf., 1990, pp. 762768.
[16] A. K. Das and P. Pal Chaudhuri, "Vector space theoretic analysis of additive cellular automata and its application pseudoexhaustive test pattern generation,"IEEE Trans. Comput., vol. 42, no. 3, pp. 340352, Mar. 1993.
[17] D. Roy Chawdhury, I. Sengupta, S. Basu, and P. Pal Chaudhuri, "Cellular automata based error correcting codes (CAECC),"IEEE Trans. Comput., vol. 43, no. 6, pp. 759764, June 1994.
[18] D. E. Knuth,The Art of Computer Programming, Vol. 2, Seminumerical Algorithms. Reading, MA: AddisonWesley, 1981.
[19] S. Even and O. Goldreich, "DESlike functions can generate the alternating group,"IEEE Trans. Inform. Theory, vol. IT29, no. 6, pp. 863865, Nov. 1983.
[20] P. D. Hortensius, R. D. Mcleod, W. Pries, D. M. Miller, and H. C. Card, "Cellular automata based pseudorandom number generators for builtin selftest,"IEEE Trans. Comput.Aided Design, vol. 8, no 8, pp. 84259, Aug. 1989.
[21] Ph. Tsalides, T. A. York, and A. Thanailakis, "Pseudorandom number generators for VLSI systems based on linear cellular automata," inIEEE Proc. E. Comput. Digit. Tech, vol. 138, no. 4, 1991, pp. 241249.
[22] Ph. Tsalides, "Cellular automata based builtin self test structures for VLSI systems,"Electron. Lett., vol. 26, no. 17, pp. 13501352, 1990.
[23] T. K. York, Ph. Tsalides, B. Srisuchinwong, P. J. Hicks, and A. Thanailakis, "Design and VLSI implementation of a mod 127 multiplier using cellular automatonbased data compression techniques," inIEEE Proc. E. Comput. Digit. Tech., vol. 138, no. 5, 1991, pp. 351356.
[24] P. Tzionas, Ph. Tsalides, and A. Thanailakis, "Design and VLSI implementation of a pattern classifier using pseudo @ D cellular automata,"IEE Proc. G, vol. 139, no. 6, pp. 661668, Dec. 1992.
[25] B. Srisuchinwong, Ph. Tsalides, T. A. York, P. J. Hicks, and A. Thanailakis, "VLSI implementation of modpmultipliers using homomorphisms and hybrid cellular automata,"IEE Proc. E, vol. 139. no. 6, pp. 486490, Nov. 1992.
[26] S. Wolfram, "Cryptography with cellular automata," inAdvances in CryptologyCrypto'85(SpringerVerlag Lecture Notes in Computer Science 218). 1986. pp. 429432.