BLOCK CIPHERS ON THE BASIS OF REVERSIBLE CELLULAR AUTOMATA
Yuliya Tanasyuk
y.tanasyuk@chnu.edu.uaYuriy Fedkovych Chernivtsi National University, Department of Computer Systems and Networks (Ukraine)
http://orcid.org/0000-0001-8650-0521
Petro Burdeinyi
Yuriy Fedkovych Chernivtsi National University, Department of Computer Systems and Networks (Ukraine)
http://orcid.org/0000-0002-3859-7522
Abstract
The given paper is devoted to the software development of block cipher based on reversible one-dimensional cellular automata and the study of its statistical properties. The software implementation of the proposed encryption algorithm is performed in C# programming language in Visual Studio 2017. The paper presents specially designed approach for key generation. To ensure desired cryptographic stability, the shared secret parameters can be adjusted to contain information needed for creating substitution tables, defining reversible rules, and hiding final data. For the first time, it is suggested to create substitution tables based on iterations of a cellular automaton that is initialized by the key data.
Keywords:
block cipher, symmetric encryption algorithm, reversible cellular automataReferences
Bouchkaren S., Lazaar S.: A fast cryptosystem using reversible cellular automata. International Journal of Advanced Computer Science and Applications 5(5)/2014, 207–210.
DOI: https://doi.org/10.14569/IJACSA.2014.050531
Google Scholar
Debasis D., Abhishek R.: A parallel encryption algorithm for block ciphers based on programmable reversible cellular automata. J. Computer Science and Engineering 1(1)/2010, 82–90.
Google Scholar
Gutowitz H.A.: Cryptography with Dynamical Systems: Cellular Automata and Cooperative Phenomena. Kluwer Academic Press, Dordrecht 1993.
DOI: https://doi.org/10.1007/978-94-011-1691-6_21
Google Scholar
Paar C., Peltz J.: Understanding cryptography. Springer-Verlag, Berlin Heidelberg 2010.
DOI: https://doi.org/10.1007/978-3-642-04101-3
Google Scholar
Leporati A., Mariot L.: Cryptographic properties of bipermutive cellular automata rules. J. Cellular Automata 9/2014, 437–475.
Google Scholar
Seredynski M., Bouvry P.: Block cipher based on cellular automata. New Generation computing 23(3)/2005, 245–258.
DOI: https://doi.org/10.1007/BF03037658
Google Scholar
Seredynski F., Bouvry P., Zomaya A. Y.: Cellular automata and secret key cryptography. Parallel Computing 30(5-6)/2004, 753–766, [DOI:10.1016/j.parco.2003.12.014].
DOI: https://doi.org/10.1016/j.parco.2003.12.014
Google Scholar
Tomassini M., Perrenoud M.: Stream Cyphers with One- and Two-Dimensional Cellular Automata. Parallel Problem Solving from Nature PPSN VI. PPSN. Lecture Notes in Computer Science vol. 1917. Springer, Berlin, Heidelberg, 2000, 722–731.
Google Scholar
Wolfram S.: Cryptography with Cellular Automata.: Advances in Cryptology: Crypto’85, Springer-Verlag LNCS 218, 1985, 429–432.
DOI: https://doi.org/10.1007/3-540-39799-X_32
Google Scholar
NIST SP 800-22: Documentation and Software. Random bit generation. - Guide to the statistical tests, https://csrc.nist.gov/Projects/Random-Bit-Generation/Documentation-and-Software/Guide-to-the-Statistical-Tests
Google Scholar
Wolfram S.: A New Kind of Science.: Wolfram Media, Inc, 2002, 1197, http://www.wolframscience.com/nksonline/toc.html
Google Scholar
Authors
Yuliya Tanasyuky.tanasyuk@chnu.edu.ua
Yuriy Fedkovych Chernivtsi National University, Department of Computer Systems and Networks Ukraine
http://orcid.org/0000-0001-8650-0521
Authors
Petro BurdeinyiYuriy Fedkovych Chernivtsi National University, Department of Computer Systems and Networks Ukraine
http://orcid.org/0000-0002-3859-7522
Statistics
Abstract views: 357PDF downloads: 198
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Most read articles by the same author(s)
- Yuliya Tanasyuk, Sergey Ostapov, DEVELOPMENT AND RESEARCH OF CRYPTOGRAPHIC HASH FUNCTIONS BASED ON TWO-DIMENSIONAL CELLULAR AUTOMATA , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 8 No. 1 (2018)