Abstract
This paper introduces a Cellular Automata (CA) based symmetric key cryptosystem for block cipher. The scheme named as CAC (Cellular Automata based Cryptosystem) employs a series of transforms - simple, moderately complex, and complex - all generated with different classes of CA. CAC provides a low cost, high speed cryptosystem with desired level of security. Cryptanalysis of the proposed scheme is reported along with similar analysis for two popular systems - DES and AES. Experimental results confirm that the security of the system is significantly better than DES and comparable to that of AES. The encryption/decryption throughput is higher than that of both AES and DES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
E. Biham and A. Shamir, “Differential cryptanalysis of des-like cryptosystems,” Journal of Gryptology, vol. 4, pp. 3–72, 1991.
S. Wolfram, “Cryptography with cellular automata,” Proceedings of Crypto, pp. 429–432, 1985.
P. Guan, “Cellular automaton public-key cryptosystem,” Complex System, vol. 1, pp. 51–57, 1987.
H. Gutowitz, “Cryptography with dynamical systems,” ESPCI, 1995.
S. Nandi, B.K. Kar, P.P. Chaudhuri “Theory and Application of Cellular Automata in Cryptography,” IEEE Trans. Computers, Vol. 43, Dec. 1994.
S. R. Blackburn, S. Murphy, K. G. P. I. S. Group, and R. Holloway, “Comments on ‘theory and applications of cellular automata in cryptography’,” IEEE Transaction on Computers, 1999.
N. Ganguly, A. Das, B. K. Sikdar, and P. P. Chaudhuri, “Cellular automata model for cryptosystem,” Cellular Automata Conference, Yokohama National University, Japan, 2000.
P. P. Chaudhuri and et. al., “Additive cellular automata theory and applications, vol 1” IEEE Computer Society Press, California, USA, 1997.
T. R. N. Rao and E. Fujiwara, “Error-control coding for computer systems,” Prentice-Hall, Englewood Cliffs, N.J.
N. Ganguly, “Cellular automata evolution-theory and applications,” PhD Thesis (proposed), Bengal Engineering College, (D U), Howrah, India, 2002.
D. Welsh, “Codes and cryptography,” Clarendon Press, Oxford, 1988.
C. E. Shannon, “Communication theory of secrecy systems,” Bell Systems Technical Journal, vol. 28, pp. 656–715, 1949.
B. Schneier, “Applied cryptography,” Second Edition, John Wiley & Sons, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sen, S., Shaw, C., Chowdhuri, D.R., Ganguly, N., Chaudhuri, P.P. (2002). Cellular Automata Based Cryptosystem (CAC). In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_26
Download citation
DOI: https://doi.org/10.1007/3-540-36159-6_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00164-5
Online ISBN: 978-3-540-36159-6
eBook Packages: Springer Book Archive