Abstract
Cellular automata (CA) is applied in cryptographic systems. Genetic algorithm (GA) is used to search among predefined set of rules new subsets of rules controlling CA. A high quality pseudorandom numbers sequences (PNSs) are generated by CA applying new subsets of rules. Discovered subset create very efficient cryptographic module used as pseudorandom numbers sequences generator (PNSG). The bad subsets of rules are also discovered and eliminated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
1. Bouvry P., Klein G. and Seredynski F. (2005) Weak Key Analysis and Microcontroller Implementation of CA Stream Ciphers, LNAI 3684, Springer, pp. 910-915
2. Guan P. (1987) Cellular Automaton Public-Key Cryptosystem, Complex Systems 1, pp. 51–56
3. Gutowitz H. (1993) Cryptography with Dynamical Systems, in E. Goles and N. Boccara (Eds.) Cellular Automata and Cooperative Phenomena, Kluwer Academic Press
4. Habutsu T. et al. (1991) A Secret Key Cryptosystem by Iterating a Chaotic Map, Proc. of Eurocrypt'91, pp. 127–140
5. Kari J. (1992) Cryptosystems based on reversible cellular automata, Personal Communication.
6. Menezes A. et al. (1996) Handbook of Applied Cryptography, CRC Press
7. Michalewicz Z. (1994) Genetic Algorithms + Data Structures = Evolution Programs, Springer-Verlag, New York
8. Nandi S. et al. (1994) Theory and Applications of Cellular Automata in Cryptography, IEEE Trans. on Computers, v. 43, pp. 1346–1357
9. Schneier B. (1996) Applied Cryptography, Wiley, New York
10. Seredynski F., Bouvry P. and Zomaya A. (2004), Cellular Automata Computation and Secret Key Cryptography, Parallel Computation 30, pp. 753–766
11. Tomassini M. and Perrenoud M. (2000) Stream Ciphers with One- and Two- Dimensional Cellular Automata, in M. Schoenauer at al. (Eds.) Parallel Problem Solving from Nature - PPSN VI, LNCS 1917, Springer, pp. 722-731
12. Tomassini M. and SipperM. (2000) On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata, IEEE Trans. on Computers, v. 49, No. 10, pp. 1140–1151
13. Wolfram S. (1986) Cryptography with Cellular Automata, in Advances in Cryptology: Crypto '85 Proceedings, LNCS 218, Springer, pp. 429–432
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer
About this paper
Cite this paper
Szaban, M., Seredy nski, F., Bouvry, P. (2006). Collective Behaviour of Cellular Automata Rules and Symmetric Key Cryptography. In: Kłopotek, M.A., Wierzchoń, S.T., Trojanowski, K. (eds) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-33521-8_13
Download citation
DOI: https://doi.org/10.1007/3-540-33521-8_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33520-7
Online ISBN: 978-3-540-33521-4
eBook Packages: EngineeringEngineering (R0)