Skip to main content

Comparative Analysis of Cellular Automata Based Multilingual Encryption Using Syndicate Rules for Data Security

  • Conference paper
  • First Online:
Book cover Innovations in Bio-Inspired Computing and Applications (IBICA 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1372))

Abstract

Authors propose cellular automata (CA) based multilingual encryption algorithm to provide data security. Different components (keyset and encryption key) are required in proposed single attractor cellular automata (SACA) based algorithm to prepare multilingual encrypted dataset. A particular set of keyset and encryption key should be applied on a particular set of multilingual raw dataset to prepare multilingual key mapped dataset. Different syndicate rules should be applied in proposed algorithm using CA based state transition mapping. Data security should be increased due to usage of different syndicate rules. Efficiency of proposed algorithm should be measured using experimental results. Superiority of CA based proposed multilingual encryption algorithm should be measured using comparative analysis with existing algorithms (Blowfish, Twofish, RSA, Triple Data Encryption Standard, Advanced Encryption Standard).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rajendiran, M., Selvam, K., Kumar, N.R., Venkatesh, T.: English encryption technique using multilanguage. Int. J. Eng. Res. Technol. 2(3), 1–5 (2013)

    Google Scholar 

  2. Mishra, P.R., Gupta, I., Gaba, N.: Cryptoanalysis of multilanguage encryption techniques. Math. Comput. 91, 13–21 (2014)

    Google Scholar 

  3. Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302–3312 (2017)

    Article  Google Scholar 

  4. Shaheen, B., Siddiqui F.: Comparison between RSA algorithm and modified RSA algorithm used in cloud computing. In: International Conference on Inventive Computation Technologies, vol. 98, pp. 218–224 (2019)

    Google Scholar 

  5. Kara, O., Manap, C.: A new class of weak keys for blowfish. In: International Workshop on Fast Software Encryption, vol. 4593, pp. 167–180 (2007)

    Google Scholar 

  6. Lee, S.K., Kim, S.Y, Ra, Y.C.: A study on the two fish security processor design using USB interface device. In: International Conference on Hybrid Information Technology, vol. 206, pp. 182–189 (2011)

    Google Scholar 

  7. Thinn, A.A., Thwin, M.M.S.: Modification of AES algorithm by using second key and modified subbytes operation for text encryption. Comput. Sci. Technol. 481, 435–444 (2018)

    Article  Google Scholar 

  8. Choudhury P., Gaddam, R., Parisi, R.B., Dasari, M.B., Vuppala, S.: A new multi-language encryption technique for MANET. In: International conference on Advances in Information and Communication Technologies, vol. 101, pp. 22–28 (2010)

    Google Scholar 

  9. Das, S., Mukherjee, S., Naskar, N.: Characterization of single cycle CA and its application in pattern classification. Electron. Notes Theoret. Comput. Sci. 252, 181–203 (2009)

    Article  MathSciNet  Google Scholar 

  10. Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S.: A cost-efficient one time password based authentication in cloud environment using equal length cellular automata. J. Ind. Inf. Integr. 5, 17–25 (2017)

    Google Scholar 

  11. Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S.: On the exploration of equal length cellular automata rules targeting a mapreduce design in cloud. Int. J. Cloud Appl. Comput. 8(2), 1–26 (2018)

    Google Scholar 

  12. Mitra, A., Kundu, A.: Cost optimized approach to random numbers in cellular automata. Adv. Intell. Soft Comput. 166, 609–618 (2012)

    Article  Google Scholar 

  13. Mitra, A., Kundu, A.: Cost optimized set of primes generation with cellular automata for stress testing in distributed computing. Procedia Technol. 10, 365–372 (2013)

    Article  Google Scholar 

  14. Ghosh, A.: Comparison of encryption algorithms: AES, blowfish and Twofish for security of wireless networks. Int. Res. J. Eng. Technol. 7(6), 4656–4659 (2020)

    Google Scholar 

  15. Kumar, A., Jakhar, S., Makkar, S.: Comparative analysis between DES and RSA algorithm’s. Comput. Sci. Softw. Eng. 2(7), 386–391 (2012)

    Google Scholar 

Download references

Acknowledgment

The research work is funded by Computer Innovative Research Society, West Bengal, India. Award number is “2020/CIRS/R&D/2020-02-19/CACAMESRDS”.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Banerjee, A., Kundu, A. (2021). Comparative Analysis of Cellular Automata Based Multilingual Encryption Using Syndicate Rules for Data Security. In: Abraham, A., Sasaki, H., Rios, R., Gandhi, N., Singh, U., Ma, K. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2020. Advances in Intelligent Systems and Computing, vol 1372. Springer, Cham. https://doi.org/10.1007/978-3-030-73603-3_28

Download citation

Publish with us

Policies and ethics