Filters








527 Hits in 6.6 sec

An Analytical Study of Cellular Automata and its Applications in Cryptography

G. Kumaresan, N.P. Gopalan
2017 International Journal of Computer Network and Information Security  
The concept of cellular automata finds application in the design of efficient methods to secure digital information.  ...  It is a recent field of research and its recognition has been on the rise with its high parallel structure and ability to design complex dynamic systems.  ...  After that, many researchers studied cellular automata based one way hash functions.  ... 
doi:10.5815/ijcnis.2017.12.06 fatcat:w5ccl675ejgzdpnqsnzmceggf4

HCAHF: A New Family of CA-based Hash Functions

Anas Sadak, Fatima Ezzahra, Bouchra Echandouri, Charifa Hanin, Fouzia Omary
2019 International Journal of Advanced Computer Science and Applications  
Cellular automata (CA) are a class of Boolean functions that exhibit good cryptographic properties and display a chaotic behavior. In this article, a new hash function based on CA is proposed.  ...  It shows that the hashing algorithm has good security features and meet the security requirements of a good hashing scheme.  ...  Depending on the nature of its internal compression function, the hash function can be categorized as either a hash function based on a block cipher, a hash function based on an arithmetic primitive or  ... 
doi:10.14569/ijacsa.2019.0101267 fatcat:cxwfuikf65fsjlbzxqunofcluu

A cellular automaton based fast one-way hash function suitable for hardware implementation [chapter]

Miodrag Mihaljević, Yuliang Zheng, Hideki Imai
1998 Lecture Notes in Computer Science  
The aim of this paper is to propose a n o vel one-way hash function based on cellular automata whose cryptographic properties have been extensive l y s t u d i e d o ver the past decade or so.  ...  Furthermore, security of the proposed one-way hash function is analyzed by the use of very recently published results on applications of cellular automata in cryptography.  ...  The proposed one-way hash function is based on a quite di erent approach than these employed in other one-way hash functions in that it is based on programmable cellular automata.  ... 
doi:10.1007/bfb0054027 fatcat:f7uptgojnvfmbe7hbitsof5l2e

Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) Using Finite State Machine

Mohd Anuar Mat Isa, Miza Mumtaz Ahmad, Nor Fazlida Mohd Sani, Habibah Hashim, Ramlan Mahmod
2014 Procedia Computer Science  
The proposed protocol would be useful for implementation in a lightweight or a secure smart devices communication in the wireless sensor nodes (WSN) network.  ...  We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol.  ...  Rey (2007) [16] presented a secure message communication using finite cellular automata as hash function to prevent same hash digest for different messages or packets.  ... 
doi:10.1016/j.procs.2014.11.061 fatcat:nx6wknnztzcqrl6hhskyp5frxu

LCAHASH-1.1: A New Design of the LCAHASH System for IoT

Anas Sadak, Bouchra Echandouri, Fatima Ezzahra, Charifa Hanin, Fouzia Omary
2019 International Journal of Advanced Computer Science and Applications  
LCAHASH is a previously developed lightweight hash algorithm. It is based on cellular automata.  ...  It was developed as an alternative to existing hash functions to ensure data integrity and to meet the security requirements of the Internet of Things devices.  ...  This method was later on attacked in [12] . Daemen et. al also proposed two hash functions based on cellular automata in [12] and [13] .  ... 
doi:10.14569/ijacsa.2019.0101134 fatcat:7mzussjahvdrxo73ulyqvqvpwe

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata

Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
2015 Journal of Computing and Information Technology  
In this paper, we propose a fast and efficient hash function using programmable cellular automata that are very suitable for cryptographic applications due to their chaotic and complex behavior derived  ...  Cryptographic hash functions have recently brought an exceptional research interest.  ...  Conclusions In this paper, we propose a cryptographic hash function based on cellular automata.  ... 
doi:10.2498/cit.1002639 fatcat:siseskuuzjduvgwtyomyhqf66q

Fast and Efficient Design of a PCA-Based Hash Function

Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
2015 International Journal of Computer Network and Information Security  
We propose a simple and efficient hash function based on programmable elementary cellular automata.  ...  The proposed hash function is built using elementary cellular automata that are very suitable for cryptographic applications, due to their chaotic and complex behavior derived from simple rules interaction  ...  Results of the DIEHARD tests battery applied on the designed hash function's output. V. CONCLUSIONS In this paper, we propose a cryptographic hash function based on cellular automata.  ... 
doi:10.5815/ijcnis.2015.06.04 fatcat:6yjwkt6ogfffzly7sht5un3jmi

Image Encryption using RSAA

Vishal Snedan Robertson, Krishnakant Vilas Redkar
2017 IOSR Journal of Computer Engineering  
We present a variable key length cryptosystem based on Block Cellular Automata. It encrypts images by dividing it up into blocks 50 X 50pixels and encrypting each block at a time.  ...  It can be used to store personal images securely on one's system and large scope for storing images securely on a server or cloud storage.  ...  Applications Store personal images securely on your system with a password.  ... 
doi:10.9790/0661-1903040105 fatcat:ey3yuv4tnzfe7ey26jfnnfgbpe

Development of a hash algorithm based on cellular automata and chaos theory

Yuriy Dobrovolsky, Georgy Prokhorov, Mariia Hanzhelo, Dmytro Hanzhelo, Denis Trembach
2021 Eastern-European Journal of Enterprise Technologies  
The proposed algorithm is four times slower than the well-known family of "secure hash algorithms." However, computation speed is not a critical requirement for a hash function.  ...  Processing in blocks of 128-bit uses cellular automata with mixed rules of 30, 105 and 90, 150 and takes into account the dependence of the generation of the initial vector on the incoming message.  ...  gratitude to Dyachuk Rostislav Lyubomirovich -Assistant of the Department of Software for Computer Systems, Yu Fedkovich Chernivtsi National University for the refactoring of the algorithm code and advice on  ... 
doi:10.15587/1729-4061.2021.242849 fatcat:eocnolehfncbtijydd5sabp73a

A cryptographic hash function based on chaotic network automata

Jeaneth Machicao, Odemir M Bruno
2017 Journal of Physics, Conference Series  
This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468.  ...  Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA).  ...  Proposed cryptographic hash function We propose a cryptographic hash function based on the chaotic spatio-temporal outputs from network automata.  ... 
doi:10.1088/1742-6596/936/1/012058 fatcat:zohcgylhf5ccnjnbj46xyb6sxu

DEVELOPMENT AND RESEARCH OF CRYPTOGRAPHIC HASH FUNCTIONS BASED ON TWO-DIMENSIONAL CELLULAR AUTOMATA

Yuliya Tanasyuk, Sergey Ostapov
2018 Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska  
Software solution for cryptographic hash functions based on sponge construction with inner state implemented as two-dimensional cellular automata (CA) has been developed.  ...  The developed hashing mechanism provides effective parallel processing, ensures good statistical and scattering properties, enables one to obtain hash of a varying length and reveals strong avalanche effect  ...  Cellular automata (CA) have several properties that favor their use as a basis for the design of hash functions.  ... 
doi:10.5604/01.3001.0010.8638 fatcat:xsu7c2tv4jctlfbvzntu3ntzb4

One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space

Volodymyr Shevchenko, Georgi Dimitrov, Denys Berestov, Pepa Petrova, Igor Sinitcyn, Eugenia Kovatcheva, Ivan Garvanov, Iva Kostadinova
2020 Information & Security An International Journal  
based on complex cellular automata.  ...  It suggests an improvement of the Diffie-Hellman algorithm by creating a one-way function on the basis of cellular automata with an extended set of rules.  ...  based on complex cellular automata.  ... 
doi:10.11610/isij.4716 fatcat:q57bgwbbo5ac5h6lhirstwz5u4

About a Fast Cryptographic Hash Function Using Cellular Automata Ruled by Far-Off Neighbours
English

Vincent Manuceau
2021 International Journal of Engineering Trends and Technoloy  
This paper introduces a simple cryptographic hash function based upon specific cellular automata [5] , defined as far neighbor-driven cellular automata.  ...  CELLULAR AUTOMATA A.  ... 
doi:10.14445/22315381/ijett-v69i2p206 fatcat:u2jvy5f4gfd7hmjtiei6lvielu

Application of RSAA for File Encryption

Vishal Snedan Robertson, Krishnakant Vilas Redkar
2017 International Journal of Engineering Research and Applications  
We put forth a variable key length symmetric cryptosystem to encrypt text files based on the RSAA algorithm. It encrypts files by dividing its contents into blocks of 256 bits block at a time.  ...  High security is achieved even with a single character key. This algorithm is fast and can be used to encrypt large text files quickly with ease.  ...  The major operation in RSAA is based on Block Cellular Automata and its rules. It generates 16 Block Cellular Automata rules dynamically based on the input key using the RuleGen() function.  ... 
doi:10.9790/9622-0707070810 fatcat:ya6ktqmv7ffshcnwb5w5wfoqom

A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments

Saiida Lazaar
2021 General Letters in Mathematics  
The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks.  ...  In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework  ...  Cellular automata-based hash functions Cellular automata (CA) were first invented by Ulam and Von Neumann in 1940; afterwards, the CA theory was developed by Stephen Wolfram author of many reference studies  ... 
doi:10.31559/glm2021.10.2.4 fatcat:bmicopcwkjaktpj65ejbrc2uze
« Previous Showing results 1 — 15 out of 527 results