A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Analytical Study of Cellular Automata and its Applications in Cryptography
2017
International Journal of Computer Network and Information Security
The concept of cellular automata finds application in the design of efficient methods to secure digital information. ...
It is a recent field of research and its recognition has been on the rise with its high parallel structure and ability to design complex dynamic systems. ...
After that, many researchers studied cellular automata based one way hash functions. ...
doi:10.5815/ijcnis.2017.12.06
fatcat:w5ccl675ejgzdpnqsnzmceggf4
HCAHF: A New Family of CA-based Hash Functions
2019
International Journal of Advanced Computer Science and Applications
Cellular automata (CA) are a class of Boolean functions that exhibit good cryptographic properties and display a chaotic behavior. In this article, a new hash function based on CA is proposed. ...
It shows that the hashing algorithm has good security features and meet the security requirements of a good hashing scheme. ...
Depending on the nature of its internal compression function, the hash function can be categorized as either a hash function based on a block cipher, a hash function based on an arithmetic primitive or ...
doi:10.14569/ijacsa.2019.0101267
fatcat:cxwfuikf65fsjlbzxqunofcluu
A cellular automaton based fast one-way hash function suitable for hardware implementation
[chapter]
1998
Lecture Notes in Computer Science
The aim of this paper is to propose a n o vel one-way hash function based on cellular automata whose cryptographic properties have been extensive l y s t u d i e d o ver the past decade or so. ...
Furthermore, security of the proposed one-way hash function is analyzed by the use of very recently published results on applications of cellular automata in cryptography. ...
The proposed one-way hash function is based on a quite di erent approach than these employed in other one-way hash functions in that it is based on programmable cellular automata. ...
doi:10.1007/bfb0054027
fatcat:f7uptgojnvfmbe7hbitsof5l2e
Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) Using Finite State Machine
2014
Procedia Computer Science
The proposed protocol would be useful for implementation in a lightweight or a secure smart devices communication in the wireless sensor nodes (WSN) network. ...
We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. ...
Rey (2007) [16] presented a secure message communication using finite cellular automata as hash function to prevent same hash digest for different messages or packets. ...
doi:10.1016/j.procs.2014.11.061
fatcat:nx6wknnztzcqrl6hhskyp5frxu
LCAHASH-1.1: A New Design of the LCAHASH System for IoT
2019
International Journal of Advanced Computer Science and Applications
LCAHASH is a previously developed lightweight hash algorithm. It is based on cellular automata. ...
It was developed as an alternative to existing hash functions to ensure data integrity and to meet the security requirements of the Internet of Things devices. ...
This method was later on attacked in [12] . Daemen et. al also proposed two hash functions based on cellular automata in [12] and [13] . ...
doi:10.14569/ijacsa.2019.0101134
fatcat:7mzussjahvdrxo73ulyqvqvpwe
Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata
2015
Journal of Computing and Information Technology
In this paper, we propose a fast and efficient hash function using programmable cellular automata that are very suitable for cryptographic applications due to their chaotic and complex behavior derived ...
Cryptographic hash functions have recently brought an exceptional research interest. ...
Conclusions In this paper, we propose a cryptographic hash function based on cellular automata. ...
doi:10.2498/cit.1002639
fatcat:siseskuuzjduvgwtyomyhqf66q
Fast and Efficient Design of a PCA-Based Hash Function
2015
International Journal of Computer Network and Information Security
We propose a simple and efficient hash function based on programmable elementary cellular automata. ...
The proposed hash function is built using elementary cellular automata that are very suitable for cryptographic applications, due to their chaotic and complex behavior derived from simple rules interaction ...
Results of the DIEHARD tests battery applied on the designed hash function's output.
V. CONCLUSIONS In this paper, we propose a cryptographic hash function based on cellular automata. ...
doi:10.5815/ijcnis.2015.06.04
fatcat:6yjwkt6ogfffzly7sht5un3jmi
Image Encryption using RSAA
2017
IOSR Journal of Computer Engineering
We present a variable key length cryptosystem based on Block Cellular Automata. It encrypts images by dividing it up into blocks 50 X 50pixels and encrypting each block at a time. ...
It can be used to store personal images securely on one's system and large scope for storing images securely on a server or cloud storage. ...
Applications Store personal images securely on your system with a password. ...
doi:10.9790/0661-1903040105
fatcat:ey3yuv4tnzfe7ey26jfnnfgbpe
Development of a hash algorithm based on cellular automata and chaos theory
2021
Eastern-European Journal of Enterprise Technologies
The proposed algorithm is four times slower than the well-known family of "secure hash algorithms." However, computation speed is not a critical requirement for a hash function. ...
Processing in blocks of 128-bit uses cellular automata with mixed rules of 30, 105 and 90, 150 and takes into account the dependence of the generation of the initial vector on the incoming message. ...
gratitude to Dyachuk Rostislav Lyubomirovich -Assistant of the Department of Software for Computer Systems, Yu Fedkovich Chernivtsi National University for the refactoring of the algorithm code and advice on ...
doi:10.15587/1729-4061.2021.242849
fatcat:eocnolehfncbtijydd5sabp73a
A cryptographic hash function based on chaotic network automata
2017
Journal of Physics, Conference Series
This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468. ...
Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA). ...
Proposed cryptographic hash function We propose a cryptographic hash function based on the chaotic spatio-temporal outputs from network automata. ...
doi:10.1088/1742-6596/936/1/012058
fatcat:zohcgylhf5ccnjnbj46xyb6sxu
DEVELOPMENT AND RESEARCH OF CRYPTOGRAPHIC HASH FUNCTIONS BASED ON TWO-DIMENSIONAL CELLULAR AUTOMATA
2018
Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska
Software solution for cryptographic hash functions based on sponge construction with inner state implemented as two-dimensional cellular automata (CA) has been developed. ...
The developed hashing mechanism provides effective parallel processing, ensures good statistical and scattering properties, enables one to obtain hash of a varying length and reveals strong avalanche effect ...
Cellular automata (CA) have several properties that favor their use as a basis for the design of hash functions. ...
doi:10.5604/01.3001.0010.8638
fatcat:xsu7c2tv4jctlfbvzntu3ntzb4
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
2020
Information & Security An International Journal
based on complex cellular automata. ...
It suggests an improvement of the Diffie-Hellman algorithm by creating a one-way function on the basis of cellular automata with an extended set of rules. ...
based on complex cellular automata. ...
doi:10.11610/isij.4716
fatcat:q57bgwbbo5ac5h6lhirstwz5u4
About a Fast Cryptographic Hash Function Using Cellular Automata Ruled by Far-Off Neighbours
English
2021
International Journal of Engineering Trends and Technoloy
English
This paper introduces a simple cryptographic hash function based upon specific cellular automata [5] , defined as far neighbor-driven cellular automata. ...
CELLULAR AUTOMATA
A. ...
doi:10.14445/22315381/ijett-v69i2p206
fatcat:u2jvy5f4gfd7hmjtiei6lvielu
Application of RSAA for File Encryption
2017
International Journal of Engineering Research and Applications
We put forth a variable key length symmetric cryptosystem to encrypt text files based on the RSAA algorithm. It encrypts files by dividing its contents into blocks of 256 bits block at a time. ...
High security is achieved even with a single character key. This algorithm is fast and can be used to encrypt large text files quickly with ease. ...
The major operation in RSAA is based on Block Cellular Automata and its rules. It generates 16 Block Cellular Automata rules dynamically based on the input key using the RuleGen() function. ...
doi:10.9790/9622-0707070810
fatcat:ya6ktqmv7ffshcnwb5w5wfoqom
A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments
2021
General Letters in Mathematics
The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. ...
In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework ...
Cellular automata-based hash functions Cellular automata (CA) were first invented by Ulam and Von Neumann in 1940; afterwards, the CA theory was developed by Stephen Wolfram author of many reference studies ...
doi:10.31559/glm2021.10.2.4
fatcat:bmicopcwkjaktpj65ejbrc2uze
« Previous
Showing results 1 — 15 out of 527 results