110 Hits in 3.4 sec

Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware [chapter]

Jun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo
2006 Lecture Notes in Computer Science  
On the other hand, Cellular Automata (CA) have attracted a lot of attention regarding their potential for various applications.  ...  Thus, this paper presents an ECbased hardware architectural model for division based on CA over Galois Field GF(2 n ).  ...  Accordingly, it can be used as a basic architecture not only for ECC, but also for other public key cryptosystems.  ... 
doi:10.1007/11758532_45 fatcat:uohruwxcmjhovpdljsj46n2yki

Novel applications of cellular automata in computing and computational astrophysics

Shrohan Mohapatra, Chandrasekhar Bhamidipati, Manoranjan Satpathy, Padmalochan Bera, Ankit Pradhan, Kamalakanta Sethi
2019 Zenodo  
This project deals with the design and analysis of cellular automata for its use in solving matrix multiplication in sub-quadratic time, formal verification of artificial neural networks, the security  ...  Acknowledgements Acknowledgements Authors would like to thank the anonymous referee for helpful suggestions.  ...  Reversible cellular automata have been suggested to be used in symmetric key cryptosystems [30] , and public key cryptosystems [23] .  ... 
doi:10.5281/zenodo.4923838 fatcat:hex2yqetvrfjtd2fmeifckvr2q

Fast Exponentiaion over GF(2m) Based on Cellular Automata [chapter]

Kyo-Min Ku, Kyeoung-Ju Ha, Kee-Young Yoo
2003 Lecture Notes in Computer Science  
cellular automata.  ...  Proposed architecture can be used efficiently for the design of the modular exponentiation on the finite field in most public key crypto systems such as Diffie-Hellman key exchange, ElGamal, etc.  ...  in GF(2 m ) based on cellular automata, which is the basic computation in any public key crypto system.  ... 
doi:10.1007/3-540-44862-4_91 fatcat:te2ffohgtnhltiugtstcrzl4ge

Page 5600 of Mathematical Reviews Vol. , Issue 88j [page]

1988 Mathematical Reviews  
The paper introduces a method for building public-key cryptosys- tems based on inhomogeneous cellular automata whose state func- tions take values in a mathematical ring.  ...  {For the entire collection see MR 88h:94004.} 88j:94030 94A60 68P25 68Q80 Guan, Puhua (1-PRRP) Cellular automaton public-key cryptosystem. Complex Systems 1 (1987), no. 1, 51-56.  ... 

Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor

Mohsen Machhout, Zied Guitouni, Kholdoun Torki, Lazhar Khriji
2010 International journal of network security and its applications  
The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion.  ...  In this paper, we propose an elliptic curve key generation processor over GF (2 163 ) scheme based on the Montgomery scalar multiplication algorithm.  ...  Li and C.N Zhang presented a low complexity programmable cellular automata based versatile modular multiplier in GF(2 m ).  ... 
doi:10.5121/ijnsa.2010.2208 fatcat:ytogfx5hljh2tiudcuqb64xqkm

Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA [chapter]

Jun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo
2006 Lecture Notes in Computer Science  
This study presents an efficient division architecture using irreducible trinomial in GF(2 n ), based on programmable cellular automata (PCA).  ...  The most expensive arithmetic operation in elliptic curve cryptosystems (ECC) is division, which is performed by multiplying the inverse of a multiplicand.  ...  A number of modern public key cryptography systems and schemes, for example, Diffie-Hellman key pre-distribution, ElGamal cryptosystem, and ECC, require division and inversion operations [2] .  ... 
doi:10.1007/11758549_90 fatcat:dpmddzryyba3nj5mhgxngcppqm

Computational Image Encryption Techniques: A Comprehensive Review

Mandeep Kaur, Surender Singh, Manjit Kaur, Erivelton Geraldo Nepomuceno
2021 Mathematical Problems in Engineering  
Key performance metrics are also presented. The future scope of image encryption is also presented to encourage the research community.  ...  These approaches are categorized based on different concepts such as chaotic maps, DNA, compressive sensing, and optical image encryption.  ...  In the case of a public key, two keys are utilized, one key for encryption and one for decryption. In this, the encryption key is made public, but the decryption key is always kept private [7] .  ... 
doi:10.1155/2021/5012496 fatcat:oidlu6wptveyphresdjape2gya


Salai Thillai Thilagam J
2017 International journal of advances in signal and image sciences  
To overcome such illegal access the security of modern computer systems uses public-ciphers key namely Rivest, Shamir and Adleman (RSA).  ...  The major concern for the governments and private network communication is the security of systems against eavesdropping and illegal access.  ...  The structure of the constituent modules of RSA is described in [6] based on the cellular automata.  ... 
doi:10.29284/ijasis.3.2.2017.21-26 fatcat:o2to7vybafamnduv5dfo3lc6lm

Composite cellular automata based encryption method applied to surveillance videos

Luis Miguel Cortés Martinez, Luz Deicy Alvarado Nieto, Edilma Isabel Amaya Barrera
2020 Dyna  
In this paper, a symmetric encryption method for surveillance videos is presented, based on reversible composite cellular automata developed for this purpose.  ...  In addition, it allows decryption without loss of information through a fixed size key for each video frame.  ...  Composite Cellular Automata definition The kind of CAs formulated in this paper are named Composite Cellular Automata (CCAs).  ... 
doi:10.15446/dyna.v87n213.81859 fatcat:ksaus5s5cvca3pos5px7x2izde

A DSP Based POD Implementation for High Speed Multimedia Communications

Chang Nian Zhang, Hua Li, Nuannuan Zhang, Jiesheng Xie
2002 EURASIP Journal on Advances in Signal Processing  
curve Diffie Hellman (ECDH) key exchange, elliptic curve key derivation function (ECKDF), cellular automata (CA) cryptography, communication processes between POD and Host, and Host authentication.  ...  In this paper, we present a digital signal processor (DSP) (TMS320C6211) based POD implementation for the real-time applications which include elliptic curve digital signature algorithm (ECDSA), elliptic  ...  In the following, we introduce the cellular automata based symmetric-key cryptography algorithm and how it is applied in POD.  ... 
doi:10.1155/s1110865702204138 fatcat:unbpdsrvxrfnhdjx6cvudz7fna

Block based Cipher Key Image Encryption Algorithm combined with Compression using DWT

Sonal Yadav
2020 International Journal for Research in Applied Science and Engineering Technology  
In this paper a DWT based compression has been performed along with block transformation based encryption.  ...  The aim is to scramble the picture data to a point where the real transmitted picture becomes hard for the intruder.  ...  Chen and Lai [3] provided an image encryption security system using CA cellular automata by recursively replacing picture pixels.  ... 
doi:10.22214/ijraset.2020.2063 fatcat:6hujmawgefernjv3vafgonsyrm

FPGA - based evaluation of power analysis attacks and its countermeasures on Asynchronous S-Box

G. Gokulashree, R. Ramya
2014 2014 International Conference on Electronics and Communication Systems (ICECS)  
A novel asynchronous S-Box design for AES cryptosystems is proposed and validated.  ...  These beneficial properties make it difficult for an attacker to decipher secret key embedded within the cryptographic circuits of the FPGA board.  ...  RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem.  ... 
doi:10.1109/ecs.2014.6892601 fatcat:zbjoadrkzzcvthkd3qpu5gy24i

RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System

Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha
2022 Symmetry  
The first stage makes use of Rule 30 cellular automata to generate the first encryption key.  ...  Specifically, the use of the PRNG bitstreams from both of the cellular automata and the Lorenz system, as keys, combined with the S-box, results in the needed non-linearity and complexity inherent in well-encrypted  ...  Based on the work of Wolfram in [20] , this fact was first utilized in [51] for the introduction of a block cipher for use in public-key cryptography.  ... 
doi:10.3390/sym14030443 fatcat:fitnmycm3nfxtcdudilgapvb5m

Two Attacks Against the HBB Stream Cipher [chapter]

Antoine Joux, Frédéric Muller
2005 Lecture Notes in Computer Science  
In this algorithm, classical LFSRs are replaced by cellular automata (CA).  ...  This attack is much faster than exhaustive search for secret keys of length 256 bits. 1 We did not consider other algorithms with smaller exponent such as the Coppersmith-Winograd algorithm, because they  ...  Two key sizes are suggested for HBB : 128 and 256 bits. The Round Function. The updating function of LC is based on the cellular automata theory. Details can easily be obtained from [27] .  ... 
doi:10.1007/11502760_22 fatcat:rgmdf7j3fjgejblq5vk6qreria

Image Encryption using Fractional Integral transforms: Vulnerabilities, Threats and Future scope [article]

Gurpreet Kaur, Rekha Agarwal, Vinod Patidar
2022 arXiv   pre-print
This paper presents a review on various image encryption schemes based on fractional transforms for security consideration of image communication.  ...  Based on the observations, the work is converged to a summary on various challenges and some constructive guidelines are provided for consideration in future work.  ...  Cellular Automata (T06) Cellular Automata (CA) also called cellular spaces, tessellation automata/structures, cellular structures or iteration arrays find application in various fields like physics, microstructure  ... 
arXiv:2203.02881v1 fatcat:abt35lynvrfbfmqq56fob2slru
« Previous Showing results 1 — 15 out of 110 results