Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers

In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the experiments related to its implementation on micro-controllers.

[1]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[2]  Puhua Guan,et al.  Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Jarkko Kari Cryptosystems Based on Reversible Cellular Automata , 1992 .

[5]  M. Sipper,et al.  Generating Parallel Random Number Generators by Cellular Programming , 1996 .

[6]  Howard Gutowitz,et al.  Cryptography with Dynamical Systems , 1993 .

[7]  Xin Yao,et al.  Parallel Problem Solving from Nature PPSN VI , 2000, Lecture Notes in Computer Science.

[8]  Marco Tomassini,et al.  Stream Cyphers with One- and Two-Dimensional Cellular Automata , 2000, PPSN.

[9]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[10]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[11]  Marco Tomassini,et al.  On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata , 2000, IEEE Trans. Computers.

[12]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[13]  Howard C. Card,et al.  Parallel Random Number Generation for VLSI Systems Using Cellular Automata , 1989, IEEE Trans. Computers.

[14]  H. C. Williams,et al.  Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.

[15]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[16]  Albert Y. Zomaya,et al.  Cellular automata computations and secret key cryptography , 2004, Parallel Comput..