Cryptographic Techniques Based on Bio-Inspired Systems

In this chapter, bio-inspired techniques based on the cellular automata (CAs) and programmable cellular automata (PCAs) theory are used to develop information security systems. The proposed cryptosystem is composed from a combination of a CA as a pseudorandom number generator (PRNG) and a PCA that construct the ciphering functions of the designed enciphering scheme. It is presented how simple elements named „cells” interact between each other using certain rules and topologies to form a larger system that can be used to encrypt/decrypt data sent over network communication systems. The proposed security system was implemented in hardware in FPGA devices of type Spartan 3E – XC3S500E and was analyzed and verified, including NIST statistical tests, to assure that the system has good security and high speed. The experimental results proves that the cryptographic techniques based on bio-inspired algorithms provides an alternative to the conventional techniques (computational methods).

[1]  Petre Anghelescu,et al.  Encryption Technique with Programmable Cellular Automata (ETPCA) , 2010, J. Cell. Autom..

[2]  John von Neumann,et al.  Theory Of Self Reproducing Automata , 1967 .

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  R. McLeod,et al.  Cellular automata circuits for built-in self test , 1990 .

[5]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[6]  Mark Weiser,et al.  The computer for the 21st Century , 1991, IEEE Pervasive Computing.

[7]  Andres Upegui,et al.  Dynamically Reconfigurable Hardware for Evolving Bio-Inspired Architectures , 2010, Intelligent Systems for Automated Learning and Adaptation.

[8]  Howard C. Card,et al.  Parallel Random Number Generation for VLSI Systems Using Cellular Automata , 1989, IEEE Trans. Computers.

[9]  Sukumar Nandi,et al.  LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption , 2009, Int. J. Netw. Secur..

[10]  W. Schwarz,et al.  Chaos and cryptography , 2001 .

[11]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[12]  Un-Sook Choi,et al.  Computing Phase Shifts of Maximum-Length 90/150 Cellular Automata Sequences , 2004, ACRI.

[13]  Soo-Chang Pei,et al.  Generating Chaotic Stream Ciphers Using Chaotic Systems , 2003 .

[14]  Pino Caballero-Gil,et al.  Chaotic Cellular Automata with Cryptographic Application , 2010, ACRI.

[15]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[16]  Petre Anghelescu,et al.  HIGH-SPEED PCA ENCRYPTION ALGORITHM USING RECONFIGURABLE COMPUTING , 2013, Cybern. Syst..

[17]  Roland Schmitz,et al.  Use of chaotic dynamical systems in cryptography , 2001, J. Frankl. Inst..

[18]  Francisco Rodríguez-Henríquez,et al.  Cryptographic Algorithms on Reconfigurable Hardware , 2010 .

[19]  Marco Tomassini,et al.  Stream Cyphers with One- and Two-Dimensional Cellular Automata , 2000, PPSN.

[20]  Xiaowen Li,et al.  A new spatiotemporally chaotic cryptosystem and its security and performance analyses. , 2004, Chaos.

[21]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .