New Symmetrical Cryptosystems Based on a Dynamic Optimization Model : two-Dimensional non-Uniform Cellular Automata

AbstractToday, computer networks are complex and illegal wiretapping is possible. This poses a real problem for the security during transmission of data. For ethical reasons, the transfer of sensitive data cannot be done with such a danger and must protect themselves. Protection best suited for this type of communication is the cryptography. However, despite all its developments, it is still hampered by some flaws citing in particular the key size and resistance against advanced attacks.Thus, in this paper we present two new cellular automata-based optimization algorithms aiming to solve problems of images encryption: S2CA, Symmetrical Cellular Automata-based Ciphering Algorithm, and S2CA-EX, Symmetrical Cellular Automata-based Ciphering Algorithm Extension. The main idea is to operate on the pixels positions or pixels RGB coding positions in order to alter the original image so as to have the maximum of disorder in the corresponding encrypted image. The proposed algorithms were tested on images of differ...

[1]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[2]  Palash Sarkar,et al.  A brief history of cellular automata , 2000, CSUR.

[3]  Albert Y. Zomaya,et al.  Cellular automata computations and secret key cryptography , 2004, Parallel Comput..

[4]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[5]  J. H. Lint Winning ways for your mathematical plays, vol. 1: Games in general; vol. 2: Games in particular / E.R. Berlekamp, J.H. Conway, R.K. Guy , 1985 .

[6]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[9]  Franck Leprévost Les standards cryptographiques du XXI e siècle : AES et IEEE-P1363 , 2000 .

[10]  Pino Caballero-Gil,et al.  Application of Linear Hybrid Cellular Automata to Stream Ciphers , 2007, EUROCAST.

[11]  Herman Akdag,et al.  Images encryption by the use of evolutionary algorithms , 2011 .

[12]  N. Margolus,et al.  Invertible cellular automata: a review , 1991 .

[13]  Matthew Cook,et al.  Universality in Elementary Cellular Automata , 2004, Complex Syst..

[14]  Puhua Guan,et al.  Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..

[15]  Willi Meier,et al.  Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.

[16]  D. Huffman A Method for the Construction of Minimum-Redundancy Codes , 1952 .

[17]  Jon C. Muzio,et al.  Analysis of One-Dimensional Linear Hybrid Cellular Automata over GF(q) , 1996, IEEE Trans. Computers.

[18]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[19]  Julien Provillard Automates cellulaires non-uniformes , 2012 .

[20]  Marco Tomassini,et al.  Stream Cyphers with One- and Two-Dimensional Cellular Automata , 2000, PPSN.

[21]  Robert H. Gilman Classes of linear automata , 1987 .

[22]  Nicolas Ollinger,et al.  Bulking II: Classifications of cellular automata , 2010, Theor. Comput. Sci..

[23]  Stanislaw M. Ulam Patterns of Growth of Figures , 1986 .

[24]  Marco Tomassini,et al.  On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata , 2000, IEEE Trans. Computers.

[25]  Klaus Sutner Classifying circular cellular automata , 1991 .

[26]  A. Anderson,et al.  Stability analysis of a hybrid cellular automaton model of cell colony growth. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[27]  Marco Tomassini,et al.  Cryptography with cellular automata , 2001, Appl. Soft Comput..

[28]  Bruno Martin A Walsh Exploration of Elementary CA Rules , 2008, J. Cell. Autom..

[29]  Douglas R. Stinson,et al.  Cryptographie - Théorie et Pratique , 1996 .

[30]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[31]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[32]  P. Kurka Languages, equicontinuity and attractors in cellular automata , 1997, Ergodic Theory and Dynamical Systems.

[33]  S. Ulam A collection of mathematical problems , 1960 .

[34]  Jarkko Kari Cryptosystems Based on Reversible Cellular Automata , 1992 .

[35]  Howard Gutowitz,et al.  Cryptography with Dynamical Systems , 1993 .

[36]  Bruno Martin Analyse des suites aléatoires engendrées par des automates cellulaires et applications à la cryptographie , 2008, ArXiv.

[37]  G. Tindo CCPBAC:un cryptosystème à clés publiques basés sur des automates cellulaires , 2022 .