A cryptosystem based on elementary cellular automata

Abstract Based on elementary cellular automata, a new image encryption algorithm is proposed in this paper. In this algorithm, a special kind of periodic boundary cellular automata with unity attractors is used. From the viewpoint of security, the number of cellular automata attractor states are changed with respect to the encrypted image, and different key streams are used to encrypt different plain images. The cellular neural network with chaotic properties is used as the generator of a pseudo-random key stream. Theoretical analysis and experimental results have both confirmed that the proposed algorithm possesses high security level and good performances against differential and statistical attacks. The comparison with other existing schemes is given, which shows the superiority of the proposal scheme.

[1]  Jinsheng Sun,et al.  A chaotic stream cipher and the usage in video protection , 2007 .

[2]  Ismail Amr Ismail,et al.  An Efficient Adaptive Ergodic Matrix and Chaotic System for Image Encryption , 2010 .

[3]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..

[4]  Kee-Young Yoo,et al.  Elliptic curve based hardware architecture using cellular automata , 2008, Math. Comput. Simul..

[5]  Pino Caballero-Gil,et al.  A simple linearization of the self-shrinking generator by means of cellular automata , 2010, Neural Networks.

[6]  Pino Caballero-Gil,et al.  On the Use of Cellular Automata in Symmetric Cryptography , 2010, ArXiv.

[7]  Ahmed A. Abd El-Latif,et al.  A chaotic block cipher algorithm for image cryptosystems , 2010 .

[8]  Kjetil Nørvåg A study of object declustering strategies in parallel temporal object database systems , 2002, Inf. Sci..

[9]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[10]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[11]  Ben Zhang,et al.  Computing with random quantum dot repulsion , 2008, Inf. Sci..

[12]  Franciszek Seredynski CA-based S-boxes for Secure Ciphers , 2008 .

[13]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[14]  John T. Sheridan,et al.  Image encryption and the fractional Fourier transform , 2003 .

[15]  Stephen M. Matyas,et al.  The data encryption standard , 1997, Inf. Secur. Tech. Rep..

[16]  Ali Mohades,et al.  An Image Encryption System by Cellular Automata with Memory , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[17]  S. Wolfram Statistical mechanics of cellular automata , 1983 .

[18]  Yuanxiang Li,et al.  Image Encryption Algorithm Based on Self-Adaptive Symmetrical-Coupled Toggle Cellular Automata , 2008, 2008 Congress on Image and Signal Processing.

[19]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[20]  Kwok-Tung Lo,et al.  Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN , 2010, PCM.

[21]  John von Neumann,et al.  Theory Of Self Reproducing Automata , 1967 .

[22]  Wei Zhang,et al.  A Digital Image Encryption Scheme Based on the Hybrid of Cellular Neural Network and Logistic Map , 2005, ISNN.

[23]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[24]  Shujun Li,et al.  Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps , 2009, ArXiv.

[25]  Stuart Harvey Rubin On randomization and discovery , 2007, Inf. Sci..

[26]  Shiguo Lian,et al.  A block cipher based on chaotic neural networks , 2009, Neurocomputing.

[27]  Shujun Li,et al.  Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher , 2004, ISNN.

[28]  Ajit Narayanan,et al.  Regular biosequence pattern matching with cellular automata , 2002, Inf. Sci..

[29]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[30]  Aloka Sinha,et al.  Chaos based multiple image encryption using multiple canonical transforms , 2010 .