A novel symmetric key encryption technique using Cellular Automata

A Cellular Automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via internet, requirement of security and privacy of information is must. For securing big or small data over internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored. Here, the paper presents a symmetric key cryptographic technique of block cipher using cellular automata (CAs) rules. Proposed methodology has been implemented in C. This cryptographic technique uses Non- complemented cellular automata rules and hybrid CA rule vector to form a group cellular automata that would be used to encrypt and decrypt the data.

[1]  John von Neumann,et al.  Theory Of Self Reproducing Automata , 1967 .

[2]  B. Bowerman,et al.  Introductory Statistics, Third Edition , 1978 .

[3]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[4]  Stephen Wolfram,et al.  Theory and Applications of Cellular Automata , 1986 .

[5]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[6]  Stephen Wolfram,et al.  A New Kind of Science , 2003, Artificial Life.

[7]  Georgios Ch. Sirakoulis,et al.  1-d cellular automaton for pseudorandom number generation and its reconfigurable hardware implementation , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[8]  E. Sofron,et al.  Programmable cellular automata based encryption algorithm , 2008, 2008 International Semiconductor Conference.

[9]  Amita Pal,et al.  Computers and Mathematics with Applications Investigation of the Global Dynamics of Cellular Automata Using Boolean Derivatives , 2022 .

[10]  Petre Anghelescu Hardware implementation of programmable cellular automata encryption algorithm , 2012, 2012 35th International Conference on Telecommunications and Signal Processing (TSP).

[11]  N. Dey,et al.  BioHash code generation from electrocardiogram features , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[12]  N. Dey,et al.  1-D group cellular automata based image encryption technique , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[13]  Nilanjan Dey,et al.  Watermarking in motion vector for security enhancement of medical videos , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).