Cellular Programming and Symmetric Key Cryptography Systems

The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process of encryption highly depends on a quality of used random numbers. One dimensional, nonuniform CAs is considered as a generator of pseudorandom number sequences (PNSs). The quality of PNSs highly depends on a set of applied CA rules. To find such rules nonuniform CAs with two types of rules is considered. The search of rules is based on an evolutionary technique called cellular programming (CP). Resulting from the collective behavior of the discovered set of CA rules very high quality PNSs are generated. The quality of PNSs outperform the quality of known one dimensional CA-based PNS generators used in secret key cryptography. The extended set of CA rules which was found makes the cryptography system much more resistant on breaking a cryptography key.

[1]  Howard C. Card,et al.  Parallel Random Number Generation for VLSI Systems Using Cellular Automata , 1989, IEEE Trans. Computers.

[2]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[3]  Marco Tomassini,et al.  Cryptography with cellular automata , 2001, Appl. Soft Comput..

[4]  Xin Yao,et al.  Parallel Problem Solving from Nature PPSN VI , 2000, Lecture Notes in Computer Science.

[5]  Marco Tomassini,et al.  Stream Cyphers with One- and Two-Dimensional Cellular Automata , 2000, PPSN.

[6]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[7]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[8]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[9]  H. C. Williams,et al.  Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.

[10]  Howard Gutowitz,et al.  Cryptography with Dynamical Systems , 1993 .

[11]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[12]  Palash Sarkar,et al.  A brief history of cellular automata , 2000, CSUR.

[13]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[14]  M. Sipper,et al.  Generating Parallel Random Number Generators by Cellular Programming , 1996 .

[15]  Jarkko Kari Cryptosystems Based on Reversible Cellular Automata , 1992 .

[16]  Puhua Guan,et al.  Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..

[17]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .