PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cryptosystem Based on Reversible Two-dimensional Cellular Automata

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cellular Automata have been successfully applied to several scientific problems such as among others image processing or data encryption. One could find reversibility of dynamics is a fundamental feature of nature. While the most CA are not reversible in nature, one can find some CA with simple behavior could be reversible. Reversible cellular automata (RCA) as efficient encryption and decryption devices was originally conceived by Kari. In this introduction paper, we analyze and develop reversible cellular automata (RCA) based on Kari’s idea and some Clarridge’s concepts.
Słowa kluczowe
Twórcy
  • Institute of Computer Science, University of Podlasie St. 3 Maja 52, 08-110 Siedlce, Poland
Bibliografia
  • 1. Appelbaum B., Ishai Y., Kushilevitz E., “Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature”, http://www.wisdom.weizmann.ac.il/~bennyap/pubs/CA.pdf
  • 2. Arcaya I., Romero N., On a Hedlund’s theorem and place-dependent cellular automata, http://revistas.luz.edu. ve/index.php/divma/article/viewFile/3117/3002
  • 3. Bao F., “Cryptanalysis of Partially Known Cellular Automata Cryptosystem”, IEEE Computer Society 2004, http://scilib.kiev.ua/ieee/tc/2004/ll/ty/tl493.pdf
  • 4. Clarridge A., Salomaa K., “A Cryptosystem Based the Composition of Reversible Cellular Automata”, http://research.cs.queensu.ca/TechReports/Reports/2008-549.pdf
  • 5. Clarridge A., “Cellular Automata: Algorithms and Applications”, 2009, thesis, http://qspace.library.queensu.ca/dspace/bitstream/1974/1724/l/Clarridge_Adam_G_200 903_MSc.pdf
  • 6. Durand-Lose J., Representing Reversible Cellular Automata with Reversible Block Cellular Automata, http://www.emis.ams.org/joumals/DMTCS/pdlpapers/dmAA0110.pdf
  • 7. Gajardo A. Goles E., Circuit Universality of Two Dimensional Cellular Automata: a Review, http://citeseerx.ist.psu.edu/viewdoc/summery?doi=10.1.1.88.9179
  • 8. Gutowitz H., “Cryptography with Dynamical Systems” 1996, http://citeseerx.ist.psu. edu/viewdoc/summary?doi= 10.1.1.52.7330
  • 9. Kaminski A., Cellular Auotmaa Based Stream Cipher.Lectures notes, www.cs.vit.edu/~arch/lectures/ca/c01/cass01.pdf
  • 10. Kari J., “Cryptosystems based on reversible cellular automata”, http://sgldwssr.hp.infoseek.co.jp/kari92cryptosystems
  • 11. Kari J., “Theory of cellular automata: A survey”, http://www.lama.univ- savoie.fr/~theyssier/edocs/kariSurvey.pdf
  • 12. Kari J., Undecidable Properties on the Dynamics of Reversible One-Dimensional Cellular Automata, JAC 2008, http://hal.archives-ouvertes.fr/docs/00/27/40/09/PDF/3-14.pdf
  • 13. Kelsey J., Schneier B., Wagner D., Hall Ch. “Cryptoanalytic on Pseudorandom Number Generators” www.eecs.berkeley.edu/~daw/papers/pmgs-fse98.ps
  • 14. Morita K., Cellular Automata and Artificial Life, 1998 Summer School on Complex Systems, http://www.iec.hiroshima-u.ac.jp/~morita/publ.html
  • 15. Philip N.S., Joseph K.B., “Chaos for Stream Cipher”,http://citeseerx.ist.psu.edu/viewdoc/summary?doi=l 0. 1.1.14.1256,
  • 16. Płaczek W., „Kwantowy algorytm Shora - czyli jak łamać szyfry”, www.if.uj.edu.pl/~placzek/referaty/Shor.pdf
  • 17. Sen S., Hossain Sk.I., Chowdhuri D.R., Chaudhuri P.P., “Cryptosystem Designed for Embedded System Security”, Proc. Of the International Conference on VLSI Design (VLSF03). 2003 IEEE, http://eref.uqu.edu.sa/files/Others/Hardware-Software%20Co-design/Cryptosystem%20designed%20for%20embedded%20system%20security.pdf,
  • 18. Seredynski F., Bouvry P., Zomaya A.Y., “Cellular automata computations and secret key cryptography”, http://pascal.bouvry.org/ftp/parco04.pdf
  • 19. Sutner K., The Complexity of Reversible Cellular Automata, http://www.cs.cmu.edu/~sutner/papers/reverse.pdf
  • 20. Taati S., Cellular Automata Reversible over Limit Set?, http://users.utu.fi/staati/articles/AUTOMATA05.pdf
  • 21. Testa II J.S., Investigations of Cellular Automata-based Stream Ciphers, http://ritdml.rit.edu/bitstream/hanadle/1850/7897/JTestaThessis05-2008.pdf....
  • 22. Toffoli T., Computation and Construction Universality of Reversible Cellular Automata, 1976 JCSS, http://pml.bu.edu/~tt/qcl/pdf7tofFolitl97718176a6b.pdf
  • 23. Wolfram S., Cryptography with cellular automata, http://dsns.csie.nctu.edu.tw/research/ciypto/HTML/PDF/C85/497PDF
  • Books
  • 1. Koblitz N., Wykład z teorii liczb i kryptografii, Warszawa 1995.
  • 2. Menezes A.J., van Oorschot P.C., Vanstone S.A., Kryptografia stosowana, Warszawa 2005.
  • 3. Schneier B., Kryptografia dla praktyków. Protokoły, algorytmy i programy źródłowe w języku C, Warszawa 1995.
  • WWW pages
  • 1. www.en.wikipedia.org
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c199ba34-49ae-4e92-8d6f-0e76fd75302e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.