Skip to main content

Cellular Automata Based Cryptosystem (CAC)

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

This paper introduces a Cellular Automata (CA) based symmetric key cryptosystem for block cipher. The scheme named as CAC (Cellular Automata based Cryptosystem) employs a series of transforms - simple, moderately complex, and complex - all generated with different classes of CA. CAC provides a low cost, high speed cryptosystem with desired level of security. Cryptanalysis of the proposed scheme is reported along with similar analysis for two popular systems - DES and AES. Experimental results confirm that the security of the system is significantly better than DES and comparable to that of AES. The encryption/decryption throughput is higher than that of both AES and DES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Biham and A. Shamir, “Differential cryptanalysis of des-like cryptosystems,” Journal of Gryptology, vol. 4, pp. 3–72, 1991.

    Article  MATH  MathSciNet  Google Scholar 

  2. S. Wolfram, “Cryptography with cellular automata,” Proceedings of Crypto, pp. 429–432, 1985.

    Google Scholar 

  3. P. Guan, “Cellular automaton public-key cryptosystem,” Complex System, vol. 1, pp. 51–57, 1987.

    MATH  Google Scholar 

  4. H. Gutowitz, “Cryptography with dynamical systems,” ESPCI, 1995.

    Google Scholar 

  5. S. Nandi, B.K. Kar, P.P. Chaudhuri “Theory and Application of Cellular Automata in Cryptography,” IEEE Trans. Computers, Vol. 43, Dec. 1994.

    Google Scholar 

  6. S. R. Blackburn, S. Murphy, K. G. P. I. S. Group, and R. Holloway, “Comments on ‘theory and applications of cellular automata in cryptography’,” IEEE Transaction on Computers, 1999.

    Google Scholar 

  7. N. Ganguly, A. Das, B. K. Sikdar, and P. P. Chaudhuri, “Cellular automata model for cryptosystem,” Cellular Automata Conference, Yokohama National University, Japan, 2000.

    Google Scholar 

  8. P. P. Chaudhuri and et. al., “Additive cellular automata theory and applications, vol 1” IEEE Computer Society Press, California, USA, 1997.

    MATH  Google Scholar 

  9. T. R. N. Rao and E. Fujiwara, “Error-control coding for computer systems,” Prentice-Hall, Englewood Cliffs, N.J.

    Google Scholar 

  10. N. Ganguly, “Cellular automata evolution-theory and applications,” PhD Thesis (proposed), Bengal Engineering College, (D U), Howrah, India, 2002.

    Google Scholar 

  11. D. Welsh, “Codes and cryptography,” Clarendon Press, Oxford, 1988.

    MATH  Google Scholar 

  12. C. E. Shannon, “Communication theory of secrecy systems,” Bell Systems Technical Journal, vol. 28, pp. 656–715, 1949.

    MathSciNet  Google Scholar 

  13. B. Schneier, “Applied cryptography,” Second Edition, John Wiley & Sons, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sen, S., Shaw, C., Chowdhuri, D.R., Ganguly, N., Chaudhuri, P.P. (2002). Cellular Automata Based Cryptosystem (CAC). In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_26

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_26

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics