Abstract
High volume products for Internet of Things have a constricted cost that limit the cryptographic implementation in such devices. Thus, there is a need to design a lightweight cryptography stream cipher that can fit such low computation devices with low cost. This paper proposes a lightweight stream cipher that can enhance Linear Feedback Shift Register (LFSR), Feed Carry Shift Register (FCSR) within the Shrinking Generator stream cipher and used Cellular Automata (CA) to update the cipher stream.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Alfke, P.: Efficient Shift Registers, LFSR Counters, and Long Pseudo- Random Sequence Generators, Xilinx. Tech. Rep., Version 1.1 (1996)
Koeter, J.: What’s an LFSR? Texas Instruments Incorporated (December 1996)
Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 174–178. Springer, Heidelberg (1994)
Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) Advances in Cryptology - CRYPT0 1993. LNCS, vol. 773, pp. 22–39. Springer, Heidelberg (1994)
Meier, W., Staffelbach, O.: The self-shrinking generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 205–214. Springer, Heidelberg (1995)
Couture, R., L’Ecuyer, P., Tezuka, S.: On the distribution of k-dimensional vectors for simple and combined Tausworthe sequences. Math-132 L’Ecuyerematics of Computation 60(202), 749–761 (1993)
Von Neumann, J.: Theory of Self-Reproducing Automata. Univ. of Illinois Press, Urbana (1966)
Hjelle, G.A.: Conway’s Game of Life. Math. Circle (February 22, 2009)
Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)
Mitra, A.: On Pseudo-Random and Orthogonal Binary Spreading Sequences. International Journal of Information and Communication Engineering, 447–454 (2008)
Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J., Mubarak, K.: A New Lightweight Hybrid Cryptographic Algorithm for the Internet of Things. In: Proc. ICITST 2012, London, December 10-12, pp. 87–92 (2012)
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data trades-of for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Penzhorn, W.T.: Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 159–172. Springer, Heidelberg (1996)
Courtois, N.T., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J., Mubarak, K. (2014). A Novel Hybrid Cellular Automata Based Cipher System for Internet of Things. In: Park, J., Stojmenovic, I., Choi, M., Xhafa, F. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40861-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-40861-8_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40860-1
Online ISBN: 978-3-642-40861-8
eBook Packages: EngineeringEngineering (R0)