Block cipher based on reversible cellular automata (original) (raw)
Abstract
We propose a new encryption algorithm relying on reversible cellular automata (CA). The behavior complexity of CA and their parallel nature makes them interesting candidates for cryptography. The proposed algorithm belongs to the class of symmetric key systems.
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Similar content being viewed by others
References
- Menezes, A., van Oorschot, P. and Vanstone, S.,Handbook of Applied Cryptography, CRC Press, 1996.
- Stallings, W.,Cryptography and Network Security (Third Edition), Prentice Hall, 2003.
- Guan, P., “Cellular Automaton Public-Key Cryptosystem,”Complex Systems 1 pp. 51–56, 1987.
MATH MathSciNet Google Scholar - Seredynski, F., Bouvry, P. and Zomaya, A.Y., “Cellular Programming and Symmetric Key Cryptography Systems,” in_Proc. of the Genetic and Evolutionary Computation — GECCO 2003_ (E. Cantú-Paz et al. eds.),LNCS 2724, pp. 1369–1381, Springer-Verlag, 2003.
- Toffoli, T. and Margolus, N., “Invertible Cellular Automata: A Review,”Physica, Vol. D 45, pp. 229–253, 1990.
MATH MathSciNet Google Scholar - Tomassini, M. and Perrenoud, M., “Stream Ciphers with One and Two-Dimensional Cellular Automata,” in_Proc. of the Parallel Problem Solving from Nature — PPSN VI_ (M. Schoenauer at al. eds.),LNCS, 1917, pp. 722–731, Springer-Verlag, 2000.
- Wolfram, S.,A New Kind of Science, Wolfram Media, 2002.
- Wolfram, S., “Cryptography with Cellular Automata,” in_Proc. of the Advances in Cryptology: Crypto ’85_ (H.C. Williams ed.),LNCS, 218, pp. 429–432, Springer-Verlag, 1985.
- Gutowitz, H.A., “Cryptography with Dynamical Systems,” in_Cellular Automata and Cooperative Phenomena_ (E. Goles at al. eds.), Kluwer Academic Press, 1993.
- Feistel, H., “Cryptography and Computer Privacy,”Scientific American, 228, 5, pp. 15–23, 1973.
Article Google Scholar - Kam, J. and Davida, G., “Structured Design of Substitution-Permutation Encryption Networks,”_IEEE Transactions on Computers, C_-28, 10, pp. 747–753, 1979.
Article MATH MathSciNet Google Scholar - Webster, A.F. and Tavares, S.E., “On the Design of S-Boxes,” in_Proc. of the Advances in Cryptology: Crypto ’85_ (H.C. Williams ed.),LNCS, 218, pp. 523–534, Springer-Verlag, 1985.
Author information
Authors and Affiliations
- Faculty of Science, Technology and Communication, University of Luxembourg, 6, rue Coudenhove Kalergi, L-1359, Luxembourg-Kirchberg, Luxembourg
Marcin Seredynski & Pascal Bouvry
Authors
- Marcin Seredynski
- Pascal Bouvry
Corresponding author
Correspondence toMarcin Seredynski.
Additional information
Marcin Seredynski: He is a Ph.D. student at University of Luxembourg and Polish Academy of Sciences. He received his M.S. in 2004 from Faculty of Electronics and Information Technology in Warsaw University of Technology. His research interests include cryptography, cellular automata, nature inspired algorithms and network security. Currently he is working on intrusion detection algorithms for ad-hoc networks.
Pascal Bouvry, Ph.D.: He earned his undergraduate degree in Economical & Social Sciences and his Master degree in Computer Science with distinction (’91) from the University of Namur, Belgium. He went on to obtain his Ph.D. degree (’94) in Computer Science with great distinction at the University of Grenoble (INPG), France. His research at the IMAG laboratory focussed on Mapping and scheduling task graphs onto Distributed Memory Parallel Computers. Next, he performed post-doctoral researches on coordination languages and multi-agent evolutionary computing at CWI in Amsterdam. He gained industrial experience as manager of the technology consultant team for FICS in the banking sector (Brussels, Belgium). Next, he worked as CEO and CTO of SDC (Ho Chi Minh city, Vietnam) in the telecom, semi-conductor and space industry. After that, He moved to Montreal Canada as VP Production of Lat45 and Development Director for MetaSolv Software in the telecom industry. He is currently serving as Professor in the group of Computer Science and Communications (CSC) of the Faculty of Sciences, Technology and Communications of Luxembourg University and he is heading the Intelligent & Adaptive Systems lab. His current research interests include: ad-hoc networks & grid-computing, evolutionary algorithms and multi-agent systems.
About this article
Cite this article
Seredynski, M., Bouvry, P. Block cipher based on reversible cellular automata.New Gener Comput 23, 245–258 (2005). https://doi.org/10.1007/BF03037658
- Received: 30 March 2004
- Revised: 07 July 2004
- Issue date: September 2005
- DOI: https://doi.org/10.1007/BF03037658