期刊文献+

基于细胞自动机的公钥密码体制研究 被引量:3

Public-key Cryptosystem Based on Cellular Automata
下载PDF
导出
摘要 为了解决高速实时信息传输的瓶颈问题,该文提出了一种基于细胞自动机理论的公钥密码算法。该算法以n个一维可逆细胞自动机为私钥,由它们构造出的二维Moore型不可逆的细胞自动机为公钥组成公钥密码体制。该算法实现简单,易于VLSI(超大规模集成电路)实现,有效地解决了复杂密码算法在高速实时信息传输时带来的瓶颈现象。 To solve the bottle-neck on high speed and real-time information transmission, a publickey cryptosystem based on cellular automata is proposed. This algorithm employs n one-dimensional reversible cellular automata as a secret key, and the two-dimensional Moore-neighbor irreversible cellular automata constructed by the cellular automata is taken as a public-key. Both of these keys compose the public-key cryptosystem. This algorithm is simple and is easy to be implementated with VLSI, which efficiently solves the bottle-neck phenomenon caused by the complicated encryption algorithm during the high-speed and real-time information transmission.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2007年第5期612-616,共5页 Journal of Nanjing University of Science and Technology
基金 南京理工大学科研发展基金
关键词 加密算法 公钥密码体制 细胞自动机 实时 encryption algorithm public-key cryptosystem cellular automata real time
  • 相关文献

参考文献10

  • 1张传武,沈野樵,彭启琮.细胞自动机反向迭代加密技术研究[J].计算机学报,2004,27(1):125-129. 被引量:22
  • 2Wolfram S. Cryptography with cellular automata [A]. Advances in Cryptology : Crypto' 85 Proceedings, Lecture Notes in Computer science [C]. Heidelberg: Springer, 1986. 429 - 432.
  • 3Gutowitz H. Method and apparantus for encryption, decryption and authentication using dynamical systems [P]. USA: 5365589, 1994.
  • 4赵学龙,游静,李千目,刘凤玉.耦合触发元胞自动机在数据加密中的应用[J].信息与控制,2005,34(6):746-752. 被引量:6
  • 5Del Rey A M. A novel cryptosystem for binary images [J]. Studies in Informatics and Control, 2004, 13 (1): 5-14.
  • 6Tomassini M, Sippe M, Zolla M. Generating high- quality random numbers in parallel by cellular automata [J]. Future Generation Computer System Systems 1999, 16:291-505.
  • 7Hernandez L, Martin A, Hernandez A. Encryption of images with 2-dimensional cellular automata [A]. Proc 6th Muhiconference on Systemics, Cybernetics and Informatics [C]. Orlando : The 6th Muhiconference on Systemics, Cybernetics and Informatics, 2002. 471-476.
  • 8Richardson D. Tessellations with local transformations [J]. Journal of Computer Systems Sciences, 1972, 6: 373 - 388.
  • 9Kari J. Reversibility and surjectivity problems of cellular automata [J]. Journal of Computer Systems Sciences, 1992, 48 (1): 149 - 182.
  • 10Amoroso S, Patt Y. Decision procedures for surjectivity and injectivity of prallel maps for tessellation structures [J]. Journal of Computer Systems Sciences, 1972, 6 : 448 - 464.

二级参考文献15

  • 1Lai C. High-speed Cellular-automata Based Block Cipher and Fault Tolerant Public-key Cryptosystems [ D]. Regina, Canada: The University of Regina, 2000.
  • 2Gutowitz H A. Method and apparatus for encryption, decryption and authentication using dynamical systems [P]. USA: 5,365,589, 1994.
  • 3Olivcim G M B, Coelho A R, Monteim L H. A cellular automata cryptographic model based on bi-directional toggle rules [J]. International Journal of Modem Physics C, 2004, 15 (8) : 1061-1068.
  • 4Briesen M, Weimar J R. Distributed simulation environment for coupled cellular automata in java [ A]. Proceedings of the International Conference on Parallel Computing in Numerical Optimization [ C]. London: Imperial College Press, 2002.
  • 5ChopardB DrozM.物理系统的元胞自动机模拟[M].北京:清华大学出版社,2003..
  • 6Wolfram S.. Cryptography with cellular automata, advances in cryptology. In: Crypto'85 Proceedings, LNCS, 218, Berlin:Springer-Verlag, 1986. 429~432
  • 7Guan P.. Cellular automata public-key cryptosystems. Complex Systems, 1987, 1:51~57
  • 8Nandi S. , Kar B. K. , Chaudhuri P. Pal. Theory and applications of cellular automata in cryptography. IEEE Transactions on Computers, 1994, 43(12) :1346~1356
  • 9Habutsu Toshiki, Nishio Yoshifumi, Sasase Iwao, Mori Shin saku. A secret key cryptosystem using a chaotic map. The Transactions of the IEICE, 1990, E73(7):1041~1044
  • 10Wolfram S.. University and complexity in cellular automata.Physica D, 1984, 10(1):1~35

共引文献21

同被引文献26

  • 1平萍,赵学龙,张宏,刘凤玉.基于耦合触发元胞自动机的并行加密模型[J].信息与控制,2006,35(3):368-373. 被引量:4
  • 2朱智超,张荣.基于小波变换的视频压缩加密方案[J].计算机工程与应用,2006,42(32):59-62. 被引量:1
  • 3朱从旭,陈志刚,欧阳文卫.一种基于广义Chen's混沌系统的图像加密新算法[J].中南大学学报(自然科学版),2006,37(6):1142-1148. 被引量:26
  • 4陈志平,徐宗本.计算机数学[M]科学出版社,2001.
  • 5Wolfram S.Cryptography with cellular automata[A].Advances in Cryptology—CRYPTO’85 Proceedings[C].Berlin,Germany:Springer Berlin Heidelberg,1986:429-432.
  • 6Tomassini M,Sipper M.On the generation of highquality random numbers by twodimensional cellular automata[J].IEEE Transactions on Computers,2000,49(10):1140-l151.
  • 7Gutowitz H.Cryptography with dynamical systems[A].Cellular Automata and Cooperative Systems[C].Netherlands:Springer Netherlands,1993:237-274.
  • 8Ayanzadeh R,Hassani K,Moghaddas Y,et al.Multilayer cellular automata for generating normal random numbers[A].2010 18th Iranian Conference on Electrical Engineering(ICEE)[C].Isfahan,Iran:IEEE,2010:495-500.
  • 9Rao J N,Singh A C.A novel encryption system using layered cellular automata[J].International Journal of Engineering Research and Applications(IJERA),2012,2(6):912-917.
  • 10Seredynski M,Pienkosz K,Bouvry P.Reversible cellular automata based encryption[J].Network and Parallel Computing,2004,3222:411.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部