期刊文献+

可逆元胞自动机加密技术研究 被引量:7

Encryption based on reversible cellular automata
下载PDF
导出
摘要 利用可逆元胞自动机无信息损失和高度并行处理的特点,提出了一种新的基于可逆二阶触发元胞自动机的分组加密算法。该算法没有取整个规则空间为密钥空间,而是通过引入规则表的λ参数,对原本庞大的规则空间进行了划分,证明了满足λ=0.5的一类规则适合用于加密。经分析表明,与一般不可逆触发元胞自动机加密技术相比,这种可逆触发元胞自动机加密技术不仅提高了加密速度,而且增加了密钥空间,具有良好的抵抗蛮力攻击和差分分析的能力。 The reversible cellular automata is featured by its no information loss and parallel information processing. A new block cipher based on reversible second-order toggle cellular automata was proposed. Instead of using the whole rules space as the keys space, the new algorithm introduces a parameter 2 to partition the rules space and proves that rules with 2=-0.5 are becoming to encrypt. Compared with the general irreversible toggle cellular automata cryptosystem, the proposed method greatly improves the speed of encryption and has large keys space, it can resist bruce attack and differential cryptanalysis.
出处 《通信学报》 EI CSCD 北大核心 2008年第5期26-33,共8页 Journal on Communications
基金 国家自然科学基金资助项目(90718021)~~
关键词 密码学 二阶元胞自动机 触发规则 cryptography second-order cellular automata toggle rule
  • 相关文献

参考文献9

  • 1WOLFRAM S. A New Kind of Science[M]. Champaign, IL: Wolfram Media, 2002.
  • 2WOLFRAM S. Cryptography with cellular automata[A]. Advances in Cryptology-CRYPTO'85: Proceedings,LNCS,218[C]. Berlin:Springer-Verlag, 1986. 429-432.
  • 3SIPPER M, TOMASSINI M. Generating parallel random number generators by cellular programming[J]. International Journal of Modern Physics C, 1996,7(2):181-190.
  • 4ZHAO X L, LI Q M, XU M W, et al. A synmmetric cryptography based on extended cellular automata[A]. IEEE-SMC2005[C]. Hawaii, USA, 2005.
  • 5GUAN P. Cellular automata public-key cryptosystems[J].Complex System, 1987,1:51-57.
  • 6MIHAIAEVIC M, ZHENG Y, IMAI H. A family of fast dedicated one-way hash functions based on linear cellular automata over GF(q)[J]. IEICE Transactions on Fundamentals,1999, E82-A(1): 40-47.
  • 7张传武,沈野樵,彭启琮.细胞自动机反向迭代加密技术研究[J].计算机学报,2004,27(1):125-129. 被引量:22
  • 8GUTOWITZ H. Method and Apparatus for Encryption, Decryption and Authentication Using Dynamical Systems[P]. USA: 5365589, 1994.
  • 9祝玉学,赵学龙.物理系统的元胞自动机模拟[M].北京:清华大学出版社,2003.

二级参考文献9

  • 1Wolfram S.. Cryptography with cellular automata, advances in cryptology. In: Crypto'85 Proceedings, LNCS, 218, Berlin:Springer-Verlag, 1986. 429~432
  • 2Guan P.. Cellular automata public-key cryptosystems. Complex Systems, 1987, 1:51~57
  • 3Nandi S. , Kar B. K. , Chaudhuri P. Pal. Theory and applications of cellular automata in cryptography. IEEE Transactions on Computers, 1994, 43(12) :1346~1356
  • 4Habutsu Toshiki, Nishio Yoshifumi, Sasase Iwao, Mori Shin saku. A secret key cryptosystem using a chaotic map. The Transactions of the IEICE, 1990, E73(7):1041~1044
  • 5Wolfram S.. University and complexity in cellular automata.Physica D, 1984, 10(1):1~35
  • 6Wolfram S.. Origins of randomness in physical system. Physical Review Letters, 1985, 55(5) :449~452
  • 7Farmer D. , Toffoli T. , Wolfram S.. Cellular automata. Los Alamos Science, 1983, 9:2~21
  • 8Wolfram S.. Statistical mechanics of cellular automata. Reviews of Modern Physics, 1983, 55(3) :601~644
  • 9Gutowitz H. , Victor J. D. , Knight B. W.. Local structure theory for cellular automata, Physica D, 1987,28:18~48

共引文献35

同被引文献73

  • 1刘云,郑永爱,莫丽丽.基于超混沌系统的图像加密方案[J].中南大学学报(自然科学版),2009,40(S1):121-126. 被引量:6
  • 2邓婷,易忠,邓培民.状态机的稳定状态与稳定子集[J].广西师范大学学报(自然科学版),2005,23(3):29-32. 被引量:5
  • 3C. Schwartz.A New Graphical Method for Encryption of Computer Data.Cryptologia,1991.15(1):43-46.
  • 4R. Matthews. On the derivation of a Chaotic encryption algorithm[J],Cryptologia, 1989. ⅩⅢ(1):29-42.
  • 5Zhihua Feng,Yunjie Zhang,And Yongchao Liu.Image encryption based on reversible cellular automata [J].Advances in Information and Systems Sciences 2007,2:178N1 86.(ISTP检索).
  • 6S. Wolfram. Theory and Applications of Cellular Automata[M]. Singapore: World Scientific, 1986.
  • 7JADUR C,YAZLLE J. On the dynamics of cellular automata induced from a prefix code[J]. Advances in Applied Mathematics, 2007,38 (1) : 27-53.
  • 8AKIN H,SIAP I. On cellular automata over Galois rings[J]. Information Processing Letters,2007,103(1):24-27.
  • 9INOKUCHI S. On behaviors of cellular automata with rule 156[J]. Bulletin of Informaties and Cybernetics, 1998,30 (1):121-131.
  • 10KHAN A R,CHOUDHURY P P,DIHIDAR K,et al. VLSI architecture of a cellular automata[J]. Computers and Mathematics with Applications, 1997,33 (5) : 79-94.

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部