期刊文献+

细胞自动机置换群加密技术研究 被引量:4

Encryption Based on the Permutation of Cellular Automata
下载PDF
导出
摘要 With the development of the information technology ,information security ,as well as the implementation ofthe encryption system becomes more and more complexity,and therefore new methods are explored to simplify com-plexity of the implementation. Cellular automata has the characters of simplicity of basic components ,locality of cellu-lar automata interactions ,massive parallelism of information processing ,and exhibits complex global properties, whichmakes it suitable for the application in cryptography. This paper presents a new method of encryption,the key of thenew method consists of the permutation cellular automata, the vectors inputted, and the number of the itera-tion. Evidently,it has larger kev space than other methods with only the cellular automata itself as the key. With the development of the information technology ,information security,as well as the implementation of the encryption system becomes more and more complexity .and therefore new methods are explored to simplify complexity of the implementation. Cellular automata has the characters of simplicity of basic components ,locality of cellular automata interactions ,massive parallelism of information processing,and exhibits complex global properties ,which makes it suitable for the application in cryptography. This paper presents a new method of encryption,the key of the new method consists of the permutation cellular automata, the vectors inputted, and the number of the iteration. Evidently, it has larger key space than other methods with only the cellular automata itself as the key.
出处 《计算机科学》 CSCD 北大核心 2003年第3期171-173,共3页 Computer Science
基金 国防科技保密通信重点实验室基金"新型密码体制研究(基金编号2000JS06.1.2ZS0601)
关键词 细胞自动机 置换群加密技术 信息安全 信息技术 密码学 序列密码 Cellular automata (CA) ,Permutation group,Block cipher
  • 相关文献

参考文献11

  • 1[1]Wolfram S. Theory and Application of Cellular Automata. World Scientific, Singapore, 1986
  • 2[2]Wolfram S. Origins of Randomness in Physical System. Physical Review Letters,1985,55(5):449~452
  • 3[3]Wolfram S. Cryptography with Cellular Automata. Advances in Cryptology, 1985.429~432
  • 4[4]Guan P. Cellular Automata Public-key Cryptosystems, Complex Systems,Vol. 1,1987
  • 5[5]Nandi S,Kar B K,Chaudhuri P P. Theory and Applications of Cellular Automata in Cryptography. IEEE Trans. Compu. , 1994, 43(12)
  • 6[6]Farmer D, Toffoli T,Wolfram S. Cellular Automata. Physica D,1984,10(1)
  • 7[7]Wolfram S. Statistical Mechanics of Cellular Automata. Review Modern Phys. , 1983,55(3): 601~644
  • 8[8]Wolfram S. University and Complexity in Cellular Automata. Physica D,1984,10(1)
  • 9[9]Toffoli T, Margolus N. Invertible Cellular Automata: A Review. Physica D, 1990,45: 229~253
  • 10[10]Pries W,Thanailakis A,Howard C. Card,Group Properties of Cellular Automata and VLSI Application. IEEE Trans. Computers,1986,C-35(lg) :1013~1024

同被引文献34

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部