4.6 Article

Cryptographic Services Based on Elementary and Chaotic Cellular Automata

Journal

ELECTRONICS
Volume 11, Issue 4, Pages -

Publisher

MDPI
DOI: 10.3390/electronics11040613

Keywords

zero knowledge protocol; cellular automata; cryptography; symmetric cipher; stream cipher

Funding

  1. CONACyT

Ask authors/readers for more resources

This paper proposes a security framework based on cellular automata, consisting of entity authentication, data encryption, and decryption. Authentication is achieved using a zero-knowledge protocol, where the shared secret is transformed into a more complex key by a two-dimensional cellular automaton. The sensitivity of cellular automata to initial conditions adds another layer of security to the system.
In this paper, a security framework based on cellular automata is proposed, which is composed of three parts: entity authentication, data encryption, and decryption. Authentication is based on a zero-knowledge protocol, and its robustness is supported by the fact that the shared secret is not only an NP-complete problem but also dynamically transformed by a two-dimensional cellular automaton into a more complex secret. Thus, the authentication's output is the key to data encryption/decryption in the following steps. One more strength of this system is the sensibility of the cellular automata to initial conditions-which is why we must know the initial configuration in order to obtain the key and the times that cellular automata evolved. All those characteristics give the system both robustness and security.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available