4.6 Article

Cryptographic Services Based on Elementary and Chaotic Cellular Automata

期刊

ELECTRONICS
卷 11, 期 4, 页码 -

出版社

MDPI
DOI: 10.3390/electronics11040613

关键词

zero knowledge protocol; cellular automata; cryptography; symmetric cipher; stream cipher

资金

  1. CONACyT

向作者/读者索取更多资源

This paper proposes a security framework based on cellular automata, consisting of entity authentication, data encryption, and decryption. Authentication is achieved using a zero-knowledge protocol, where the shared secret is transformed into a more complex key by a two-dimensional cellular automaton. The sensitivity of cellular automata to initial conditions adds another layer of security to the system.
In this paper, a security framework based on cellular automata is proposed, which is composed of three parts: entity authentication, data encryption, and decryption. Authentication is based on a zero-knowledge protocol, and its robustness is supported by the fact that the shared secret is not only an NP-complete problem but also dynamically transformed by a two-dimensional cellular automaton into a more complex secret. Thus, the authentication's output is the key to data encryption/decryption in the following steps. One more strength of this system is the sensibility of the cellular automata to initial conditions-which is why we must know the initial configuration in order to obtain the key and the times that cellular automata evolved. All those characteristics give the system both robustness and security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据