2016
DOI: 10.22456/2175-2745.62657
|View full text |Cite
|
Sign up to set email alerts
|

Autômatos celulares unidimensionais caóticos com borda fixa aplicados à modelagem de um sistema criptográfico para imagens digitais

Abstract: Resumo: O principal objetivo da criptografia de dados é possibilitar que duas entidades se comuniquem ao longo de um canal inseguro, de tal forma que nenhuma outra entidade consiga decifrar a mensagem que é enviada. Muitos métodos de criptografia clássica já foram investigados para minimizar este problema. Uma nova abordagem para este tema são os Autômatos Celulares (ACs), atualmente estudados por sua capacidade de processar grandes volumes de dados em paralelo. Nesse trabalho é investigado um novo modelo de a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…The first suggestion about the employment of cellular automata models in cryptography was made by Wolfram [Wolfram (1985)], after his studies on the statistical properties of CA chaotic rules with radius 1, which can be used as pseudo-random number generators [Wolfram (1986)]. Since then, various studies on this topic have been made [Tomassini and Perrenoud (2000); Sen et al (2002); Vasantha et al (2015); Oliveira and Macêdo (2019); Benkiniouar and Benmohamed (2004); Nandi et al (1994); Gutowitz (1995); Oliveira et al (2004Oliveira et al ( , 2008Oliveira et al ( , 2010b; Silva et al (2016); Wolfram (1985); Wuensche (2008); Oliveira et al (2010a); Wuensche and Lesser (1992); Seredynski et al (2004); Yang et al (2016)], where the cryptographic models can be classified into three kinds of approaches.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The first suggestion about the employment of cellular automata models in cryptography was made by Wolfram [Wolfram (1985)], after his studies on the statistical properties of CA chaotic rules with radius 1, which can be used as pseudo-random number generators [Wolfram (1986)]. Since then, various studies on this topic have been made [Tomassini and Perrenoud (2000); Sen et al (2002); Vasantha et al (2015); Oliveira and Macêdo (2019); Benkiniouar and Benmohamed (2004); Nandi et al (1994); Gutowitz (1995); Oliveira et al (2004Oliveira et al ( , 2008Oliveira et al ( , 2010b; Silva et al (2016); Wolfram (1985); Wuensche (2008); Oliveira et al (2010a); Wuensche and Lesser (1992); Seredynski et al (2004); Yang et al (2016)], where the cryptographic models can be classified into three kinds of approaches.…”
Section: Related Workmentioning
confidence: 99%
“…However, since there is no guarantee of pre-image existence for all possible rule transitions, the major challenge in these previous models was to evaluate the characteristics of the rules to assure the existence of at least one pre-image for any possible lattice. An attempt to solve this problem was to use the Z parameter [Silva et al (2016)] in the rule specification. The method proposed in [Wuensche (2008)] is very similar to the initial method proposed in [Oliveira et al (2008)], despite being developed independently.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations