2012
DOI: 10.1142/s0129183112500787
|View full text |Cite
|
Sign up to set email alerts
|

Matrix Approach of an Encryption System Based on Cellular Automata and Its Numerical Implementation

Abstract: The main components of an encryption system based on rule 90 cellular automata, i.e., two indexed families of permutations and a pseudo-random bit generator are implemented in a very flexible way through a convenient matrix approach.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The word m is obtained iterating forward in time employing as inputs x and c, and corresponds to the indexed family Φ t . On the other hand, word t is generated iteratively backward in time using x and y, and correspond to the function t = h(x, y) [25], [27]. A simpler version to implement a BUC is the one-time algorithm, in which these words are calculated using the XOR sum of only the required elements.…”
Section: Esca System Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…The word m is obtained iterating forward in time employing as inputs x and c, and corresponds to the indexed family Φ t . On the other hand, word t is generated iteratively backward in time using x and y, and correspond to the function t = h(x, y) [25], [27]. A simpler version to implement a BUC is the one-time algorithm, in which these words are calculated using the XOR sum of only the required elements.…”
Section: Esca System Overviewmentioning
confidence: 99%
“…In addition, a substitution box (S-box) based on the cellular automata rule-90 [30], was added to confer greater security to the system. In [27], an ESCA system matrix approach was proposed to have a simple implementation when larger block sizes are required, and is the notation used in this work. The encryption procedure starts with the pre-processing stage, where the plain-text is transformed to an unintelligible form; afterwards, the S-box applies a non-linear transformation; finally, the data are encrypted with permutation Ψ, and the key is generated to be employed in the permutation.…”
Section: Esca System Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In the last few years many efficient algorithm have been presented by the researchers regarding secure image encryption schemes (Bao and Zhou 2015 ; Gao and Chen 2008 ; Murguia et al. 2012 ; Ramirez-Torres et al. 2014 ; Vargas-Olmos et al.…”
Section: Statistical Analyses Of S-boxmentioning
confidence: 99%