首页 | 本学科首页   官方微博 | 高级检索  
     


A genetic strategy to design cellular automata based block ciphers
Affiliation:1. Product Lifecycle Management Research Lab, Department of Industrial and Manufacturing Systems Engineering, Faculty of Engineering, University of Windsor, Windsor, Canada;2. Department of Industrial Engineering, Faculty of Engineering, University of Kharazmi, Karaj, Iran;1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China;2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;3. Department of Computing, The Hong Kong Polytechnic University, Hong Kong;1. Indian Institute of Technology Banaras Hindu University, Varanasi 221005, Uttar Pradesh, India;2. Malaviya National Institute of Technology, Jaipur 302017, Rajasthan, India;1. Electrical and Computer Engineering Department, University of Miami, Coral Gables, FL 33146, United States;2. Evelyn F. McKnight Brain Institute, University of Miami, Miller School of Medicine, Miami, FL 33136, United States
Abstract:We propose an evolutionary computation approach to design a fast and secure block cipher using non-uniform second-order cellular automata. We build a flexible block ciphering model that permit the construction of a huge space of possible instances defined each one by a finite set of elementary transition rules. The constructed space is explored using a genetic algorithms strategy in order to find an optimal solution with respect to the strict avalanche criterion used as fitness measurements. The genetically designed cipher is benchmarked experimentally using conventional statistical tests, and shown to have very admissible characteristics leading to a very acceptable level of cryptographic security. Moreover, performances analysis shows that the designed cipher permit to achieve a high encryption/decryption speed, and compete many of the existing standardized ciphers.
Keywords:Cellular automata  Evolutionary computation  Block ciphers  Strict avalanche criterion
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号