Loading...
Please wait, while we are loading the content...
Similar Documents
Encryption and decryption algorithm using two dimensional cellular automata rules in cryptography.
| Content Provider | CiteSeerX |
|---|---|
| Author | Sambhu Prasad, P. Sahu, Madhusmita Rout, Umesh Prasad Surendra Kumar, N. |
| Abstract | Abstract—In this paper we present a new encryption and decryption algorithm for block cipher based on the linear (periodic boundary-PB) and nonlinear cellular automata rules. First we apply non linear CA rules (complements) to both plain text and key. Then PB CA rule is applied to the above results separately followed by the XOR operation of above results. After that the result of XOR operation is fed to substitution box(S-box) and again PB CA rules are applied followed by S-Box. The decryption process is carried out just similar to that of encryption but in the reverse way. Both the process of encryption and decryption is performed for 8 number of rounds in order to avoid the dependency between the plain text and cipher text so that the our proposed algorithm is more secure than that of AES and DES algorithms. Keywords-Cryptography, cellular automata, substitution byte, linear, non linear, Periodic boundary, correlation immunity I. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Dimensional Cellular Automaton Rule Plain Text Xor Operation Pb Ca Rule Cellular Automaton Correlation Immunity Block Cipher Non Linear New Encryption Decryption Algorithm Cipher Text Reverse Way Nonlinear Cellular Automaton Rule Decryption Process Non Linear Ca Rule Substitution Byte Periodic Boundary-pb Periodic Boundary |
| Content Type | Text |
| Resource Type | Article |