Secure and Computationally Efficient Cryptographic Primitive Based on Cellular Automaton

View/ Open
File version
Version of Record (VoR)
Author(s)
Vuckovac, Rade
Griffith University Author(s)
Year published
2019
Metadata
Show full item recordAbstract
The cellular automaton generator (CAG), a random number generator based on the one-dimensional cellular automaton (CA), is presented. Three procedures of secure implementation using the CAG are proposed and discussed. Implementations are very efficient in a wide range of hardware and software scenarios. That includes the advanced application of internet of things (IoT) and cyber-physical systems, which are both needed for computationally efficient cryptographic primitives. Furthermore, the proposed primitive is inherently resistant against the side-channel attack (SCA), where many currently available ciphers, such as the ...
View more >The cellular automaton generator (CAG), a random number generator based on the one-dimensional cellular automaton (CA), is presented. Three procedures of secure implementation using the CAG are proposed and discussed. Implementations are very efficient in a wide range of hardware and software scenarios. That includes the advanced application of internet of things (IoT) and cyber-physical systems, which are both needed for computationally efficient cryptographic primitives. Furthermore, the proposed primitive is inherently resistant against the side-channel attack (SCA), where many currently available ciphers, such as the advanced encryption standard (AES), require additional hardware or software effort to prevent the SCA line of attack.
View less >
View more >The cellular automaton generator (CAG), a random number generator based on the one-dimensional cellular automaton (CA), is presented. Three procedures of secure implementation using the CAG are proposed and discussed. Implementations are very efficient in a wide range of hardware and software scenarios. That includes the advanced application of internet of things (IoT) and cyber-physical systems, which are both needed for computationally efficient cryptographic primitives. Furthermore, the proposed primitive is inherently resistant against the side-channel attack (SCA), where many currently available ciphers, such as the advanced encryption standard (AES), require additional hardware or software effort to prevent the SCA line of attack.
View less >
Journal Title
Complex Systems
Volume
28
Issue
4
Copyright Statement
© The Author(s) 2019. This is an Open Access article distributed under the terms of the Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Subject
Artificial intelligence
Cognitive and computational psychology
Science & Technology
Physical Sciences
Mathematics, Interdisciplinary Applications
Mathematics
cellular automata