Computational & Technology Resources
an online resource for computational,
engineering & technology publications |
|
Civil-Comp Proceedings
ISSN 1759-3433 CCP: 84
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON ENGINEERING COMPUTATIONAL TECHNOLOGY Edited by: B.H.V. Topping, G. Montero and R. Montenegro
Paper 36
Symmetric Block Ciphers Based on Cellular Automata A. Hernández Encinas1, L. Hernández Encinas2, A. Martín del Rey1 and G. Rodríguez Sánchez1
1Department of Applied Mathematics, Universidad de Salamanca, Spain
, "Symmetric Block Ciphers Based on Cellular Automata", in B.H.V. Topping, G. Montero, R. Montenegro, (Editors), "Proceedings of the Fifth International Conference on Engineering Computational Technology", Civil-Comp Press, Stirlingshire, UK, Paper 36, 2006. doi:10.4203/ccp.84.36
Keywords: cellular automata, cryptography, image encryption, image processing, secret key cryptosystem.
Summary
In this work we present a new graphic symmetrical cryptosystem in
order to encrypt and decrypt colored images. This cryptosystem is
based on a reversible memory cellular automata of dimension and
uses a cryptographically secure pseudorandom bit generator (CSPRBG)
in the encryption phase.
Let I be a colored image defined by pixels and a palette of c colors. Then, the image I can be represented as a linear array of n elements, M, with coefficients in , where , and , for black & white, grey-level and colored images, respectively. The proposed cryptosystem consists of three phases. In the first phase, the setup phase, the two users agree the key to be shared and the cellular automaton (CA) to be used is defined. In the second phase, the encryption phase, the sender chooses a truly random generator or a CSPRBG and encrypts the secret image to be sent to the receiver. Finally, in the third phase, the decryption phase, the receiver uses the inverse CA to the one considered in the setup phase and decrypts the received image. Specifically, the protocol is as follows: Before encrypting an image, the sender and the receiver, Alice and Bob, respectively, agree to use a 128-bit secret key for the cryptosystem: The one-dimensional reversible memory cellular automaton proposed to be used in the cryptosystem for encrypting is , and its inverse CA, , is used for decrypting, where:
Note that the transition function of , f, permits to define its CA inverse by defining the transition function of by the expression For encrypting a black & white, grey-level or colored image, I, Alice considers its representation as a linear array, M, of coefficients in . Moreover, she chooses either a truly random or a CSPRBG and develops the following protocol:
purchase the full-text of this paper (price £20)
go to the previous paper |
|