Конференції Національного Авіаційного Університету, AVIATION IN THE XXI-st CENTURY 2018

Розмір шрифту: 
Cryptographic Application of Cellular Automata
Sergey Eduardovich Ostapov

Остання редакція: 2018-10-31

Ключові файли


Block cipher; Stream cipher; Cellular automata; hash function

Посилання


[1] Wolfram S., “Random sequence generation by cellular automata”, Advances in Applied Mathematics, Vol. 7, 1986, 123 – 164.

[2] Allaa Eddine Belfedhal, Kamel Mohamed Faraoun. “Building secure and fast cryptographic hash functions using programmable cellular automata”, J. of Computer and Information Technology, CIT, Vol. 4, 2015, 317–328.

[3] Jeon J.-Ch., „Analysis of hash functions and cellular automata based schemes”, International Journal of Security and Applications, Vol. 7, 2013, 303–316.

[4] Bertoni G., Daemen J., Peeters M., Van Assche G., “Keccak sponge function family main document”, http://keccak.noekeon.org/Keccak-main-2.1.pdf.

[5] Tanasyuk Yu., Ostapov S., “Development and research of cryptographic hash functions based on two-dimensional cellular automata”, IAPGOS, 1, 2018, 24 – 27.

[6] Tanasyuk Yu., Perepelitsyn A., Ostapov S., “Parametrized FPGA-based implementation of cryptographic hash functions using cellular automata”, The 9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2018, 24-27 May, 2018, Kyiv, Ukraine, 238 – 241.

[7] Seredynski F., Bouvry P., Zomaya A.V., “Cellular automata computations and secret key cryptography”, Parallel Computing, 30, 2004, 753-766.

[8] Debasis Das, Abhishek Ray, “A parallel encryption algorithm for block ciphers based on reversible programmable cellular automata”, J. Computer Science and Engineering, Vol. 1, No. 1, 2010, 82 – 89.