An improved key stream generator based on the programmable cellular automata

作者: Miodrag J. Mihaljević

DOI: 10.1007/BFB0028474

关键词: AlgorithmGenerator (computer programming)Stream cipherSecret sharingCryptanalysisComputer hardwareComputer sciencePublic-key cryptographyKey (cryptography)CryptographyCellular automatonSelf-shrinking generator

摘要: An improved programmable cellular automata (PCA) based key stream generator is proposed which originates from a recently scheme for generators on the PCA and read only memory. Cryptographic security examination of realized through following two steps. As first, an equivalent model given, it shown that resistant known attacks. Than, novel method cryptanalysis, developed, not vulnerable this approach assuming length sufficiently large.

参考文章(17)
Stephen Wolfram, Cryptography with Cellular Automata international cryptology conference. pp. 429- 432 ,(1985) , 10.1007/3-540-39799-X_32
Miodrag J. Mihaljević, A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function international cryptology conference. pp. 67- 79 ,(1994) , 10.1007/BFB0000425
Miodrag J. Mihaljević, Jovan Dj. Golić, A comparison of cryptanalytic principles based on iterative error-correction theory and application of cryptographic techniques. pp. 527- 531 ,(1991) , 10.1007/3-540-46416-6_48
Miodrag J. Mihaljević, Jovan Dj. Golić, Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift Register Sequence Advances in Cryptology — EUROCRYPT’ 92. pp. 124- 137 ,(1992) , 10.1007/3-540-47555-9_11
Jovan Dj. Golić, Miodrag J. Mihaljević, A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance Journal of Cryptology. ,vol. 3, pp. 201- 212 ,(1991) , 10.1007/BF00196912
Stephen Wolfram, Random sequence generation by cellular automata Advances in Applied Mathematics. ,vol. 7, pp. 123- 169 ,(1986) , 10.1016/0196-8858(86)90028-X
A.K. Das, A. Ganguly, A. Dasgupta, S. Bhawmik, P.P. Chaudhuri, Efficient characterisation of cellular automata IEE Proceedings E Computers and Digital Techniques. ,vol. 137, pp. 81- 87 ,(1990) , 10.1049/IP-E.1990.0008
W. Diffie, The first ten years of public-key cryptography Proceedings of the IEEE. ,vol. 76, pp. 560- 577 ,(1988) , 10.1109/5.4442
M. Serra, T. Slater, J.C. Muzio, D.M. Miller, The analysis of one-dimensional linear cellular automata and their aliasing properties IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. ,vol. 9, pp. 767- 778 ,(1990) , 10.1109/43.55213
S. Nandi, P. Pal Chaudhuri, Analysis of periodic and intermediate boundary 90/150 cellular automata IEEE Transactions on Computers. ,vol. 45, pp. 1- 12 ,(1996) , 10.1109/12.481481