首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata
Institution:1. Petroleum Engineering Department, Petroleum University of Technology, Ahwaz, Iran;2. Dynamical Systems & Control (DSC) Research Lab., Electrical Engineering Department, School of Engineering, Persian Gulf University, Boushehr, Iran;3. ISEP-Institute of Engineering, Polytechnic of Porto, Department of Electrical Engineering, Rua Dr. Antonio Bernardino de Almeida, 431, 4200-072 Porto, Portugal;1. School of Electrical Engineering, Chungbuk National University, 52 Naesudong-ro, Heungduk-gu, Cheongju 361-763, Republic of Korea;2. Nonlinear Dynamics Group, Department of Electrical Engineering, Yeungnam University, 280 Daehak-Ro, Kyongsan 712-749, Republic of Korea;3. School of Electronics Engineering, Daegu University, Gyungsan 712-714, Republic of Korea;4. Department of Biomedical Engineering, School of Medicine, Chungbuk National University, 52 Naesudong-ro, Heungduk-gu, Cheongju 361-763, Republic of Korea;1. Institute of Mathematics of the National Academy of Sciences of Ukraine, 3 Tereshchenkivska Str., Kyiv-4 01601, Ukraine;2. Department of Mathematics, University of Nicosia, P.O. Box 24005, 1700 Nicosia, Cyprus;3. Department of Mathematics and Statistics, University of Cyprus, Nicosia CY 1678, Cyprus;1. Department of Mathematics, Faculty of Mathematics Sciences, Shahid Beheshti University, Tehran, Iran;2. Faculty of Electrical and Computer Engineering, Shahid Rajaee Teacher Training University, Lavizan, Tehran, Iran
Abstract:A novel way to provide fast authenticated and randomized encryption is proposed using reversible cellular automata for the first time. A block-based cryptosystem is presented and shown to provide security against both active and passive attackers by the way of a strong authentication mechanism. The proposed system is much faster than existing authenticated encryption standards since only one pass per block is performed to ensure both encryption and integrity. Experimental results show robustness of the cryptosystem against several cryptanalysis techniques, when a formal proof of strict integrity preserving is included. Obtained results demonstrate superiority of the approach in both security and rapidity aspects.
Keywords:Authenticated encryption  Second-order cellular automatons  Data security
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号