Abstract
In this paper we show that the new Cellular Automata Cryptosystem (CAC) is insecure and can be broken by chosen-plaintexts attack with little computation. We also restore the omitted parts clearly by deriving the rotating number δ of plaintext bytes and the procedure of Major CA. The clock circle Δ of Major CA and the key SN are also attacked.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Schneier, B.: Applied Cryptography. Wiley, New York (1996)
Sarkar, P.: A brief history of cellular automata. ACM Computing Surveys 32(1), 80–107 (2000)
Guan, P.: Cellular automata public key cryptosystem. Complex System 1, 51–57 (1987)
kari, J.: Cryptosystems based on reversible cellular automata. Personal communication (1992)
Wolfram, S.: Cryptography with Cellular Automata. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)
Habutsu, T., Nishio, Y., Sasae, I., Mori, S.: A Secret Key Cryptosystem by Iterating a Chaotic Map. In: Proc. of Eurocrypt 1991, pp. 127–140. Springer, Heidelberg (1991)
Nandi, S., Kar, B.K., Chaudhuri, P.P.: Theory and Applications of Cellular Automata in Cryptography. IEEE Trans. on Computers 43, 1346–1357 (1994)
Gutowitz, H.: Cryptography with Dynamical Systems. In: Goles, E., Boccara, N. (eds.) Cellular Automata and Cooperative Phenomena. Kluwer Academic Press, Dordrecht (1993)
Tomassini, M., Perrenoud, M.: Stream Ciphers with One and Two-Dimensional Cellular Automata. In: Deb, K., Rudolph, G., Lutton, E., Merelo, J.J., Schoenauer, M., Schwefel, H.-P., Yao, X. (eds.) PPSN 2000. LNCS, vol. 1917, pp. 722–731. Springer, Heidelberg (2000)
Tomassini, M., Sipper, M.: On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata. IEEE Trans. on Computers 49(10), 1140–1151 (2000)
Gutowitz, H.: Cryptography with Dynamical Systems. manuscript
Sen, S., Shaw, C.R., Chowdhuri, N., Chaudhuri, P.: Cellular automata base cryptosystem (CAC). In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 303–314. Springer, Heidelberg (2002)
Feng, B.: Cryptanalysis of a new cellular automata cryptosystem. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 416–427. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, J., Cheng, X., Wang, X. (2005). Cryptanalysis of a Cellular Automata Cryptosystem. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_7
Download citation
DOI: https://doi.org/10.1007/11596981_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)