Abstract
An improved programmable cellular automata (PCA) based key stream generator is proposed which originates from a recently proposed scheme for key stream generators based on the PCA and a read only memory. Cryptographic security examination of the proposed key stream generator is realized through the following two steps. As the first, an equivalent model of the generator is given, and it is shown that the generator is resistant on the known attacks. Than, a novel method for the cryptanalysis, is developed, and it is shown that the generator is not vulnerable on this approach assuming that PCA length is sufficiently large.
This research was supported by the Science Fund, Grant. No. 04M02.
Preview
Unable to display preview. Download preview PDF.
References
P.P. Chaudhuri, D.P. Chaudhuri, S. Nandi, and S. Chattopadhyay, Additive Cellular Automata, Theory and Applications vol. 1. New-York: IEEE Press,1997.
S. Wolfram, “Random sequence generation by cellular automata”, Advances in Applied Mathematics 7, pp. 123–169, 1986.
S. Wolfram, “Cryptography with cellular automata”, Lecture Notes in Computer Science, vol. 218, pp. 429–432, 1986.
W. Diffie, “The first ten years of public-key cryptography”, Proc. IEEE, pp. 560–577, 1988.
S. Nandi, B.K. Kar, and P. Pal Chaudhuri, “Theory and applications of cellular automata in cryptography”, IEEE Trans. Computers, vol. 43, no. 12, pp. 1346–1357, Dec. 1994.
W. Meier and O. Staffelbach, “Analysis of pseudo random sequences generated by cellular automata”, Advances in Cryptology — EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 186–199, 1992.
M. Mihaljević, “Security examination of certain cellular automata based key stream generator”, ISITA '96 — 1996 IEEE International Symposium on Information Theory and Its Applications, Canada, Victoria, B.C., September 1996, Proceedings, pp. 246–249.
M. Mihaljević, “Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach”, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-12, Lecture Notes in Computer Science, vol. 1255, pp. 250–262, 1997.
A.K. Das, A. Gonguly, A. Dasgupta, S. Bhawmik, and P. Pal Chaudhuri, “Efficient characterization of cellular automata”, IEE Proc., Pt. E, vol. 137, no. 1, pp. 81–87, Jan. 1990.
A.K. Das and P. Pal Chaudhuri, “Vector space theoretic analysis of additive cellular automata and its applications for pseudo-exhaustive test pattern generation”, IEEE Trans. Computers, vol. 42, no. 3, pp. 340–352, Mar. 1993.
P.D. Hortensius, R.D. McLeod, and H.C. Card, “Parallel pseudorandom number generation for VLSI systems using cellular automata”, IEEE Trans. Computers, vol. 38, no. 10, pp. 1466–1473, Oct. 1989.
S. Nandi and P. Pal Chaudhuri, “Analysis of periodic and intermediate boundary 90/150 cellular automata”, IEEE Trans. Computers, vol. 45, no. 1, pp. 1–11, Jan. 1996.
M. Serra, T. Slater, J.C. Muzio, and D.M. Miller, “The analysis of one-dimensional linear cellular automata and their aliasing properties”, IEEE Trans. ComputerAided Design, vol. 9, no. 7, pp. 767–778, July 1990.
T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only”, IEEE Trans. Computers, vol. C-34, no. 1, pp. 81–85, Jan. 1985.
M. Mihaljević, “A correlation attack on the binary sequence generators with timevarying output function”, Advances in Cryptology — ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, pp. 67–79, 1995.
J. Golić and M. Mihaljević, “A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance”, Journal of Cryptology, vol. 3, pp. 201–212, 1991.
M. Mihaljević and J. Golić, “A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence”, Advances in Cryptology — AUSCRYPT '90, Lecture Notes in Computer Science, vol. 453, pp. 165–175, 1990.
M. Mihaljević and J. Golić, “A comparison of cryptanalytic principles based on iterative error-correction”, Advances in Cryptology — EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 527–531, 1992.
M. Mihaljević and J. Golić, “Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence”, Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 124–137, 1993.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Mihaljević, M.J. (1997). An improved key stream generator based on the programmable cellular automata. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028474
Download citation
DOI: https://doi.org/10.1007/BFb0028474
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive