Searched over 200M research papers
10 papers analyzed
These studies suggest that cellular automata can be effectively used to create robust, high-performance cryptographic systems with high-quality pseudorandom bit sequences, low hardware resource requirements, and strong resistance to cryptanalytic attacks.
20 papers analyzed
Cryptography and automata theory intersect in the use of cellular automata (CA) to develop cryptographic algorithms. Cellular automata, with their inherent parallelism and complexity, offer promising methods for creating secure and efficient cryptographic systems. This synthesis explores the application of cellular automata in cryptography, focusing on their effectiveness, security, and implementation.
One- and Two-Dimensional Cellular Automata for Cryptography:
Symmetric Key Cryptography:
Reversible Cellular Automata:
Hardware Implementation:
Evolutionary Techniques for Rule Discovery:
Cellular automata provide a versatile and powerful framework for developing cryptographic algorithms. Their ability to generate high-quality pseudorandom sequences, combined with their suitability for hardware implementation, makes them an attractive choice for both symmetric and asymmetric cryptographic systems. The use of one- and two-dimensional cellular automata, along with evolutionary techniques for rule discovery, enhances the security and performance of these cryptographic methods.
Most relevant research papers on this topic
5 Citations