{"title":"元胞自动机在高效对称密钥密码系统中的应用","authors":"Madhusmita Das, Kabita Das, M. Sahu, Rasmita Dash","doi":"10.1109/ICAML48257.2019.00012","DOIUrl":null,"url":null,"abstract":"Cryptography plays an important role in computer security. Encryption, decryption and key generation are the main algorithms of any cryptosystem. Encryption and decryption algorithm include methods based on substitution, mono-alphabetic or poly-alphabetic, Vigenere cipher, DES, AES etc. The duration of time taken, for the encryption and decryption, without the key being broken, define the strength of the cryptosystem. To strengthen these aspect cellular automata plays an important role in cryptography. In this paper, an enhanced symmetric key encryption and decryption algorithm accompanied with cellular automata will be discussed A class of cellular automata (CA) such as CA rule 32 and CA rule 2 accompanied with XOR operation used for more promising security to cryptography.","PeriodicalId":369667,"journal":{"name":"2019 International Conference on Applied Machine Learning (ICAML)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Application of Cellular Automata for an Efficient Symmetric Key Cryptosystem\",\"authors\":\"Madhusmita Das, Kabita Das, M. Sahu, Rasmita Dash\",\"doi\":\"10.1109/ICAML48257.2019.00012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography plays an important role in computer security. Encryption, decryption and key generation are the main algorithms of any cryptosystem. Encryption and decryption algorithm include methods based on substitution, mono-alphabetic or poly-alphabetic, Vigenere cipher, DES, AES etc. The duration of time taken, for the encryption and decryption, without the key being broken, define the strength of the cryptosystem. To strengthen these aspect cellular automata plays an important role in cryptography. In this paper, an enhanced symmetric key encryption and decryption algorithm accompanied with cellular automata will be discussed A class of cellular automata (CA) such as CA rule 32 and CA rule 2 accompanied with XOR operation used for more promising security to cryptography.\",\"PeriodicalId\":369667,\"journal\":{\"name\":\"2019 International Conference on Applied Machine Learning (ICAML)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Applied Machine Learning (ICAML)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAML48257.2019.00012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Applied Machine Learning (ICAML)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAML48257.2019.00012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of Cellular Automata for an Efficient Symmetric Key Cryptosystem
Cryptography plays an important role in computer security. Encryption, decryption and key generation are the main algorithms of any cryptosystem. Encryption and decryption algorithm include methods based on substitution, mono-alphabetic or poly-alphabetic, Vigenere cipher, DES, AES etc. The duration of time taken, for the encryption and decryption, without the key being broken, define the strength of the cryptosystem. To strengthen these aspect cellular automata plays an important role in cryptography. In this paper, an enhanced symmetric key encryption and decryption algorithm accompanied with cellular automata will be discussed A class of cellular automata (CA) such as CA rule 32 and CA rule 2 accompanied with XOR operation used for more promising security to cryptography.