Compound of reversible one-dimensional CA rules for two-dimensional CA with cryptographic applications

Hoda Maleki, Babak Sadeghiyan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Reversible Cellular Automata is applicable in cryptographic functions. A reversible CA can be obtained by employing reversible rules. In this paper, we propose 65280 two-dimensional reversible CA rules by compounding one-dimensional reversible rules. We produce these rules by alternately applying one-dimensional CA rule f1 to the rows and applying another rule f2 to the columns of the configuration matrix of two-dimensional CA. In addition to describing these rules, we consider the required cryptographic properties such as completeness, strict avalanche criteria, non-linearity, and differential-profile flatness for our proposed approach. According to the obtained results, 9463 rules are specified as appropriate rules for the purpose of applying in cryptographic functions. Only 510 rules do not satisfy any of the mentioned cryptographic properties and the other remain rules satisfy some of the properties.

Original languageEnglish (US)
Title of host publication2009 14th International CSI Computer Conference, CSICC 2009
Pages287-292
Number of pages6
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 14th International CSI Computer Conference, CSICC 2009 - Tehran, Iran, Islamic Republic of
Duration: Oct 20 2009Oct 21 2009

Publication series

Name2009 14th International CSI Computer Conference, CSICC 2009

Conference

Conference2009 14th International CSI Computer Conference, CSICC 2009
Country/TerritoryIran, Islamic Republic of
CityTehran
Period10/20/0910/21/09

Keywords

  • Cryptographic property
  • Reversible cellular automata rule
  • Two-dimensional cellular automata

ASJC Scopus subject areas

  • General Computer Science
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Compound of reversible one-dimensional CA rules for two-dimensional CA with cryptographic applications'. Together they form a unique fingerprint.

Cite this