A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)

2018 ◽  
Vol 12 (4) ◽  
pp. 54-67
Author(s):  
Charifa Hanin ◽  
Fouzia Omary ◽  
Souad Elbernoussi ◽  
Khadija Achkoun ◽  
Bouchra Echandouri

The communication of private information is very dangerous, since unauthorized entities can intercept it. Thus, encryption is one of the principal information security solutions that helps keep information confidentiality. This latter can be satisfied by the use of various encryption techniques, namely block cipher. In this paper, the authors propose a novel block cipher using reversible and irreversible one-dimensional cellular automata (CA) with an ant colony optimization (ACO)-based S-box in order to establish more confusion. The obtained experimental results confirm that the designed cipher resists against statistical attacks, and it has both good confusion and diffusion comparing to the existent classical symmetric cryptosystems.

2021 ◽  
Author(s):  
Maryam Arvandi

Cryptography can be considered one of the most important aspects of communication security with existence of many threats and attacks to the systems. Unbreakableness is the main feature of a cryptographic cipher. In this thesis, feasibility of using neural networks, due to their computational capabilities is investigated for designing new cryptography methods. A newly proposed block cipher based on recurrent neural networks has also been analysed It is shown that: the new scheme is not a block cipher, and it should be referred to as a symmetric cipher; the simple architecture of the network is compatible with the requirement for confusion, and diffusion properties of a cryptosystem; the back propagation with variable step size without momentum, has the best result among other back propagation algorithms; the output of the network, the ciphertext, is not random, proved by using three statistical tests; the cipher is resistant to some fundamental cryptanalysis attacks, and finally a possible chosen-plaintext attack is presented.


Author(s):  
Yuliya Tanasyuk ◽  
Petro Burdeinyi

The given paper is devoted to the software development of block cipher based on reversible one-dimensional cellular automata and the study of its statistical properties. The software implementation of the proposed encryption algorithm is performed in C# programming language in Visual Studio 2017. The paper presents specially designed approach for key generation. To ensure desired cryptographic stability, the shared secret parameters can be adjusted to contain information needed for creating substitution tables, defining reversible rules, and hiding final data. For the first time, it is suggested to create substitution tables based on iterations of a cellular automaton that is initialized by the key data.


2007 ◽  
Vol 50 (10) ◽  
pp. 1578-1588 ◽  
Author(s):  
XiaoPing Liu ◽  
Xia Li ◽  
Anthony Gar-On Yeh ◽  
JinQiang He ◽  
Jia Tao

2014 ◽  
Vol 513-517 ◽  
pp. 3287-3291 ◽  
Author(s):  
Dan Qing Wang ◽  
Qing Ge Gong ◽  
Xiao Fei Shen

Nowadays, public safety has already attracted great attention, especially when natural disasters and other emergencies happen more and more frequently. So, personnel evacuation simulation research in the populated areas has become one of the core issues to reduce the social damage. To improve the simulation theory, this paper puts forward an improved cellular automata model using some idea of the classic Ant Colony Optimization Algorithm for reference when making rules for the evacuating personnel. And the improved model takes the interaction among the crowd and the influences exerted by the evacuating personnel upon the environment into account. The new model cares more specific details of both environment and the personnel, so it simulates the crowd psychology successfully and provides a more reliable theory that is to expand and improve the cellular automaton simulation model on personnel evacuation.


2012 ◽  
Vol 3 (1) ◽  
pp. 56-72 ◽  
Author(s):  
Suriyani Ariffin ◽  
Ramlan Mahmod ◽  
Azmi Jaafar ◽  
Muhammad Rezal Kamel Ariffin

In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. This paper identifies the correspondences and highlights the essential computation elements on the basis of randomness and non-linearity of immune systems. These systems can be applied in symmetric encryption algorithm that satisfies the properties in designing a new symmetric encryption block cipher. The proposed symmetric encryption block cipher called the 3D-AES uses components of the Advanced Encryption Standard (AES) symmetric encryption block cipher and the new core components based on immune systems approaches. To ensure adequate high security of the systems in the world of information technology, the laboratory experiment results are presented and analyzed. They show that the randomness and non-linearity of the output in the 3D-AES symmetric encryption block cipher are comparable to the AES symmetric encryption block cipher.


Sign in / Sign up

Export Citation Format

Share Document