Font Size: a A A

Cellular Automata Applied In Cryptography

Posted on:2006-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:X J LiFull Text:PDF
GTID:2178360155477459Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network service such as e-commerce and e-Government, the criteria of information security has being advanced. The research and exploit of cryptographic technique as the kernel technique must be based on country independently, which is critical assurance of national interests and individual right in information society. Cellular Automata (CA) is regular, simple and high parallel processing architecture which is suitable of VLSI implementation and its complicated dynamic properties, which is viewed as the most potential technique in the self-dependent techniques of the cryptography.I discuss the theory of cellular automata, and the ways how cellular automata applied in cryptography. I construct maximal-cycle length cellular automata." In succession, presenting a key stream generation method based on it; and presenting generating method of pseudo-random numbers sequence (PNS), through importing genetic algorithm, at last I analyze the security character of cellular automata in cryptography. The applications of CA in cryptography can not only simplify the design of cipher system, but also has the performance advantages. These make the CA as the potent candidate of the kernel techniques in the independent research of the cryptography.
Keywords/Search Tags:cellular automata(CA), pseudo-random numbers sequence(PNS), key stream, cycle length, randomicity
PDF Full Text Request
Related items