32
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A new symmetrical cryptosystem based cellular automata and chaotic map function

, &
Pages 1435-1455 | Received 01 May 2021, Published online: 24 May 2022

References

  • Shakiba, A. (2019). Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks. Journal of Information and Optimization Sciences, 40(3), 725-750.
  • Wang, X., & Xu, D. (2014). A novel image encryption scheme using chaos and Langton’s Ant cellular automaton. Nonlinear Dynamics,79(4), 2449-2456.
  • Wolfram, S. (1986). Cryptography with Cellular Automata. Lecture Notes in Computer Science Advances in Cryptology — CRYPTO Proceedings, 429-432.
  • Wolfram, S. (1986). Random sequence generation by cellular automata. Advances in Applied Mathematics, 7(2), 123-169.
  • Achkoun, K., Hanin, C., & Omary, F. (2020). SPF-CA: A new cellular automata based block cipher using key-dependent S-boxes. Journal of Discrete Mathematical Sciences and Cryptography, 23(8), 1529-1544.
  • Bakhshandeh, A., & Eslami, Z. (2013). An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics and Lasers in Engineering, 51(6), 665-673.
  • Wang, X., & Luan, D. (2013). A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(11), 3075-3085.
  • Ray, A., & Das, D. (2010). Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata. Communications in Computer and Information Science Information Processing and Management, 269-275.
  • Anghelescu, P., Ionita, S., & Sofron, E. (2008). FPGA Implementation of Hybrid Additive Programmable Cellular Automata Encryption Algorithm. Eighth International Conference on Hybrid Intelligent Systems.
  • Hanis, S., & Amutha, R. (2015).A Novel Image Encryption Scheme Using Chaos and Hybrid Cellular Automata. International Journal of Innovation and Scientific Research , 25(1), 299-307.
  • Srichavengsup, W., & San-Um, W. (2016).Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security. International Journal of Network Security, 18, 1130-1142.
  • Niyat, A. Y., Moattar, M. H., & Torshiz, M. N. (2017). Color image encryption based on hybrid hyper-chaotic system and cellular automata. Optics and Lasers in Engineering, 90, 225-237.
  • Sen, S., Shaw, C., Chowdhuri, D. R., Ganguly, N., & Chaudhuri, P. P. (2002). Cellular Automata Based Cryptosystem (CAC). Information and Communications Security Lecture Notes in Computer Science, 303-314.
  • Abdo, A., Lian, S., Ismail, I., Amin, M., & Diab, H. (2013). A cryptosystem based on elementary cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(1), 136-147.
  • Jose, J., & Chowdhury, D. R. (2017). Investigating four neighbourhood cellular automata as better cryptographic primitives. Journal of Discrete Mathematical Sciences and Cryptography, 20(8), 1675-1695.
  • Das, S., & Roychowdhury, D. (2011). On usage of cellular automata in strengthening stream ciphers. Journal of Discrete Mathematical Sciences and Cryptography, 14(4), 369-390.
  • Mehta, R. K., & Rani, R. (2016). Pattern generation and symmetric key block ciphering using cellular automata. International Conference on Advances in Computing, Communications and Informatics (ICACCI).
  • White, R., & Engelen, G. (1993). Cellular automata and fractal urban form: a cellular modeling approach to the evolution of urban land-use patterns. Environment and Planning A, 25, 1175-1199.
  • Wolfram, S. (2002). A new kind of science. Champaign, IL: Wolfram Media.
  • May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459-467.
  • Survey of 3D Chaotic Map Techniques for Image Encryption. (2015). International Journal of Science and Research (IJSR), 4(12), 1000-1004.
  • Liu, H., Zhu, Z., Jiang, H., & Wang, B. (2008). A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map. The 9th International Conference for Young Computer Scientists.
  • Hossain, M., Rahman, M., Rahman, A. B., & Islam, S. (2014). A new approach of image encryption using 3D chaotic map to enhance security of multimedia component. International Conference on Informatics, Electronics & Vision
  • Toffoli, T., & Margolus, N. H. (1990). Invertible cellular automata: A review. Physica D: Nonlinear Phenomena, 45(1-3), 229-253.
  • Philip, M.(2011). An Enhanced Chaotic Image Encryption. International Journal of Computer Science, Engineering and Information Technology, 1(5), 77-83.
  • Shannon, C. E., & Weaver, W. (1949). The mathematical theory of communication. Urbana: University of Illinois Press.
  • Ramasamy, P., Ranganathan, V., Kadry, S., Damaševičius, R., & Blažauskas, T. (2019). An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map. Entropy,21(7), 656.
  • Yogeshwaran, S., Vignesvar, K. S., PrabhuSoundharian, E. M., & Ms Hanis, S. (2015) A Novel Image Encryption Scheme Using Chaotic Logistic Mapping& Hybrid Cellular Automata, International Journal of Electrical, Electronics and Data Communication (IJEEDC), 3(6), 81-86.
  • Ping, P., Xu, F., & Wang, Z. (2014). Image encryption based on non-affine and balanced cellular automata. Signal Processing,105, 419-429.
  • Chen, R., & Lai, J. (2007). Image security system using recursive cellular automata substitution. Pattern Recognition,40(5), 1621-1631.
  • Wang, X., & Jin, C. (2012). Image encryption using Game of Life permutation and PWLCM chaotic system. Optics Communications,285(4), 412-417.
  • Ye, G., Pan, C., Huang, X., & Mei, Q. (2018). An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics, 94(1), 745– 756.
  • Ping, P., Wu, J., Mao, Y., Xu, F., & Fan, J. (2018). Design of image cipher using life-like cellular automata and chaotic map. Signal Processing,150, 233-247.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.