Application of cellular automata in information security systems

Authors

DOI:

https://doi.org/10.17308/sait.2021.2/3506

Keywords:

cellular automaton, sequential automata scrambler, cellular automaton with objective function, cellular automaton with a floating window, block cellular automaton, protection of confidential information, information security, data transformation

Abstract

The article presents an overview of automatic scramblers based on cellular automata, which are used in information security systems. It considers works on the application of cellular automata in symmetric encryption systems and their practical implementation, as well as the construction of public-key encryption systems based on cellular automata, the use of cellular automata for generating pseudo-random numbers, and methods for the construction of cryptographic hash functions using cellular automata. The article also presents a generalized concept of an abstract automaton and elaborated models of cellular automata, and compares models of cellular automata with an objective function and cellular automata with a floating window, as well as describes their algorithms and evaluates their resistance. In our study, we also considered methods of using cellular automata in multithreaded data processing with the possibility of using patterns that determine the individual neighborhood of the elements during cellular encryption, and the possibility of using a reference book with a set of rules for bypassing the encryption matrix, as well as a method for the one-key transformation of binary data streams with an open parameter based on a cellular automaton with a floating window and a dynamic matrix, divided into elementary segments. The possibility of using cellular automata for multithreaded data processing in real time is considered. In conclusion, the article provides recommendations for enhancing the methods of information protection based on cellular automata, including the method of using an extended key that determines a pseudo-random neighborhood, taking into account the position of the processed bit in the initial data matrix.

Author Biography

  • Elena A. Kuleshova, South-West State University

    postgraduate student, Department of Information Security, Southwest State University, Kursk

References

Downloads

Published

2021-08-16

Issue

Section

Information Security

How to Cite

Application of cellular automata in information security systems. (2021). Proceedings of Voronezh State University. Series: Systems Analysis and Information Technologies, 2, 81-93. https://doi.org/10.17308/sait.2021.2/3506

Most read articles by the same author(s)