Application of cellular automata in information security systems
DOI:
https://doi.org/10.17308/sait.2021.2/3506Keywords:
cellular automaton, sequential automata scrambler, cellular automaton with objective function, cellular automaton with a floating window, block cellular automaton, protection of confidential information, information security, data transformationAbstract
The article presents an overview of automatic scramblers based on cellular automata, which are used in information security systems. It considers works on the application of cellular automata in symmetric encryption systems and their practical implementation, as well as the construction of public-key encryption systems based on cellular automata, the use of cellular automata for generating pseudo-random numbers, and methods for the construction of cryptographic hash functions using cellular automata. The article also presents a generalized concept of an abstract automaton and elaborated models of cellular automata, and compares models of cellular automata with an objective function and cellular automata with a floating window, as well as describes their algorithms and evaluates their resistance. In our study, we also considered methods of using cellular automata in multithreaded data processing with the possibility of using patterns that determine the individual neighborhood of the elements during cellular encryption, and the possibility of using a reference book with a set of rules for bypassing the encryption matrix, as well as a method for the one-key transformation of binary data streams with an open parameter based on a cellular automaton with a floating window and a dynamic matrix, divided into elementary segments. The possibility of using cellular automata for multithreaded data processing in real time is considered. In conclusion, the article provides recommendations for enhancing the methods of information protection based on cellular automata, including the method of using an extended key that determines a pseudo-random neighborhood, taking into account the position of the processed bit in the initial data matrix.
References
Downloads
Published
Issue
Section
License
Условия передачи авторских прав in English













