An observation of cryptographic properties of 256 one-dimensional cellular automata rules

Norziana Jamil, Ramlan Mahmood, Muhammad Reza Zába, Zuriati Ahmad Zukamaen, Nur Izura Udzir

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The robustness of a cryptographic system substantially depends on its underlying elements. Boolean functions are the most frequently used elements in various cryptographic systems, be it block ciphers, stream ciphers and hash functions. However, constructing Boolean functions satisfying all fundamental cryptographic properties are not trivial. We study the cryptographic properties of Boolean functions of biological system namely one-dimensional Cellular Automata (CA) and show that some of its Boolean functions satisfy all mentioned properties on levels very close to optimal and therefore can be recommended as cryptographically strong Boolean function.

Original languageEnglish
Title of host publicationInformatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding
Pages409-420
Number of pages12
EditionPART 1
DOIs
Publication statusPublished - 12 Dec 2011
EventInternational Conference on Informatics Engineering and Information Science, ICIEIS 2011 - Kuala Lumpur, Malaysia
Duration: 14 Nov 201116 Nov 2011

Publication series

NameCommunications in Computer and Information Science
NumberPART 1
Volume251 CCIS
ISSN (Print)1865-0929

Other

OtherInternational Conference on Informatics Engineering and Information Science, ICIEIS 2011
CountryMalaysia
CityKuala Lumpur
Period14/11/1116/11/11

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Cite this

Jamil, N., Mahmood, R., Zába, M. R., Zukamaen, Z. A., & Udzir, N. I. (2011). An observation of cryptographic properties of 256 one-dimensional cellular automata rules. In Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding (PART 1 ed., pp. 409-420). (Communications in Computer and Information Science; Vol. 251 CCIS, No. PART 1). https://doi.org/10.1007/978-3-642-25327-0_35