ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Encryption and Decryption algorithm using two dimensional cellular automata rules in Cryptography

Journal: International Journal of Communication Network and Security (Vol.1, No. 1)

Publication Date:

Authors : ; ; ; ;

Page : 18-23

Keywords : Cryptography; correlation immunity; Periodic boundary; non linear; Periodic boundary; correlation immunity;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper we present a new encryption and decryption algorithm for block cipher based on the linear(periodic boundary-PB) and nonlinear cellular automata rules.First we apply non linear CA rules (complements) to both plain text and key. Then PB CA rule is applied to the above results separately followed by the XOR operation of above results.After that the result of XOR operation is fed to substitution box(S-box) and again PB CA rules are applied followed by SBox. The decryption process is carried out just similar to that of encryption but in the reverse way. Both the process of encryption and decryption is performed for 8 number of rounds in order to avoid the dependency between the plain text and cipher text so that the our proposed algorithm is more securethan that of AES and DES algorithms.

Last modified: 2013-09-21 16:30:39