2016
DOI: 10.31436/ijpcc.v2i1.31
|View full text |Cite
|
Sign up to set email alerts
|

A New Block Cipher Based on Finite Automata Systems

Abstract: The performance and security have central importance of cryptography field. Therefore, theneed to use block ciphers are become very important. This paper presents a new block cipher based on finiteautomata system. The proposed cryptosystem is executed based on parallel computations to reduce thedelay time. Moreover, to achieve high security, we use different machines (variant non-deterministicautomata accepters) as keys for encryption and decryption.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
(8 reference statements)
0
4
0
Order By: Relevance
“…The adversary can perform dictionary attack by guessing or trying all possible keys to decrypt C text . Since P text is encrypted by FSA based encryption A that provides better security ( 11,21,22,23,24,25 ) due to its invertibility concept. The adversaries need to identify decryption key A −1 to decrypt the ciphertext.…”
Section: Brute-force and Dictionary Attackmentioning
confidence: 99%
“…The adversary can perform dictionary attack by guessing or trying all possible keys to decrypt C text . Since P text is encrypted by FSA based encryption A that provides better security ( 11,21,22,23,24,25 ) due to its invertibility concept. The adversaries need to identify decryption key A −1 to decrypt the ciphertext.…”
Section: Brute-force and Dictionary Attackmentioning
confidence: 99%
“…New variants of stream and block ciphers based on sequential and parallel finite automata systems, which are closely related to permutation matrix-based cryptosystems, have been thoroughly studied in [11][12][13][14][15][16][17]. Not surprisingly, these systems use transition matrices of finite automata as secrete keys in encryption and decryption algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Further improvements and extensions of Dӧmӧsi's cryptosystem can be found in [8][9][10][11][12][13][14]. To overcome the backtracking drawback, and improve the performance of Dӧmӧsi's cryptosystem, G. Khaleel et.…”
Section: Modified Dömösi's Cryptosystemmentioning
confidence: 99%