1997
DOI: 10.1109/12.589245
|View full text |Cite
|
Sign up to set email alerts
|

Comments on "Theory and applications of cellular automata in cryptography" [with reply]

Abstract: The cipher systems based on Cellular Automata proposed by Nandi et al. 3] are a ne and are insecure.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
27
0
1

Year Published

2003
2003
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(28 citation statements)
references
References 2 publications
0
27
0
1
Order By: Relevance
“…However, the simple use of LFSR & NLFSR as underlying mechanisms for the implementation of low-cost one-way hash functions -without further measures that add cost of extra hardware -lead to insecure implementations. For example, the use of the Cellular Automata (CA) model [71] for the implementation of one-way functions -typically built upon LFSR & NLFSR -has been proved to lead to insecure implementations [5,12].…”
Section: Hardware Challenges and Limitationsmentioning
confidence: 99%
“…However, the simple use of LFSR & NLFSR as underlying mechanisms for the implementation of low-cost one-way hash functions -without further measures that add cost of extra hardware -lead to insecure implementations. For example, the use of the Cellular Automata (CA) model [71] for the implementation of one-way functions -typically built upon LFSR & NLFSR -has been proved to lead to insecure implementations [5,12].…”
Section: Hardware Challenges and Limitationsmentioning
confidence: 99%
“…They proposed a stream and block cipher, but focused on only non-uniform cellular automata with null boundaries. However, Blackburn et al [55] had been broken by this block cipher scheme. After that, many researchers presented [19,41] different type of techniques and methods based on cellular automata.…”
Section: F Random Number Generators With 2-dimensional Cellular Automentioning
confidence: 99%
“…Нанди предложил неоднородный автомат с применением правил 51, 153 и 195 с нулевыми граничными условиями для применения в криптографии [4], но такие криптосистемы были взломаны С. Блэкберном [5].…”
unclassified