An observation of cryptographic properties of 256 one-dimensional cellular automata rules

Norziana Jamil, Ramlan Mahmood, Muhammad Reza Zába, Zuriati Ahmad Zukamaen, Nur Izura Udzir

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The robustness of a cryptographic system substantially depends on its underlying elements. Boolean functions are the most frequently used elements in various cryptographic systems, be it block ciphers, stream ciphers and hash functions. However, constructing Boolean functions satisfying all fundamental cryptographic properties are not trivial. We study the cryptographic properties of Boolean functions of biological system namely one-dimensional Cellular Automata (CA) and show that some of its Boolean functions satisfy all mentioned properties on levels very close to optimal and therefore can be recommended as cryptographically strong Boolean function.

Original languageEnglish
Title of host publicationInformatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding
Pages409-420
Number of pages12
EditionPART 1
DOIs
Publication statusPublished - 2011
Externally publishedYes
EventInternational Conference on Informatics Engineering and Information Science, ICIEIS 2011 - Kuala Lumpur, Malaysia
Duration: Nov 14 2011Nov 16 2011

Publication series

NameCommunications in Computer and Information Science
NumberPART 1
Volume251 CCIS
ISSN (Print)1865-0929

Conference

ConferenceInternational Conference on Informatics Engineering and Information Science, ICIEIS 2011
Country/TerritoryMalaysia
CityKuala Lumpur
Period11/14/1111/16/11

Keywords

  • balanced functions
  • Boolean functions
  • correlation immunity
  • cryptographic properties
  • high algebraic degree
  • non-linearity
  • propagation criteria

ASJC Scopus subject areas

  • General Computer Science
  • General Mathematics

Fingerprint

Dive into the research topics of 'An observation of cryptographic properties of 256 one-dimensional cellular automata rules'. Together they form a unique fingerprint.

Cite this