Cryptography Automata Based Key Generation
Keywords:
Cryptography, Key Generation, Cellular Automata, Gap Test, Frequency TestAbstract
Cellular Automata is one of the most fascinating disciplines. It is being used in many practical applications but it’s used in cryptography is still not being explored. A technique of generating key for public key cryptography has been proposed in the work. The work also applies different tests to the data generated by the application developed to generate cryptography key. It is found that the key is generated follows the gap test and frequency test .Moreover, the coefficient of autocorrelation of the data generated is also apt. Therefore, the method can be safely used in public key cryptography. The strength of the key generated is being tested against AES.
References
Harsh Bhasin, Ramesh Kumar, Neha Kathuria, ‘Cryptography using Cellular Automata’, International Journal of Computer Science and Information technologies, Vol. 4 (2), 2013.
Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.
Harsh Bhasin, “Corpuscular Random Number Generator”, International Journal of Information and Electronics Engineering, Vol. 2 (2), 2012.
Harsh Bhasin, Nakul Arora, “ Cryptography Using Genetic Algorithm”, Reliability Infocom Technology and Optimization,2010
Barbara Kitchenham, O. Pearl Brereton, David Budgen, Mark Turner, John Bailey, Stephen Linkman, “Systematic literature reviews in software engineering – A systematic literature review”, Journal Information software technologies”, Vol. 51 (1), 2009.
Harsh Bhasin, “Use of Cellular Automata Patterns in Cryptography” in National Conference on Advances in Computational Intelligence, 2011.
Sonia Goyat, “Cryptography using Genetic Algorithm”, IOSR Journal of Computer Engineering, Vol. 1 (5), 2012.
Benjamin Jun, Paul Kocher, "The Intel Random Number Generator”, Cryptography Research, Inc. White Paper Prepared For Intel Corporation, 1999.
K. J. Jegadish Kumar, K. Chenna Kesava Reddy, S. Salivahanan, “Novel and Efficient Cellular Automata based Symmetric Key Encryption Algorithm for Wireless Sensor Networks”, International Journal of Computer Applications Vol. 13 (4), 2011.
Sonia Goyat, “Genetic Key Generation For Public Key Cryptography”, International Journal of Soft Computing and Engineering (IJSCE), Vol. 2 (3), 2012.
Uttam Kr. Mondal, Satyendra Nath Mandal, J. Pal Choudhury, J. K. Mandal , “Frame Based Symmetric Key Cryptography”, International Journal Advanced Networking and Applications 762 Vol. 2 (4), 2011.
Farhat Ullah Khan, Surbhi Bhatia, “A Novel Approach To Genetic Algorithm Based Cryptography”, International Journal of Research in Computer Science, Vol. 2 (3), 2012. Introduction
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.