Cryptography Automata Based Key Generation

Authors

  • Harsh Bhasin Delhi Technological University, India
  • Neha Kathuria MDU, India

Keywords:

Cryptography, Key Generation, Cellular Automata, Gap Test, Frequency Test

Abstract

Cellular Automata is one of the most fascinating disciplines. It is being used in many practical applications but it’s used in cryptography is still not being explored. A technique of generating key for public key cryptography has been proposed in the work. The work also applies different tests to the data generated by the application developed to generate cryptography key. It is found that the key is generated follows the gap test and frequency test .Moreover, the coefficient of autocorrelation of the data generated is also apt. Therefore, the method can be safely used in public key cryptography. The strength of the key generated is being tested against AES.

References

Harsh Bhasin, Ramesh Kumar, Neha Kathuria, ‘Cryptography using Cellular Automata’, International Journal of Computer Science and Information technologies, Vol. 4 (2), 2013.

Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.

Harsh Bhasin, “Corpuscular Random Number Generator”, International Journal of Information and Electronics Engineering, Vol. 2 (2), 2012.

Harsh Bhasin, Nakul Arora, “ Cryptography Using Genetic Algorithm”, Reliability Infocom Technology and Optimization,2010

Barbara Kitchenham, O. Pearl Brereton, David Budgen, Mark Turner, John Bailey, Stephen Linkman, “Systematic literature reviews in software engineering – A systematic literature review”, Journal Information software technologies”, Vol. 51 (1), 2009.

Harsh Bhasin, “Use of Cellular Automata Patterns in Cryptography” in National Conference on Advances in Computational Intelligence, 2011.

Sonia Goyat, “Cryptography using Genetic Algorithm”, IOSR Journal of Computer Engineering, Vol. 1 (5), 2012.

Benjamin Jun, Paul Kocher, "The Intel Random Number Generator”, Cryptography Research, Inc. White Paper Prepared For Intel Corporation, 1999.

K. J. Jegadish Kumar, K. Chenna Kesava Reddy, S. Salivahanan, “Novel and Efficient Cellular Automata based Symmetric Key Encryption Algorithm for Wireless Sensor Networks”, International Journal of Computer Applications Vol. 13 (4), 2011.

Sonia Goyat, “Genetic Key Generation For Public Key Cryptography”, International Journal of Soft Computing and Engineering (IJSCE), Vol. 2 (3), 2012.

Uttam Kr. Mondal, Satyendra Nath Mandal, J. Pal Choudhury, J. K. Mandal , “Frame Based Symmetric Key Cryptography”, International Journal Advanced Networking and Applications 762 Vol. 2 (4), 2011.

Farhat Ullah Khan, Surbhi Bhatia, “A Novel Approach To Genetic Algorithm Based Cryptography”, International Journal of Research in Computer Science, Vol. 2 (3), 2012. Introduction

Downloads

Published

2014-06-30

How to Cite

[1]
H. Bhasin and N. Kathuria, “Cryptography Automata Based Key Generation”, Int. J. Sci. Res. Net. Sec. Comm., vol. 1, no. 2, pp. 15–17, Jun. 2014.

Issue

Section

Research Article

Similar Articles

<< < 3 4 5 6 7 8 

You may also start an advanced similarity search for this article.