z-logo
open-access-imgOpen Access
Encryption and Decryption algorithm using two dimensional cellular automata rules in Cryptography
Author(s) -
Sambhu Prasad Panda,
Madhusmita Sahu,
Umesh Prasad Rout,
Surendra Kumar Nanda
Publication year - 2011
Publication title -
international journal of communication networks and security
Language(s) - English
Resource type - Journals
ISSN - 2231-1882
DOI - 10.47893/ijcns.2011.1003
Subject(s) - encryption , block cipher , computer science , multiple encryption , cellular automaton , cipher , cryptography , ciphertext , theoretical computer science , probabilistic encryption , algorithm , key (lock) , mathematics , computer security
In this paper we present a new encryption and decryption algorithm for block cipher based on the linear (periodic boundary-PB) and nonlinear cellular automata rules. First we apply non linear CA rules (complements) to both plain text and key. Then PB CA rule is applied to the above results separately followed by the XOR operation of above results. After that the result of XOR operation is fed to substitution box(S-box) and again PB CA rules are applied followed by SBox. The decryption process is carried out just similar to that of encryption but in the reverse way. Both the process of encryption and decryption is performed for 8 number of rounds in order to avoid the dependency between the plain text and cipher text so that the our proposed algorithm is more secure than that of AES and DES algorithms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here