Search icone
Search and publish your papers

One dimensional cellular automata based security scheme with both authentication and confidentiality

Or download with : a doc exchange

About the author

Level
Expert

About the document

Published date
Language
documents in English
Format
Word
Type
term papers
Pages
11 pages
Level
Expert
Accessed
0 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Abstract
  2. Introduction
  3. Basic of cellular automata
  4. Authentican of the data transmitted
    1. Between sender and receiver
    2. Strategy of the authentication scheme
    3. Receiving end
  5. The security scheme
    1. Authentication and security protocol
    2. Results and discussions
  6. Hardware implementation of the scheme
  7. Advantages and limitations
  8. Conclusion
  9. Bibliography

In the past few years organization have widely adopted local area network (LAN), wide area network (WAN) and internet to take advantages of advancement in technology1, 2. As a result of connecting private and internal network to the outside network, exchange of information is greatly facilitated. Individuals and organization worldwide can reach any point on the network through internet without regard to geographic boundaries or time of day3. However, along with the convenience and easy access to information, connecting private and internal network to outside untrusted networks bring new risks. Among them are the risks that valuable information will be lost, stolen, corrupted or misused by malicious people trying to gain some benefit or harm someone. Such an attack to an information system may be a passive attack or it may be an active attack. In passive attack, the principal goal of the attacker is to obtain information that is being transmitted. So passive attacker are of the nature of eavesdropping or monitoring of transmissions. In active attack, the attacker may want to modify the information or can send a false data stream to misguide the recipient of the message. It may be in the form of masquerading, when one entity pretends to be a different entity, or it may be in the form of modification messages.

[...] Here, only one dimensional cellular automata is considered where the CA is a linear array of cells and each cell depend on its left and right neighbor. The next state of a particular one dimensional cellular automation is shown in figure 1. For n-cell one dimensional cellular automata, the linear operator is a (nxn) matrix whose i-th row corresponds to the neighborhood relation of the i-th cell. This matrix is denoted as T and it is called the characteristics matrix of the cell cellular automata. [...]


[...] Table 1 CA rules with XOR logic Table 2 Five neighborhood dependency Top Left Self Right Bottom As only linear one dimensional Ca is considered, the two dimensional array is not discussed in detail Authentication Of The Data Transmitted Between Sender And Receiver In addition to message confidentiality, message authentication is an important network security function. Encryption protects against passive attack (eavesdropping) A. different requirement is to protect against active attack (falsification of data and transactions) Protection against such attacks is provided by message authentication. [...]


[...] Limitations The Cellular automaton represents only the sequential behavior of a number of interconnected cells which are arranged in a regular manner. Tag is generated from key and data matrix only by using 90 rule and 150 rule of CA. Tag generated is required at sending side and at receiving side the tag and original data has to be separated. Sending of data and receiving of data is only in the matrix form which includes only the binary 1's and 0's Conclusion A security scheme based on cellular automata has been proposed for both authentication and security. [...]

Recent documents in electronics category

The speculation around Sphero's BB-8

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   2 pages

Sphero's BB-8, the cross-generational companion

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   1 page