Cellular Automata based authentication (CAA)

被引:0
|
作者
Mukherjee, O [1 ]
Ganguly, N [1 ]
Chaudhuri, A [1 ]
Chaudhuri, PP [1 ]
机构
[1] Bengal Engn Coll, DU, Dept Comp Sci & Technol, Howrah 711103, W Bengal, India
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current demands for secured communication have focused intensive interest on 'Authentication'. There is a great demand for low cost high-speed on-line scheme for generation of Message Authentication Code. This paper introduces a computational model built around a new class of Cellular Automata (CA) referred to as Single Attractor CA (SACA). The SACA generates efficient one way hash function that has been employed for message authentication. The model generates the Message Authentication Code (MAC) as a string of Symbols in the extension field GF(2(P)). Theory of extension field GF(2(P)) and the unique behavioural model of SACA have provided the foundation of this scheme to enhance the level of security. Cryptanalysis of the proposed scheme has established the fact that compared to other known schemes like MD5, SHA1 etc., the current scheme is more secure against all known attacks. High speed execution of the proposed scheme makes it ideally suitable for real time on-line applications. Further, the Simple, regular, modular, and cascadable structure of CA with local interconnections makes the scheme ideally suitable for VLSI implementation with throughput in the range of hundreds of Megabits per second.
引用
收藏
页码:575 / 590
页数:16
相关论文
共 50 条
  • [1] Cellular automata based authentication (CAA)
    Mukherjee, M
    Ganguly, N
    Chaudhuri, PP
    [J]. CELLULAR AUTOMATA, PROCEEDINGS, 2002, 2493 : 259 - 269
  • [2] Authentication based on singular cellular automata
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    [J]. CELLULAR AUTOMATA, PROCEEDINGS, 2006, 4173 : 605 - 610
  • [3] Message authentication protocol based on cellular automata
    del Rey, A. Martin
    [J]. APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2007, 4448 : 52 - 60
  • [4] CAA decoder for Cellular Automata based byte error correcting code
    Sasidhar, K
    Chattopadhyay, S
    Chaudhuri, PP
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1996, 45 (09) : 1003 - 1016
  • [5] CARMA: Cellular automata based remote mutual authentication scheme
    Tripathy, Somanath
    Nandi, Sukumar
    Chowdhury, Atanu Roy
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 190 - +
  • [6] CARA: Cellular Automata based Remote-user Authentication scheme
    Tripathy, Somanath
    Chowdhury, Atanu Roy
    Nandi, Sukumar
    [J]. 2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 67 - +
  • [7] Hologram authentication based on a secure watermarking algorithm using cellular automata
    Hwang, Wen-Jyi
    Chan, Hao-Tang
    Cheng, Chau-Jern
    [J]. APPLIED OPTICS, 2014, 53 (27) : G64 - G73
  • [8] Restorable image authentication with cellular automata transform
    Jin, Jun
    Shu, Hong-Ping
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (06): : 1026 - 1030
  • [9] Cellular automata-based authentication for low-cost RFID systems
    Tripathy, S.
    Nandi, S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (03) : 199 - 216
  • [10] CAPEC: A Cellular Automata Guided FSM-based IP Authentication Scheme
    Rahman, Mridha Md Mashahedur
    Rahman, M. Sazadur
    Kibria, Rasheed
    Borza, Mike
    Reddy, Bandy
    Cron, Adam
    Rahman, Fahim
    Tehranipoor, Mark
    Farahmandi, Farimah
    [J]. 2023 IEEE 41ST VLSI TEST SYMPOSIUM, VTS, 2023,