Cellular automata based authentication (CAA)

被引:0
|
作者
Mukherjee, M [1 ]
Ganguly, N
Chaudhuri, PP
机构
[1] Bengal Engn Coll, DU, Bot Gardens, Dept Comp Sci & Technol, Howrah 711103, W Bengal, India
[2] IISWBM, Ctr Comp, Kolkata 700073, W Bengal, India
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current demands for secured communication have focussed intensive interest on 'Authentication'. There is a great demand for a highspeed low cost scheme for generation of Message Authentication Code (MAC). This paper introduces a new computational model built around a special class of Cellular Automata (CA) that can be employed for both message and image authentication. Cryptanalysis of the proposed scheme indicates that compared to other known schemes like MD5, SHA1 etc., the current scheme is more secure against all known attacks. High speed execution of the proposed scheme makes it ideally suitable for real time on-line applications. Further, the regular, modular, and cascadable structure of CA with local interconnections makes the scheme ideally suitable for VLSI implementation with throughput in the range of Gigabits per second.
引用
收藏
页码:259 / 269
页数:11
相关论文
共 50 条
  • [1] Cellular Automata based authentication (CAA)
    Mukherjee, O
    Ganguly, N
    Chaudhuri, A
    Chaudhuri, PP
    [J]. PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 575 - 590
  • [2] Authentication based on singular cellular automata
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    [J]. CELLULAR AUTOMATA, PROCEEDINGS, 2006, 4173 : 605 - 610
  • [3] Message authentication protocol based on cellular automata
    del Rey, A. Martin
    [J]. APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2007, 4448 : 52 - 60
  • [4] CAA decoder for Cellular Automata based byte error correcting code
    Sasidhar, K
    Chattopadhyay, S
    Chaudhuri, PP
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1996, 45 (09) : 1003 - 1016
  • [5] CARMA: Cellular automata based remote mutual authentication scheme
    Tripathy, Somanath
    Nandi, Sukumar
    Chowdhury, Atanu Roy
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 190 - +
  • [6] CARA: Cellular Automata based Remote-user Authentication scheme
    Tripathy, Somanath
    Chowdhury, Atanu Roy
    Nandi, Sukumar
    [J]. 2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 67 - +
  • [7] Hologram authentication based on a secure watermarking algorithm using cellular automata
    Hwang, Wen-Jyi
    Chan, Hao-Tang
    Cheng, Chau-Jern
    [J]. APPLIED OPTICS, 2014, 53 (27) : G64 - G73
  • [8] Restorable image authentication with cellular automata transform
    Jin, Jun
    Shu, Hong-Ping
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (06): : 1026 - 1030
  • [9] Cellular automata-based authentication for low-cost RFID systems
    Tripathy, S.
    Nandi, S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (03) : 199 - 216
  • [10] CAPEC: A Cellular Automata Guided FSM-based IP Authentication Scheme
    Rahman, Mridha Md Mashahedur
    Rahman, M. Sazadur
    Kibria, Rasheed
    Borza, Mike
    Reddy, Bandy
    Cron, Adam
    Rahman, Fahim
    Tehranipoor, Mark
    Farahmandi, Farimah
    [J]. 2023 IEEE 41ST VLSI TEST SYMPOSIUM, VTS, 2023,